Darkandroider ๐ค๐ป๐ป๐ค๐ป
@darkandroider
Followers
569
Following
1K
Media
39
Statuses
5K
Father by day, Bug Bounty hunter at night. Find something that keeps you awake. Member of SpInquisitors team. Bug Bounty ES administrator: https://t.co/yQvBgnP0hs
Joined April 2016
Ha sido todo un placer acudir como ponente a @morteruelocon para hablar sobre "Android Hacking". Muchas gracias a la organizaciรณn por el trato recibido y a todos los asistentes que no se lo quisieron perder. ๐ป๐ฑ๐ฃ #MorterueloCon2k25 #Hacking #Android
0
1
3
BetterSuccessor: Still abusing dMSA for Privilege Escalation (BadSuccessor after patch) https://t.co/tnLayhWepj
1
33
188
โ๏ธ WordPress Pentesting Complete Guide for Beginners (2025) Guide: https://t.co/eHKSXh9K3G Author: @GotoStationX
3
129
676
My gift for Thanksgiving ๐ I wrote for you the blog post I always wanted to read! Happy holiday!๐ฆ PLEASE READ IT!!! https://t.co/Pr3P3jOh8s
wiz.io
Attackers abuse OAuth flows like device code phishing and ROPC to bypass MFA and gain persistence in Azure. Here's how to detect them with Entra ID logs.
9
77
207
๐จ If youโve never built a Burp Suite Extension from scratch before, this video is for you. Tutorial: https://t.co/PyXUv5lqwU
#infosec
1
32
191
Bug Bounty HuntingโโโComplete Guide (Part-151) https://t.co/lfxgSTGmgA
#bugbounty #bugbountytips #bugbountytip
0
3
12
The stream with Alejandro Vazquez is now live on YouTube: https://t.co/bDq1cyK5dm Tomorrow, I will randomly select and respond to a random YouTube comment for the winner of an Off By One Security T-Shirt!
0
16
64
Awesome work by: @CyberCakeX !! ๐ - Complete System Hardening - โ Security Posture Analysis - โ All-in-One Toolkit - โ Built-in Intune support for Scalability - โ Beautiful Modern UI - โ CLI support https://t.co/o2F1Ub8Nin
github.com
Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Pers...
4
62
322
Exploiting Ghost SPNs and Kerberos Reflection for SMB Server Privilege Elevation, by @decoder_it
https://t.co/Wk2qAz13wE
semperis.com
Understanding how attackers use Ghost Service Principal Names to initiate authentication reflection can help you avoid similar vulnerabilities.
0
32
101
๐ผ All about Virtual Host's in Bug Bounty โ Uncover Hidden Web Assets Blog: https://t.co/VQ2K5tQYRS Author: Nairuz Abulhul (@freeCodeCamp)
1
56
306
๐ฒ Introduction to Android Pentesting for Beginners Blog: https://t.co/DlO458Q8H2
#pentesting #infosec
0
59
230
Youโll know how to build an Android #BugBounty lab if you read the first article in our Android hacking series ๐ฑ Part two has now landed: an in-depth guide to performing recon on your mobile targets! ๐ https://t.co/g8rqa9bkHz
yeswehack.com
An in-depth Bug Bounty guide to performing reconnaissance on Android apps โ from extracting APKs to mapping endpoints, secrets and vulnerable components.
3
24
115
As a bonus we added the JS Analysis section from TBHM Core to the expansion too, in case you didn't have it yet! It includes advanced techniques for parsing secrets, endpoints, and useful data for bug hunting! https://t.co/8VTCHCDLhM
2
26
192
GitHub - Hackmanit/Web-Cache-Vulnerability-Scanner: Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH ( https://t.co/SLXFUqG1EB).
github.com
Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/). - Hackmanit/Web-Cache-Vulnerability-Scanner
1
53
222
We've written an article that covers HTTP request smuggling! And the best part is.... You now have a complete, ultimate guide for each technique, with explanations & clear examples ๐คฏ Everything you need to start finding these high-impact bugs is here ๐ https://t.co/k2waincerJ
yeswehack.com
A practical guide to a rejuvenated field of security research that starts with the basics and moves to advanced detection, exploitation and mitigation techniques.
1
26
110
lot of cool techniques for account takeover in single article https://t.co/3lTeQOXTSD
#bugbounty #bugbountytips
infosecwriteups.com
Hi everybody, our story today will be about how I was able to get a Full account takeover on HubSpot Public Bug Bounty Program at Bugcrowdโฆ
2
32
150
BloodHound: Six Degrees of Domain Admin GitHub: https://t.co/Vm0bKe4X9U Docs: https://t.co/V96yaCNQ4z
0
29
177
@xssdoctor Did an amazing job on this course, it bridges the gap from "I kinda know what we are talking about to I can exploit what we are talking about " https://t.co/NzJ83bcEnA
payhip.com
0
5
37