Tarik (@tw4vesx) 's Twitter Profile
Tarik

@tw4vesx

ID: 1430204350152986632

calendar_today24-08-2021 16:24:49

46 Tweet

45 Followers

339 Following

Rohit (@rohsec) 's Twitter Profile Photo

Starting a new #bugbounty target? Here's a quick guide to help you hit the ground running šŸ§µšŸ‘‡ : #bugbounty #bugbountytips #cybersecurity

Hacking Articles (@hackinarticles) 's Twitter Profile Photo

Pic of the Day #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #cybersecuritytips

Pic of the Day

#infosec #cybersecurity #cybersecuritytips  #pentesting #oscp #redteam  #informationsecurity  #cissp #cybersecuritytips
Omar Espino • (@omespino) 's Twitter Profile Photo

Do you want to temporarily proxy your whole terminal tools to Burpsuite or any proxy? Add the following env vars (linux/macos/unix): export http_proxy=127.0.0.1:8080 export https_proxy=127.0.0.1:8080 it would work with any tool opened from the terminal, including any UI app 1/3

Do you want to temporarily proxy your whole terminal tools to Burpsuite or any proxy? Add the following env vars (linux/macos/unix):

export http_proxy=127.0.0.1:8080
export https_proxy=127.0.0.1:8080

it would work with any tool opened from the terminal, including any UI app 1/3
N$ (@nav1n0x) 's Twitter Profile Photo

You guys always ask me how do I find SQL injections, its just simple. Avoid what everyone does and make your own methodology. Here is mine: 1. I don't normally go if the target is just target.com. I always prefer the target with wide scope. 1/n #BugBounty

Hacking Articles (@hackinarticles) 's Twitter Profile Photo

Pic of the Day #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #cybersecuritytips

Pic of the Day

#infosec #cybersecurity #cybersecuritytips  #pentesting #oscp #redteam  #informationsecurity  #cissp #cybersecuritytips
Tarik (@tw4vesx) 's Twitter Profile Photo

Year of the Jellyfish - I have just completed this room! Check it out: tryhackme.com/room/yearofthe… #tryhackme #linux #jellyfin #cve #code #cert-style #muirlandoracle #NewYear #newyear #yearofthejellyfish via

Tarik (@tw4vesx) 's Twitter Profile Photo

if your Repeater Tab doesn't look like this while hunting for bugs.... you must be doing something wrongšŸ˜† #BugBounty #Hacking

if your Repeater Tab doesn't look like this while hunting for bugs.... you must be doing something wrongšŸ˜† #BugBounty #Hacking
HackerContent (@hacker_content) 's Twitter Profile Photo

HackerContent provides marketing and content services specifically for cybersecurity companies. We'll pick one person who retweets this and send them a Flipper Zero in the post 🐬. #giveaway

Jason Haddix (@jhaddix) 's Twitter Profile Photo

In pursuit of an offensive security career, many people will say you ā€œhaveā€ to do X THING to succeed. School, certs, programming, +++ Fuck that. The only commonality across hacking is a strong sense of curiosity and the best ingredient to success is some form of hard work.

Jason Haddix (@jhaddix) 's Twitter Profile Photo

The golden bug bounty rule: ā€œTouch the code, pay the bug. Don’t touch the code? Allow to discloseā€ -Jhaddix

zere (@j_zere) 's Twitter Profile Photo

Just published my first blog post "Cache Deception + CSPT: Turning Non Impactful Findings into Account Takeover" You can read the full write-up here: zere.es/posts/cache-de…

Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile Photo

I discovered how to use CSS to steal attribute data without selectors and stylesheet imports! This means you can now exploit CSS injection via style attributes! Learn how below: portswigger.net/research/inlin…

I discovered how to use CSS to steal attribute data without selectors and stylesheet imports! This means you can now exploit CSS injection via style attributes! Learn how below:

portswigger.net/research/inlin…
Jorian (@j0r1an) 's Twitter Profile Photo

While playing a challenge by Salvatore Abello, I found a pretty interesting way to exploit Dangling Markup with a strict CSP. All you need is an <iframe>, <object> or <embed> set to about:blank, with a dangling name= attribute. This vulnerable page should be iframable.

While playing a challenge by <a href="/salvatoreabello/">Salvatore Abello</a>, I found a pretty interesting way to exploit Dangling Markup with a strict CSP.
All you need is an &lt;iframe&gt;, &lt;object&gt; or &lt;embed&gt; set to about:blank, with a dangling name= attribute. This vulnerable page should be iframable.
Peter Girnus (@gothburz) 's Twitter Profile Photo

Last week our CISO asked me to present on ā€œzero trust architecture.ā€ I don’t know what that means. I make $340,000 a year. I haven’t touched a firewall since Obama’s first term. But I have a CISSP. I passed by memorizing acronyms. I still don’t know what half of them stand for. I