CharlesKoome6 Profile Banner
Ch4rl3s K00m3 Profile
Ch4rl3s K00m3

@CharlesKoome6

Followers
1K
Following
2K
Media
23
Statuses
923

Security Analyst | CTF player | Head of Operations @BsidesMombasa

Joined January 2020
Don't wanna be here? Send us removal request.
@theXSSrat
The XSS Rat - Proud XSS N00b :-)
2 days
🧩 100 Things Every Bug Bounty Hunter Should Check on the API Level HTTP methods allowed Missing or weak authentication Missing or weak authorization JWT signature verification bypass Token reuse after logout Hardcoded API keys API key leakage in responses Rate limiting
2
70
257
@coffinxp7
Coffin
16 days
tell me any better XSS methodology than this 😎 Explanation: This oneliner command starts by collecting all URLs from passive sources using gau tool, then filters them for potential XSS parameters using gf patterns. Next, httpx and grep are used to keep only URLs that return
16
114
724
@androidmalware2
Mobile Hacker
16 days
New Android BEERUS framework for dynamic analysis & reverse engineering BEERUS brings Frida auto-injection, sandbox exfiltration, memory dumps, Magisk integration and more for on device app analysis by @HakaiOffsec #AndroidSecurity #Frida #ReverseEngineering #MalwareAnalysis
8
105
600
@birdabo
sui dev ☄️
1 month
just found out AI can now see through walls using WiFi signals. > privacy is the greatest myth of 21st century.
663
1K
18K
@0xor0ne
0xor0ne
2 months
How to solve a CTF challenge that requires PAC, BTI, and relative vtables bypass (HITCON CTF 2025) https://t.co/LZDFojees7 Credits @bruce30262 #infosec #ctf
1
53
239
@akaclandestine
Clandestine
2 months
GitHub - stuxctf/PAYGoat: PAYGoat is a banking application built for educational purposes, focused on exploring and understanding common business logic flaws in financial platforms.
Tweet card summary image
github.com
PAYGoat is a banking application built for educational purposes, focused on exploring and understanding common business logic flaws in financial platforms. - stuxctf/PAYGoat
0
61
223
@CharlesKoome6
Ch4rl3s K00m3
5 months
Discover smart business solutions, network, and innovate the future. #OdooMombasa #innvousodoo
0
1
3
@CharlesKoome6
Ch4rl3s K00m3
5 months
Today's the day, and all roads lead to Sarova Whitesands Beach Resort! See you at the Odoo Business Show Mombasa 2025. #odoomombasa #innovusodoo
0
0
0
@ProjectSEKAIctf
Project Sekai CTF
5 months
🎁Monthly Giveaway🎁 Hack The Box 6-month VIP+ - Follow, Like, and Retweet to join! - Winners will be picked randomly on 5 June. #hackthebox #giveaway #projectsekaictf
94
423
579
@HackingTeam777
ӉѦСҠіИԌ ҬЄѦӍ
6 months
Undetectable WebShell https://t.co/MNCLbvjdMu
0
89
347
@okonu_ian
Okonu
6 months
Built Synqs, a simple tool to sync multiple calendars so people only book you when you're actually free. No overlaps. Generate a booking link, share it, and you're good. Try mine 👉 https://t.co/y9Xny5VyLw Want early access? DM/email me. Self-host? 👉
Tweet card summary image
github.com
a comprehensive web application designed to aggregate calendars from multiple Google accounts while also providing appointment booking capabilities. It serves as a centralized hub where users can v...
1
4
13
@enenumxela
Alex
6 months
xsubfind3r: Give It a Spin! It doesn’t interact directly with its target , minimizing detection risks while uncovering subdomains. The subdomain list you get from a tool like xsubfind3r is more than just a bunch of hostnames, it’s a roadmap to a target's external footprint.
@0xHueristiq
Hueristiq
6 months
🔎 Discover subdomains passively & effortlessly with ✨xsubfind3r✨: 👉 xsubfind3r is a command-line utility designed to discover subdomains for a given domain in a simple, efficient way. 📌 https://t.co/PZyqhRb50n #InfoSec #Cybersecurity #RedTeaming #Pentesting #BugBounty
0
4
3
@LarryMadowo
Larry Madowo
6 months
A Ugandan leader went for cancer treatment in Germany but built a grand church back home when he recovered, not a hospital. Sam Kutesa even invited President Museveni to open it
906
5K
12K
@CTF_Room
CTFRoom
7 months
#Defcon33 is here with us & thanks to @BlackInCyberCo1, we get to showcase the best from the international community. If you are a challenge creator & wish to contribute, please #ping @JonesBaraza or DM. @CTF_Room is once again privileged to be a #CTF partner alongside @KC7cyber.
1
16
36
@Dinosn
Nicolas Krassas
7 months
Linux Kernel Vulnerability Exposes Local Systems to Privilege Escalation, PoC Published
Tweet card summary image
securityonline.info
Discover the details of a severe Linux Privilege Escalation flaw. Understand its origins and potential exploits in the Linux kernel.
1
49
169
@crptAtlas
Atlas
8 months
Lazarus Group use PumpFun to vanish $1.5B They launched #500000 and vanished $44M I spent 10h to reveal their laundering scheme Here's what's happening and what's next👇🧵
227
535
4K
@arndxt_xo
arndxt
8 months
Bybit’s $1.5B hack is bullish - Lazarus has diamond hands. Led by Park Jin Hyok, now wanted by the FBI. They’ve just drained $1.46B in staked ETH & ERC-20 tokens from Bybit, making it the biggest crypto hack ever, twice the size of the second-largest breach. How did they pull
311
1K
10K
@gatheruu
gatheru.u
11 months
Excited to be attending #DevSecCon2024 at Sote Hub! A great opportunity to dive into the world of #DevSecOps, learn cutting-edge security practices, and connect with like-minded tech enthusiasts. Let’s secure the future, one code at a time. #sotehub #DevSecCon2024
1
2
5
@CharlesKoome6
Ch4rl3s K00m3
11 months
0
2
16