
W4A1TH
@Samrat1337
Followers
60
Following
170
Media
4
Statuses
34
A cybersecurity and AI trainer and enthusiast.
Joined June 2023
Agi is real, and it is here to say hi to human level intelligence in AI. It won't long enough to surpass this level, too. #Ai #OpenAi #SamAltman #ArtificialInteligence #AGI.
0
0
0
1)Deep-Subdomains-Enumeration-Methodology.2)EVM Puzzles ✅.3)Bug Bounty Resources.4)The Mind Behind Nuclei, Demo with Sandeep Singh.#zeroday.#vulnerability .#bugbounty #ethicalhacker.
shubhamrooter.medium.com
Mastering the art of subdomain enumeration is a crucial skill for those seeking to unlock the full potential of web architecture. By…
0
0
1
How Hackers can exploit Caching x Race-Conditions for followers count manipulation on Twitter.#CyberSecurity.#BugBounty.
infosecwriteups.com
- 7h3h4ckv157
0
0
0
Unveiling Smart Contract Vulnerabilities: Challenges and Best Practices for Bug Bounty Hunters. #bugbountytips.#CyberSecurity.#bugbounty.
blog.bugzero.io
Smart contracts have emerged as a revolutionary technology within the realm of blockchain applications.
0
0
0
RT @raihankhan_rk: Just discovered about @pynecone_io and it’s insane! Totally blew me off 🤯. It’s good to see how Python Development is ra….
0
2
0
RT @driscollis: #Python Pop Quiz 🐍❓. What is the output when you run this code?. A) 8 and then an exception is raised.B) NameError.C) TypeE….
0
28
0
RT @hakluke: Create a list of domain names from a CIDR block with prips, hakrevdns and dsieve!. 1️⃣ Print IPs - @ipinfoio prips 🔗 https://t….
0
116
0
RT @davidbombal: Take one step at a time. #DailyMotivation #inspiration #motivation #bestadvice #lifelessons #changeyourmindset
https://t.….
0
16
0
RT @pdnuclei: Nuclei supports markdown export of valid findings with -markdown-export flag! 📇. ⚛️ Include requests/responses in the markdow….
0
17
0
Phoenix Challenges — Stack Five (Custom Shellcode).#bug #bugs #bugbounty #bugbountytip #bugbountytips #hacking #hacker #ethicalhacking #ethicalhacker #ethicalhackers #cybersecuritytips.
0
0
0
0-Day Vulnerability in MOVEit Transfer Exploited for Data Theft.#zeroday.#vulnerability .#bugbounty.
cloud.google.com
0
0
0
RT @SecurityWeek: Idaho Hospitals Working to Resume Full Operations After Cyberattack.
securityweek.com
Two eastern Idaho hospitals and their clinics are working to resume full operations after a cyberattack on their computer systems.
0
7
0
A Comprehensive Guide to OverTheWire Bandit Levels 0–5.#cybersecurity #ceh.
infosecwriteups.com
Unlock the Secrets of OverTheWire Bandit Levels 0–5: Conquer Challenges and Level Up Your Cybersecurity Skills
0
0
0