ZaricNenad_ Profile Banner
Nenad Zaric Profile
Nenad Zaric

@ZaricNenad_

Followers
2K
Following
805
Media
135
Statuses
593

Co-Founder @ https://t.co/IC1O3gNABw

Joined July 2012
Don't wanna be here? Send us removal request.
@ZaricNenad_
Nenad Zaric
2 years
The @trick3st mission was always to create a "Photoshop" for hackers and bug bounty hunters, enabling them to unleash their creativity. Thank you @PhillipWylie, for having me on your podcast and letting me showcase the power of Trickest!. Enjoy 🥳🥳🥳.
3
9
34
@ZaricNenad_
Nenad Zaric
19 days
RT @trick3st: ToolShell coverage has been all over the place. We held off publishing until we could reconcile the discrepancies between th….
0
2
0
@grok
Grok
1 day
Generate videos in just a few seconds. Try Grok Imagine, free for a limited time.
496
457
4K
@ZaricNenad_
Nenad Zaric
19 days
RT @trick3st: Why spend hours building in-house security workflows when you can deploy proven ones instantly?. Trickest's workflow library….
0
2
0
@ZaricNenad_
Nenad Zaric
20 days
RT @trick3st: Modern attack surface management means having your security data at your fingertips. Query, filter, and analyze your externa….
0
1
0
@ZaricNenad_
Nenad Zaric
2 months
RT @trick3st: Our top Vulnerability Scanning tools:. - ZAP: Web app vulnerabilities.- Nuclei: Precise scanning, no false positives.- Sqlmap….
0
9
0
@ZaricNenad_
Nenad Zaric
4 months
RT @trick3st: Trickest Editor now delivers a complete IDE experience for offensive security teams. With unified command line, advanced fi….
0
3
0
@ZaricNenad_
Nenad Zaric
4 months
RT @trick3st: Full-blown IDE coming soon to Trickest Platform. Stay tuned.
Tweet media one
0
3
0
@ZaricNenad_
Nenad Zaric
5 months
RT @trick3st:
Tweet media one
0
1
0
@ZaricNenad_
Nenad Zaric
5 months
RT @trick3st: Managing an evolving attack surface requires visibility, automation, and customizability. Our latest video demonstrates how T….
0
3
0
@ZaricNenad_
Nenad Zaric
5 months
RT @trick3st: Uncover deeply nested subdomains within your infrastructure using our Recursive DNS Subdomain Discovery module. By emulating….
0
3
0
@ZaricNenad_
Nenad Zaric
5 months
RT @trick3st: Security infrastructure changes aren't just technical updates—they're your defense timeline. Track them. Learn from them. Wit….
0
3
0
@ZaricNenad_
Nenad Zaric
6 months
RT @trick3st: "The offensive security world is broken. We spend countless hours installing tools, managing infrastructure, and wrestling wi….
0
3
0
@ZaricNenad_
Nenad Zaric
6 months
RT @trick3st: Stuck in the classic “build vs. buy” dilemma for your cybersecurity automation projects? . Our latest blog reveals the hidden….
0
3
0
@ZaricNenad_
Nenad Zaric
6 months
RT @trick3st: Trickest Modules are built for real security work, fully customizable, and scalable without limits—enabling security teams to….
Tweet card summary image
trickest.com
Automate, customize and scale your offensive security operations using top open-source and professional tools, custom scripts, and pre-built workflows.
0
3
0
@ZaricNenad_
Nenad Zaric
9 months
A lot of unauthenticated admin panels can be found on non-standard HTTP ports.
Tweet media one
1
6
21
@ZaricNenad_
Nenad Zaric
9 months
Single-page applications rely a lot on JS for dynamic processing. 1. Crawl target with 'Discover Paths via Crawling' for javascript sources.2. Feed URLs to 'Analyze JavaScript Code' - pulls endpoints + params.3. Brute-force for hidden paths.4. Run it all through web fuzzer
Tweet media one
0
3
6