Nobel Herrera (@nobelh) 's Twitter Profile
Nobel Herrera

@nobelh

Penetration Tester, Technical Writer @RedTeamRD

ID: 64019529

linkhttps://tun0.blog calendar_today08-08-2009 18:56:13

368 Tweet

134 Takipçi

187 Takip Edilen

Md Ismail Šojal 🕷️ (@0x0sojalsec) 's Twitter Profile Photo

Find SSRF on all your huge target list via httpx:- 1:- Download github.com/lutfumertceyla… 2:- Add brutelogic.com.br/poc.svg on {target} 3:- Run httpx. httpx -paths ssrf-parameters.txt -threads 200 -o ssrf.txt 4:- Screenshot the result gowitness file -f ssrf.txt #infosec

Find SSRF on all your huge target list via httpx:-

1:- Download github.com/lutfumertceyla…

2:- Add brutelogic.com.br/poc.svg on {target}

3:- Run httpx.

httpx -paths ssrf-parameters.txt -threads 200 -o ssrf.txt

4:- Screenshot the result

gowitness file -f ssrf.txt

#infosec
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Oracle customers confirm data stolen in alleged cloud breach is valid - Lawrence Abrams bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

rose87168 (@rose87168) 's Twitter Profile Photo

Update News Oracle customers confirm data stolen in alleged cloud breach is valid :)) bleepingcomputer.com/news/security/…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🔥 North Korea’s Lazarus Group is back—with a new twist on fake job scams. They’re using ClickFix tricks to infect crypto job seekers with GolangGhost, a stealthy Go-based backdoor hitting Windows & macOS. Now expanding fast in Europe—with IT workers faking identities to

🔥 North Korea’s Lazarus Group is back—with a new twist on fake job scams.

They’re using ClickFix tricks to infect crypto job seekers with GolangGhost, a stealthy Go-based backdoor hitting Windows & macOS.

Now expanding fast in Europe—with IT workers faking identities to
CISA Cyber (@cisacyber) 's Twitter Profile Photo

🚨 Cyber actors are using a technique called #FastFlux to evade detection. Our joint guide with NSA Cyber, FBI & international partners offers #cybersecurity service providers and #ISPs with steps to develop detection analytics and blocking capabilities. cisa.gov/news-events/cy…

🚨 Cyber actors are using a technique called #FastFlux to evade detection. Our joint guide with <a href="/NSACyber/">NSA Cyber</a>, <a href="/FBI/">FBI</a> &amp; international partners offers #cybersecurity service providers and #ISPs with steps to develop detection analytics and blocking capabilities. cisa.gov/news-events/cy…
Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Our blog presents details on a real-world case and how these two plugins can be used to investigate an incident that involves a phishing attack to gain initial access, as well as several instances of lateral movement, credential access, and privilege escalation.

EFF (@eff) 's Twitter Profile Photo

Florida’s new anti-encryption bill is both dumb and dangerous. Florida lawmakers must say no. eff.org/deeplinks/2025…

Md Ismail Šojal 🕷️ (@0x0sojalsec) 's Twitter Profile Photo

The payload contains '|/???/\b**\h,' which is meant to confuse WAF rules. Unusual characters are a common evasion tactic. image by: win3zz #cybersec #BugBountytips #infosec

The payload contains '|/???/\b**\h,' which is meant to confuse WAF rules. Unusual characters are a common evasion tactic. 

image by:  win3zz

#cybersec #BugBountytips #infosec
👑 OFJAAAH 👑 (@ofjaaah) 's Twitter Profile Photo

Use NextJS? Recon ✨ A quick way to find "all" paths for Next.js websites: DevTools->Console console.log(__BUILD_MANIFEST.sortedPages) javascript​:console.log(__BUILD_MANIFEST.sortedPages.join('\n')); Cred = linkedin.com/in/0xsojalsec?… #infosec #cybersec #bugbountytips

Use NextJS? Recon ✨

A quick way to find "all" paths for Next.js websites:
DevTools-&gt;Console

console.log(__BUILD_MANIFEST.sortedPages)

javascript​:console.log(__BUILD_MANIFEST.sortedPages.join('\n'));

Cred = linkedin.com/in/0xsojalsec?…

#infosec #cybersec #bugbountytips
d4d (@d4d89704243) 's Twitter Profile Photo

The Fragile Lock: Novel Bypasses for SAML Authentication will premiere this Wednesday at 10:20 at Black Hat Europe! I'll show you how to chain XML parser quirks to achieve complete authentication bypasses on multiple popular libraries #BHEU Black Hat

The Fragile Lock: Novel Bypasses for SAML Authentication will premiere this Wednesday at 10:20 at Black Hat Europe! I'll show you how to chain XML parser quirks to achieve complete authentication bypasses on multiple popular libraries #BHEU <a href="/BlackHatEvents/">Black Hat</a>