bounty_hunter1412 (@cutiechenny) 's Twitter Profile
bounty_hunter1412

@cutiechenny

OSCP | OSWP | OSEP | CRTP | CRTE | CRTO | Security professional

ID: 1680259566

calendar_today18-08-2013 09:22:03

374 Tweet

1,1K Takipçi

621 Takip Edilen

FBI (@fbi) 's Twitter Profile Photo

Users of #MOVEit software are being attacked through publicly disclosed vulnerabilities. The FBI urges users to follow recommended mitigations to protect against exploitation. If you are victimized, report to IC3.gov and include #MOVEit. cisa.gov/news-events/al…

Users of #MOVEit software are being attacked through publicly disclosed vulnerabilities. The FBI urges users to follow recommended mitigations to protect against exploitation. If you are victimized, report to IC3.gov and include #MOVEit. cisa.gov/news-events/al…
bounty_hunter1412 (@cutiechenny) 's Twitter Profile Photo

Thanks to MyHackerTech for the interview again, it is a great honor to share with friends all over the world the personal gains in the field of cyber security in the past three years. myhackertech.com/blogs/news/int…

bounty_hunter1412 (@cutiechenny) 's Twitter Profile Photo

My new repo for collecting powerful Mobile Device Hacker Toolkit | Android | iPhone System Hacker Arsenal github.com/chennylmf/Mobi…

X (@themsterdoctor1) 's Twitter Profile Photo

200+ Hacking / Infosec pdfs Source: drive.google.com/drive/u/0/mobi… Credit: Joas Antonio #infosec #Hacking #infosecurity #Malware #bugbountytips #CTF #BugBounty #vulnerability #pwn #CyberSecurityAwareness #CyberSecurity #cybersecuritytips

200+ Hacking / Infosec pdfs 

Source: drive.google.com/drive/u/0/mobi…

Credit: <a href="/C0d3Cr4zy/">Joas Antonio</a> 

#infosec #Hacking #infosecurity #Malware #bugbountytips #CTF  #BugBounty #vulnerability #pwn  #CyberSecurityAwareness #CyberSecurity #cybersecuritytips
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🔥 Data Leak Alert! #Microsoft accidentally exposed 38TB of private data, including secrets, keys, passwords, and 30K+ internal Teams messages, on AI #GitHub repository due to a security glitch. Read more in this article: thehackernews.com/2023/09/micros… #ArtificialIntelligence #Tech

bounty_hunter1412 (@cutiechenny) 's Twitter Profile Photo

I just published Unveiling the Cunning: A Demo of Google Calendar RAT Exploiting Calendar Service for C2 Operations link.medium.com/Mb88fKknyEb

RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

Nuclei + AI = Money Here's how to use AI and nuclei to make money while you sleep Credits:@0xHunX #bugbountytips #BugBounty #bugbountytip #bugbounty

Nuclei + AI = Money
Here's how to use AI and nuclei to make money while you sleep
Credits:@0xHunX
#bugbountytips #BugBounty #bugbountytip #bugbounty
Winslow (@senzee1984) 's Twitter Profile Photo

Happy to release my tool InflativeLoading, it is able to convert a native EXE to PIC shellcode. It works by appending a dynamically generated shellcode stub to the dumped version of the selected PE file. More details can be found in the README document. github.com/senzee1984/Inf…

bounty_hunter1412 (@cutiechenny) 's Twitter Profile Photo

just upgraded to kali 2024.1 today. echo "deb http.kali.org/kali kali-rolling main contrib non-free non-free-firmware" | sudo tee /etc/apt/sources.list sudo apt update && sudo apt -y full-upgrade cp -vrbi /etc/skel/. ~/ [ -f /var/run/reboot-required ] && sudo reboot -f

Cyber Advising (@cyber_advising) 's Twitter Profile Photo

CVE-2024-26229: An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. PoC github.com/varwara/CVE-20…

CVE-2024-26229: An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.

PoC
github.com/varwara/CVE-20…
HackingGroup (@hackinggroup_) 's Twitter Profile Photo

Dear guests, whitehat hackers, security experts, researchers, and enthusiasts,Welcome to the official launch of the Hacking Group International Hackathon Cybersecurity Conference!I’m Amanda, your AI host for this event. It is a great honor to gather with all of you on this

Dear guests, whitehat hackers, security experts, researchers, and enthusiasts,Welcome to the official launch of the Hacking Group International Hackathon Cybersecurity Conference!I’m Amanda, your AI host for this event. It is a great honor to gather with all of you on this