Bob Hope Profile
Bob Hope

@BobHope688462

Followers
36
Following
10
Media
29
Statuses
6K

Joined October 2024
Don't wanna be here? Send us removal request.
@rxerium
Rishi
2 days
🚨 Active Exploitation of Gladinet CentreStack and Triofox Local File Inclusion Flaw (CVE-2025-11371) I've created a vulnerability detection script here: https://t.co/sOr7tZBjGP As reported by Huntress this is an unauthenticated Local File Inclusion flaw in Gladinet CentreStack
4
33
166
@0x0SojalSec
Md Ismail Šojal 🕷️
2 years
The new https://t.co/IdhsGWLVo7 search allows for regex, which means brand **new** regex GitHub Dorks are possible! Eg, find SSH and FTP passwords via connection strings with: /ssh:\/\/.*:.*@.*target\.com/ /ftp:\/\/.*:.*@.*target\.com/ #infosec #cybersecurite #bugbountytip
7
331
1K
@Rainmaker1973
Massimo
2 days
Now any bike can be turned into an electric bike Former BYD and Huawei engineers have created a compact electric drive that attaches to the frame and accelerates the rear wheel up to 32 km/h. https://t.co/JexcSLtgJ5
138
811
7K
@Officialwhyte22
Winston Ighodaro
2 days
I scanned a Jenkins endpoint hosted at 135.181.217.213, discovered a script console exposed on port 8080, and injected code to dump environment variables. From the logs, I exfiltrated Git credentials and triggered a private pipeline to dump artifacts from a staging server
5
50
370
@XssPayloads
XSS Payloads
2 days
A surprising one by @KN0X55 <<https: https://t.co/vLjSCq7it9>> Demo:
0
8
62
@0x0SojalSec
Md Ismail Šojal 🕷️
3 days
For adding your wordlist ✨ #infosec #cybersec #bugbountytips
1
28
177
@bountywriteups
𝕏 Bug Bounty Writeups 𝕏
3 days
0
4
42
@it4sec
Denis Laskov 🇮🇱
3 days
SIM card and its cyber secrets: how to analyze and attack this small network-connected computer. 🎫📶📦👨🏻‍💻📳 More details on: LinkedIn: https://t.co/uTosGUt39a Substack: https://t.co/RFFzHJaQfG
4
144
876
@MrUn1k0d3r
Mr.Un1k0d3r
3 days
For some reason, Azure is assumed to be secure by design, which is not the case. Validating the default user permissions is important to ensure that everything that can be hardened is hardened. #Azure #RedTeam https://t.co/1q8AxyuTSY
Tweet card summary image
fr.linkedin.com
Français plus bas Another week, another Azure advice. We've previously talked about application permissions, phishing vectors, and more. Today, let's talk about Azure configuration itself. When was...
0
9
77
@ctbbpodcast
Critical Thinking - Bug Bounty Podcast
3 days
How James Kettle's Desync Research Started
1
3
36
@hubermanlab
Andrew D. Huberman, Ph.D.
4 days
This is how DJ Shipley returns home each day to his wife and kids. It’s as regimented as his morning routine- nothing left to chance (on his side). Anyone trying to balance work and personal life should listen to this.
175
954
10K
@WHOISshuvam
Suvam Adhikari
4 days
1️⃣ Visited https://target/asset-manifest.json 🚨 2️⃣ Found a main.js and https://t.co/1NXIk5a5qc file. 👀 3️⃣ Parsed the source map to extract API endpoints. 4️⃣ Results - Ended up with multiple IDORS 🔥 #bugbountytips #BugBounty
2
6
95
@interesting_aIl
Interesting As Fuck
4 days
At this point I'm questioning if I'm breathing wrong
83
852
12K
@bountywriteups
𝕏 Bug Bounty Writeups 𝕏
4 days
One Click to All Baisc Recon for Bug Bounty https://t.co/K6EXdFK0PM #bugbounty #bugbountytips #bugbountytip
Tweet card summary image
ghostman01.medium.com
All Recon with One Click
0
10
39
@pdiscoveryio
ProjectDiscovery
4 days
Scan smarter, not harder. Here are 5 Naabu tweaks for faster, cleaner port discovery 👇 1️⃣ Tune -rate & -retries for speed vs false-positives 2️⃣ -exclude-cdn → only scan 80/443 for CDN IPs 3️⃣ Run -wn host discovery first 4️⃣ Bind -interface when routing matters 5️⃣ Use -resume
0
5
35
@NullSecurityX
NullSecX
3 days
Cross Site Scripting (XSS) Akamai WAF Bypass try this payload : <!--><svg+onload=%27top[%2fal%2f%2esource%2b%2fert%2f%2esource](document.cookie)%27> #BugBounty #XSS #Akamai
2
88
518
@Behi_Sec
Behi
4 days
This simple SSRF earned me $5K: - Target had a Posts section - It let users send requests to any host when actions were triggered - Set the post URL to the AWS metadata URL - Triggered the action → no response - Target had a Logs section - From there, I could see the response
2
14
103
@Officialwhyte22
Winston Ighodaro
4 days
1
11
108
@hackerfantastic
hacker.house
4 days
Every day Zoom.exe is re-started from the %AppDir% through a scheduled task it seems, making this an excellent persistence mechanism for side-loading.
@hackerfantastic
hacker.house
18 days
SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows installer and update processes to elevate privileges. https://t.co/DVdM2ht1TL
2
46
302