Explore tweets tagged as #Log4Shell
@blackstormsecbr
Blackstorm Security
9 hours
Exploiting Log4Shell (Log4J) in 2025:. #log4J #informationsecurity #infosec #vulnerability #java
Tweet media one
0
3
0
@_aircorridor
Olexander
18 hours
Remember Log4Shell? That wasn't just a Java bug!. Millions of apps still vulnerable to payload injection through serialized data. @three_cube
Tweet media one
0
3
11
@intigriti
Intigriti
1 month
πŸ’‘ Tip!. Injecting Log4Shell payloads is also possible in PDF files! eelyvy has a dedicated GitHub repository showing exactly how to craft your PDF payload file! 😎. πŸ”—
Tweet media one
2
98
412
@intigriti
Intigriti
20 days
Exploiting Log4Shell in 2025 (complete guide) 😎. πŸ§΅πŸ‘‡
Tweet media one
2
30
148
@nav1n0x
N$
1 month
Guys, whoever is using my Log4Shell/Log4J payload from Pastebin, make sure to replace my token ( with your own. I don’t mind though. πŸ˜…
Tweet media one
8
13
196
@intigriti
Intigriti
1 month
Easiest way to test for Log4Shell (even in 2025) 🀠 . Example πŸ‘‡
Tweet media one
1
20
166
@intigriti
Intigriti
26 days
Deconstructing the Log4Shell JNDI payload πŸ‘‡
Tweet media one
1
6
37
@intigriti
Intigriti
1 month
Latest Bug Bytes is live! πŸš€. This month's issue is as usual packed with bug bounty tips:.βœ… Exploiting Log4Shell (Log4J) in 2025.βœ… An indispensable GitHub recon tool (not the one you have in mind) .βœ… Advanced WAF evasion techniques. & much more! 😎.
Tweet media one
2
9
65
@intigriti
Intigriti
2 months
For some bug bounty hunters, the Log4Shell hunt never truly ended. 😈. While most moved on, some researchers know this vulnerability is still hiding in production systems across the web, even today πŸ‘€. We just published a comprehensive guide showing exactly how to uncover
Tweet media one
2
27
168
@intigriti
Intigriti
1 month
Breaking down how the Log4Shell attack works πŸ‘‡
Tweet media one
1
3
6
@tbbhunter
The Bug Bounty Hunter
4 days
Log4Shell (Log4J): Advanced Exploitation Guide. @intigriti. #bugbounty.
0
9
49
@pyn3rd
pyn3rd
1 year
After reading about the recent xz backdoor event, it spontaneously brought back memories of the Log4shell vulnerability. In 2021, I delved into the archived issues of the Log4J2 project, where I uncovered a striking issue related to the JNDI appender with the patch code attached
Tweet media one
Tweet media two
1
15
62
@DI0256
Di
20 days
Think your app is safe? Think again. Insecure deserialization is an OWASP Top-10 web riskβ€”remember Log4Shell? .Millions of applications are still exposed. @three_cube .@_aircorridor
Tweet media one
0
4
5
@1336_0ff_by_0ne
1336_0ff_by_0ne
8 months
I'm trying something different. 3 inch Velcro patches for Crowdstruck, Solorigate, MOVEit Transfer and Log4shell. In recognition of analysts and responders who handled these major incidents, working nights, weekends and holidays. I think of them as merit badges.
Tweet media one
3
7
56
@JAVAPROmagazin
JAVAPRO
17 days
Millions lost. Servers hijacked. All because of overlooked code patterns, you might still have today. @vilojona reveals the unseen traps. Are you truly protected against SQLi, #Log4Shell & deserialization hacks?. Decode it here: #DevSecOps #SQLInjection
Tweet media one
0
1
1
@JAVAPROmagazin
JAVAPRO
4 months
Think your code is safe? So did #Tesla. 🚨 @vilojona uncovers the top attacks hiding in your code right now - and how a single mistake can cost you everything. Can you spot the flaw before hackers do?. Find out: #Java #DevSecOps #Log4Shell #SQLInjection
Tweet media one
0
3
3
@TheGodOfficiall
TheGOd
8 days
How to exploit this πŸ€”πŸ€” LOG4SHELL .any tips. #hackerone #BugBounty #bugbountytips #intigriti #bugcrowd #infosec
Tweet media one
2
0
35
@1336_0ff_by_0ne
1336_0ff_by_0ne
6 months
I worked with a local silkscreen artist to make these patches for Crowdstruck, MOVEit Transfer and Log4shell. In recognition of analysts and responders who handled these major incidents, working nights, weekends and holidays. I think of them as merit badges. Ready to be pinned or
Tweet media one
Tweet media two
Tweet media three
0
4
15
@yeswehack
YesWeHack β ΅
17 days
Dodge WAFs and detection mechanisms by mastering payload obfuscation πŸ₯·. Level up your #BugBounty skills with encoding, variable expression, array parameter and shell-environment techniques, plus a look at how Log4Shell evaded defences πŸ‘‡.
1
22
92