HackerMigh32064 Profile Banner
hacker might Profile
hacker might

@HackerMigh32064

Followers
19
Following
26
Media
8
Statuses
64

Security Researcher | Bug Bounty Hunter | Ethical Hacker

Joined May 2023
Don't wanna be here? Send us removal request.
@HackerMigh32064
hacker might
4 days
CVE-2025-7742→ Remote Code Execution in LG Innotek LNV5110R Cameras. A vulnerability I reported has now been officially published by @CISAgov . Thanks to the CISA coordination team for their support and timely handling.
cisa.gov
0
0
0
@HackerMigh32064
hacker might
4 days
My 20th CVE is live — published by @CISAgov . CVE-2025-6260: Authentication Bypass in Network Thermostat X-Series WiFi thermostats . . #CVE #CyberSecurity #AuthenticationBypass #IoTSecurity #OTSecurity #InfoSec #CISA.
cisa.gov
0
0
0
@HackerMigh32064
hacker might
4 days
Ever wondered how easy it is to hack a Smart TV?. Using ADB, hackers can control TVs remotely, watch screens, install malware — no password needed. #CyberSecurity #ADBExploit #SmartTVHack #IoTSecurity #EthicalHacking.
Tweet card summary image
medium.com
So you bought a Smart TV — nice! You basically gave hackers VIP access to your living room. Thanks to open ADB ports, remote exploits, and…
0
0
0
@HackerMigh32064
hacker might
15 days
Exposed Red Lion G3 Web Servers found online — no login, full access. 100+ industrial devices misconfigured across Censys, FOFA, MODAT. Reported to CISA. Disclosure now live. #OTsecurity #ICS #IoTSecurity #RedLion #CyberSecurity.
Tweet card summary image
medium.com
Industrial systems running without authentication? What could possibly go wrong — apart from unauthorized access, misconfigurations, or…
0
1
1
@HackerMigh32064
hacker might
17 days
Just dropped a full tutorial on hacking firmware using EMBA — real-world reverse engineering and security research. #FirmwareHacking #EMBA #ReverseEngineering #CyberSecurity #CVE #BugBounty #infosec.
0
1
4
@HackerMigh32064
hacker might
21 days
Bug bounty recon just got smarter. Found a powerful, under-the-radar tool by modat with a usable free tier and slick querying. Wrote a quick walkthrough using real examples. #BugBounty #Recon #OSINT #EthicalHacking.
Tweet card summary image
osintteam.blog
Bug bounty recon is half the battle — and the right tools make all the difference. While Shodan and Censys are popular, Modat Magnify is a…
0
1
0
@HackerMigh32064
hacker might
23 days
Just dropped a full tutorial on installing Zeek IDS (Bro) on AWS EC2. #Zeek #CyberSecurity #AWS #NetworkMonitoring #ZeekIDS #ThreatDetection #BlueTeam.
0
0
0
@HackerMigh32064
hacker might
24 days
500+ OT devices online. No login. No password. Just open. My latest research on unauthenticated access via misconfigured industrial IoT. #OTSecurity #IoTSecurity #CyberSecurity #ICS #Misconfiguration.
Tweet card summary image
medium.com
Imagine walking into a secure facility… only to find the door wide open and no one asking questions. That’s what I found online — over 500…
1
0
0
@HackerMigh32064
hacker might
27 days
Still using ancient wordlists for recon?.I wrote a guide on turning trash URLs into gold with haklistgen — a must-have for bug bounty recon, fuzzing, and wordlist generation. #BugBounty #EthicalHacking #haklistgen #OSINT #InfoSec #CyberSecurity.
Tweet card summary image
osintteam.blog
Your ex didn’t value you — but haklistgen will. While they were busy ignoring your texts, this tool turns your dump of messy URLs into…
0
0
0
@HackerMigh32064
hacker might
30 days
Tired of missing hidden endpoints in JS during recon?.I just dropped a blog on using GoLinkFinder — a blazing-fast GoLang tool for extracting URLs like a pro. Bug bounty hunters, this one’s for you. #BugBounty #OSINT #EthicalHacking #Recon #golang .
osintteam.blog
GoLinkFinder is a fast OSINT security tool written in GoLang that extracts hidden URLs from HTML and JavaScript — perfect for bug bounty…
0
0
0
@HackerMigh32064
hacker might
1 month
My latest research: 184,000 Ray AI Dashboards found online — many with no authentication. #CyberSecurity #AI #RayDashboard #CVE2023_48022 #CloudSecurity #infosec #BugBounty.
Tweet card summary image
systemweakness.com
Meet Ray: The AI Cluster Workhorse
0
0
0
@HackerMigh32064
hacker might
2 months
Check out my latest blog.
0
0
0
@HackerMigh32064
hacker might
5 months
Hidden Website for Subdomain Enumeration.Tried found domains, subdomains, and IPs in seconds. A must-use for reconnaissance and bug bounty. #CyberSecurity #BugBounty #OSINT #SubdomainEnumeration #PenetrationTesting #infosec .
Tweet media one
0
0
0
@HackerMigh32064
hacker might
5 months
I think scammers don’t even read the messages 😂😂😂. #scammers #funwithscammers #sscurity #security
Tweet media one
0
0
0
@HackerMigh32064
hacker might
5 months
RT @HackerMigh32064: Hacking Anthem .
0
1
0
@HackerMigh32064
hacker might
5 months
RT @bountywriteups: Subdomain Bruteforcing Using Burp Suite: A Step-by-Step Guide for Ethical Hackers. #bugbounty #….
0
4
0
@HackerMigh32064
hacker might
5 months
Tweet media one
0
132
0