
Chocapikk 🤘🏻
@Chocapikk_
Followers
3K
Following
4K
Media
216
Statuses
2K
Pentester. Exploit dev. CVEs for fun. https://t.co/603lPNGIHU
Here, but not really
Joined April 2022
RT @nate2x4: New vuln just dropped. Have you checked your asset inventory for any vulnerable trains? If your asset management isn't very ac….
0
1
0
RT @TheLaluka: Il y a quelques jours, j'ai eu le plaisir d'accueillir LIVE les fondateurs de @Synacktiv @SecurityElysium @rootme_org (pro)….
0
5
0
RT @HuntressLabs: ➡️ Starting at 8:43 UTC and ramping up at 16:15 UTC on July 1, we observed a number of steps around enumeration, recon, a….
0
11
0
RT @Sysinternals: We've released Procmon for Linux, Sysmon for Linux, and SysinternalsEBPF with Azure Linux 3.0 support!. Get the tools at….
0
124
0
RT @AlertesInfos: 🚨🇫🇷🕊️ FLASH - L’humoriste Bun Hay Mean est décédé à l’âge de 43 ans. Il a chuté de 8 étages. (Le Parisien) https://t.co/….
0
7K
0
RT @Gi7w0rm: Reminder everyone that time and time again its individual/crowdsourced effort that safes our internet. Individual People like….
0
17
0
RT @M_Solidus: Stop wasting money on Netflix, HBO and other platforms. You only need:.- qBittorrent.- MullvadVPN.- VLC player. And yes, I….
0
601
0
RT @HaboubiAnis: "sudo make me root" Local privilège.C'est en gros la nouvelle fonctionnalité non-documentée de millions de serveurs Linux….
0
9
0
A critical RCE flaw (CVE-2025-47812, CVSS 10.0) in Wing FTP Server allows unauthenticated attackers to execute arbitrary Lua code via NULL byte injection, compromising the server. PoC Available. #WingFTPServer #RCE #Cybersecurity #Vulnerability #PatchNow.
0
1
9
RT @pdnuclei_bot: 🚨 CVE-2025-47812 - critical 🚨. Wing FTP Server <= 7.4.3 - Remote Code Execution. > Wing FTP Server versions prior to 7.4.….
0
7
0
Reproduced Wing FTP Server RCE (CVE-2025-47812) and submitted a Metasploit module: .PR:
During a customer pentest, we went from anonymous Read-Only FTP access to full root-level remote code execution by abusing a string parsing discrepancy in Wing FTP's username handling. #security #BugBounty.
1
9
44
RT @zhero___: Bug bounty, feedback, strategy, and alchemy. frequently asked for advice, roadmaps, and more, I finally took the time, after….
0
74
0
RT @CryptoUndeleted: @kizamitheegirl @SNCFVoyageurs @GroupeSNCF Le contrôleur est trop occupé à verbaliser les gens solvables désolé.
0
1
0
RT @leak_ix: An update to the community on the recent downtime:. Earlier this week our main index server started showing signs of wear on i….
0
1
0
RT @AlizTheHax0r: So like. Time to be vulnerable for a minute and talk about mental health as it relates to research. Because it’s tough, y….
0
7
0