
Marcos
@artsweb
Followers
2K
Following
2K
Media
229
Statuses
19K
Tratando de aprender en todo momento. Apasionado de #infosec , #socialmedia y #fotografía.
Joined May 2009
RT @garethheyes: We've just released Shadow Repeater, for AI-enhanced manual testing. Simply use Burp Repeater as you normally would, and b….
0
50
0
Read “LLM Hacking: Prompt Injection Techniques“ by Austin Stubbs on Medium:
medium.com
Large Language Models are the talk all over tech since chatGPT. And with this newfound attention, comes newfound experimentation. That…
0
0
1
Read “Advance Prompt Injection for LLM Pentesting“ by Planet Strike on Medium:
medium.com
Prompt Injection in LLM penetration testing focuses on exploiting vulnerabilities within language models by manipulating input prompts…
0
0
0
Read “Race Condition Vulnerabilities: A Hands-On Primer — Part 1“ by Hashar Mujahid on Medium:
infosecwriteups.com
Hi Everyone My name is Hashar Mujahid. I am a cyber security student and full-time freelancer. Today we will look at a topic that is…
0
0
0
Read “Burp Suite Extension Development“ by Ismail Tasdelen on Medium:
infosecwriteups.com
In this article, I will be talking about how you can develop a extension for the popular Web Application Security tool Burp Suite. A Burp…
0
0
0
Read “The Ultimate Guide for BloodHound Community Edition (BHCE)“ by Chris Haller on Medium:
m4lwhere.medium.com
I’ve run into many interested hackers who want to learn how to use BloodHound, but struggle to get started. Here’s how to be effective!
0
0
0
Read “🖥️️ RCE to Shell Techniques 🐚“ by Robert Scocca on Medium:
robertscocca.medium.com
You have Remote Code Execution on a vulnerable machine, but how do you get a shell?
0
0
0
RT @intigriti: Want to dive deeper into file upload vulnerabilities? 🤑 . Check out our detailed article! 👇.
0
3
0
“site:intext:"error" | intext:"warning" | intext:"not found" | intext:"exception"“. Read “20 Essential Google Dorking Queries to find vulnerable targets“ by Facundo Fernandez on Medium:
1
0
2
Read “OSCP+: Step-by-Step Guide to Success“ by Astik Rawat on Medium:
astikrawat.medium.com
Hi all, I am back with everyone’s favorite certificate and most requested certificate — Offensive Security Certified Professional+ (OSCP+)…
0
0
0
Read “Importance of burp history analysis to bypass 403“ by Vuk Ivanovic on Medium:
infosecwriteups.com
or, how I learned that specific Referer header can make all the difference
0
0
1
Read “Race condition to bypass email verify, part #2“ by Sirat Sami (analyz3r) on Medium:
siratsami71.medium.com
The fantasy way to hack your crush
0
0
1
Read “Attacktive Directory — TryHackMe Writup“ by вιѕнαℓυ on Medium:
infosecwriteups.com
Target IP: 10.10.186.106
0
0
0
Read “Exposed Git Directory P1 Bug“ by AbhirupKonwar on Medium:
systemweakness.com
Story of P1 Bug that turned out to be ?
0
0
0
RT @albinowax: 24 hours remaining until voting closes on the Top 10 (new) Web Hacking Techniques of 2024! If you haven't already voted now'….
portswigger.net
Welcome to the community vote for the Top 10 Web Hacking Techniques of 2024.
0
16
0
RT @PinguinoDeMario: Como utilizar masscan para hacer escaneos de puertos masivos en una red entera. #hackingetico #kalilinux #pentesting #….
0
70
0
RT @gregxsunday: Top Ten (New) Web Hacking Techniques of 2024 voting open by @PortSwiggerRes.#BBRENewsletter87.
0
6
0