
hacker might
@HackerMigh32064
Followers
19
Following
26
Media
8
Statuses
64
Security Researcher | Bug Bounty Hunter | Ethical Hacker
Joined May 2023
My 20th CVE is live — published by @CISAgov . CVE-2025-6260: Authentication Bypass in Network Thermostat X-Series WiFi thermostats . . #CVE #CyberSecurity #AuthenticationBypass #IoTSecurity #OTSecurity #InfoSec #CISA.
cisa.gov
0
0
0
Ever wondered how easy it is to hack a Smart TV?. Using ADB, hackers can control TVs remotely, watch screens, install malware — no password needed. #CyberSecurity #ADBExploit #SmartTVHack #IoTSecurity #EthicalHacking.
medium.com
So you bought a Smart TV — nice! You basically gave hackers VIP access to your living room. Thanks to open ADB ports, remote exploits, and…
0
0
0
Exposed Red Lion G3 Web Servers found online — no login, full access. 100+ industrial devices misconfigured across Censys, FOFA, MODAT. Reported to CISA. Disclosure now live. #OTsecurity #ICS #IoTSecurity #RedLion #CyberSecurity.
medium.com
Industrial systems running without authentication? What could possibly go wrong — apart from unauthorized access, misconfigurations, or…
0
1
1
Just dropped a full tutorial on hacking firmware using EMBA — real-world reverse engineering and security research. #FirmwareHacking #EMBA #ReverseEngineering #CyberSecurity #CVE #BugBounty #infosec.
0
1
4
Bug bounty recon just got smarter. Found a powerful, under-the-radar tool by modat with a usable free tier and slick querying. Wrote a quick walkthrough using real examples. #BugBounty #Recon #OSINT #EthicalHacking.
osintteam.blog
Bug bounty recon is half the battle — and the right tools make all the difference. While Shodan and Censys are popular, Modat Magnify is a…
0
1
0
Just dropped a full tutorial on installing Zeek IDS (Bro) on AWS EC2. #Zeek #CyberSecurity #AWS #NetworkMonitoring #ZeekIDS #ThreatDetection #BlueTeam.
0
0
0
500+ OT devices online. No login. No password. Just open. My latest research on unauthenticated access via misconfigured industrial IoT. #OTSecurity #IoTSecurity #CyberSecurity #ICS #Misconfiguration.
medium.com
Imagine walking into a secure facility… only to find the door wide open and no one asking questions. That’s what I found online — over 500…
1
0
0
Still using ancient wordlists for recon?.I wrote a guide on turning trash URLs into gold with haklistgen — a must-have for bug bounty recon, fuzzing, and wordlist generation. #BugBounty #EthicalHacking #haklistgen #OSINT #InfoSec #CyberSecurity.
osintteam.blog
Your ex didn’t value you — but haklistgen will. While they were busy ignoring your texts, this tool turns your dump of messy URLs into…
0
0
0
Tired of missing hidden endpoints in JS during recon?.I just dropped a blog on using GoLinkFinder — a blazing-fast GoLang tool for extracting URLs like a pro. Bug bounty hunters, this one’s for you. #BugBounty #OSINT #EthicalHacking #Recon #golang .
osintteam.blog
GoLinkFinder is a fast OSINT security tool written in GoLang that extracts hidden URLs from HTML and JavaScript — perfect for bug bounty…
0
0
0
My latest research: 184,000 Ray AI Dashboards found online — many with no authentication. #CyberSecurity #AI #RayDashboard #CVE2023_48022 #CloudSecurity #infosec #BugBounty.
systemweakness.com
Meet Ray: The AI Cluster Workhorse
0
0
0
Found an exposed Elasticsearch instance using Censys!.✔ No authentication.✔ Full read/write access.✔ Critical data at risk. #BugBounty #CyberSecurity #Censys #EthicalHacking #Elasticsearch #DataBreach #InfoSec.
osintteam.blog
During a bug bounty reconnaissance using Censys search, I discovered an exposed Elasticsearch instance belonging to a live program with no…
0
0
1
Hidden Website for Subdomain Enumeration.Tried found domains, subdomains, and IPs in seconds. A must-use for reconnaissance and bug bounty. #CyberSecurity #BugBounty #OSINT #SubdomainEnumeration #PenetrationTesting #infosec .
0
0
0
A new video is coming .#Elasticsearch #Cybersecurity #BugBounty #SecurityResearch #EthicalHacking #PenetrationTesting #ThreatIntelligence #InfoSec .
0
0
0
RT @bountywriteups: Subdomain Bruteforcing Using Burp Suite: A Step-by-Step Guide for Ethical Hackers. #bugbounty #….
0
4
0