OnNetFiT Profile Banner
校长 Profile
校长

@OnNetFiT

Followers
698
Following
616
Media
57
Statuses
519

Web2 Bug Hunter|Red Team|Web3.0 Scientists|21-year-old | 微信公众号:不懂安全的校董 |Bilibili:不懂安全的校长

Reunion District, Dallas
Joined January 2019
Don't wanna be here? Send us removal request.
@OnNetFiT
校长
1 month
10u战神挑战,挑战10u到1000u需要多久! 第一天:被狗庄做局 #web3 #炒币 #币圈 #BTC #USDT #Ethereum #ETH
4
0
1
@OnNetFiT
校长
2 months
昨天测了三个网贷,发现现在还是那么奇葩。总结一下思路: 现在很多网贷都用的云服务但是云安全没做好以及还有aksk的泄漏; 还有很多都是用的供应链的crm系统并且都是通过手机号登陆,但是某些供应链的开发很抽象,遇到了不知道是不是开发留的后门,只要固定这个手机号和固定验证码直接能登录;
0
0
1
@0xharshleen
Harshleen
4 months
Automate asset discovery and data collection with Photon’s modular crawling engine⚡ https://t.co/9awSlJZ5S6
0
47
190
@ri5255
r1ru
5 months
I have released the first half of "Binary Exploitation 101", a beginner-friendly guide to binary exploitation. You can learn from classic buffer overflow to ret2dlresolve through CTF-like challenges. I am working on the second half now. Stay tuned🔥 https://t.co/Oy4P8l4plk
13
310
1K
@OnNetFiT
校长
5 months
I successfully discovered vulnerabilities in MacOS applications through AI analysis. https://t.co/VUbYrIvJv2 #0day #BugBounty #Apple #MACOS
0
0
4
@OnNetFiT
校长
8 months
通过这些方法,可以很轻松的窃取钱包,窃取数据等等!搞web3的要注意别开人脸识别了 https://t.co/EPKF2nDKbz #web3 #web #security #AI #CyberSec #CyberSecurity
0
0
3
@intigriti
Intigriti
9 months
New tool drop by @marcolivermunz! 🛠️ SQLTimer is a simple, blazing-fast tool to scan for time-based SQL injections! 😎 Check it out! https://t.co/TsyL719yCX
8
56
328
@hacker_ralf
HackerRalf
9 months
AdaptixC2 v0.4 is out https://t.co/mL8AAS7w4c * New Linux/MacOS "gopher" agent * TCP/mTLS external listener for "gopher" agent * New internal TCP listener for "beacon" agent * Screenshot storage Changelog: https://t.co/JYbNxekZM6
4
109
451
@NinadMishra5
Ninad Mishra
10 months
Use Burp Suite's match and replace to replace payloads in the request's body, this easily bypasses client-side validation and saves a lot of time while testing #bugbountytips
1
8
55
@c2_matrix
C2 Matrix | #C2Matrix
10 months
Added peeko to #C2Matrix a browser-based XSS C2 for stealthy internal network exploration via infected browser:
Tweet card summary image
github.com
peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser. - b3rito/peeko
3
17
66
@hacker_ralf
HackerRalf
10 months
AdaptixC2 v0.3 is out https://t.co/mL8AAS7w4c New: * Linking Agents (eg SMB) * Sessions Graph * Agent marker * Health checker And more in the changelog: https://t.co/8DEwfxB7YP
3
66
239
@ankit_anubhav
Ankit Anubhav
11 months
Hackers are using Gamma AI to create phishing page redirectors. To make things worse, the URL of these AI assisted webpages is on https://t.co/wRSGUybUIH domain itself, making it challenging for vendors to detect. The phishing makes you solve cloudflare style captcha, and will
3
22
83
@OnNetFiT
校长
11 months
Telegram has a super serious bug, click on the file is hacked https://t.co/4fVCRu9EKa #telegram #web3 @telegram #0day
0
4
19
@intigriti
Intigriti
5 years
Got an XSS? Try to 'upgrade' it to SSRF to get a bigger #BugBounty. Thanks for the #BugBountyTip, @georgeomnet! ❓Never head of ESI Injection before? Check out this @defcon talk: https://t.co/ltXGAuP6AZ #BugBountyTips #HackWithIntigriti
0
138
360
@payloadartist
payloadartist
11 months
🛠️ Rogue - An open source web app vulnerability scanner that uses LLM Agents Cool, isn't it? #infosec #bugbounty #cybersecurity
1
18
63
@adrielsec
elSec
11 months
they don’t fix it and just let it keep spamming duplicates in triage… A MESS!!! payload XSS: /*-/*`/*\`/*%27/*%22/**/(/*%20*/oNcliCk=alert()%20)//%0D%0A%0d%0a//%3C/stYle/%3C/titLe/%3C/teXtarEa/%3C/scRipt/--!%3E\x3csVg/%3CsVg/oNloAd=alert()//%3E\x3e #bugbountytips #bugbounty
2
53
310
@intigriti
Intigriti
11 months
Top places to find PDF generators potentially vulnerable to SSRF: 🤑 • Reports (for example, analytics reports or any other report types) • Receipts & invoices (especially in e-commerce targets) • Account archives/statistics • Bank and account balance statements •
1
23
150
@rad9800
Rad
11 months
I've uploaded recordings of two talks I gave in OnlyMalware last year 🧐 Getting Started with Windows Malware Development https://t.co/9khXmyk4LH Random Malware Techniques - Static evasion - ETW TI evasion - Usermode evasion (DLL callbacks/VEH/HWBPs) https://t.co/H6mn189F1K
1
79
329
@OnNetFiT
校长
11 months
Manus has a serious overreach vulnerability, and you can use Manus even if you don't have an invite code #Manus #AI
9
1
9