justakazh Profile Banner
Justakazh Profile
Justakazh

@justakazh

Followers
244
Following
45
Media
15
Statuses
133

Penetration Tester | Trainer | CEH | E-JPT

Yogyakarta, Indonesia
Joined February 2018
Don't wanna be here? Send us removal request.
@justakazh
Justakazh
4 months
π‚πŽπ‹πˆ (π‚π¨π¦π¦πšπ§π 𝐎𝐫𝐜𝐑𝐞𝐬𝐭𝐫𝐚𝐭𝐞𝐝 & π‹π¨π π’πœ 𝐈𝐧𝐭𝐞𝐫𝐟𝐚𝐜𝐞) - a modern GUI for EWE (Execution Workflow Engine), Visualize & run tools like subfinder β†’ httpx β†’ nuclei https://t.co/FYPWcu4Q86 #bugbounty #bugbountytool #bugbountytips #oneliner #pentesting
5
0
1
@justakazh
Justakazh
4 months
EWE (Execution Workflow Engine) - Run recon tasks parallel, fast, structured with JSON/YAML, dynamic placeholders, real-time logging, interactive CLI, silent mode, etc. Perfect for bug bounty one-liners https://t.co/2RIz32u3cT #bugbounty #bugbountytool #bugbountytips
1
0
10
@justakazh
Justakazh
2 years
SiCat - the useful exploit finder This tool is crafted using Python and fetches exploit sources from exploit-db, exploitalert, packetstormsecurity, nvd, and Metasploit modules. Repository : https://t.co/L90u4Z8H2p #exploit #recon #penetrationtesting #bugbountytips
1
0
3
@justakazh
Justakazh
2 years
How To Become A Penetration Tester. This story already contain Introduction about pentesting and phases, Tips for improving your skills, and references. I hope you can enjoy it ^_^ https://t.co/nIDQaTpULC #pentesting #infosec #ethicalhacking
0
0
2
@justakazh
Justakazh
3 years
LazyWare - A Simple Rasomware Generator. Disclaimer : This tool is for educational purposes only. I am not responsible for your harmful actions! https://t.co/ax2gtT1nEY #pentesting #ransomware #infosec #cybersecurity #infosec
0
1
1
@gregxsunday
Bug Bounty Reports Explained
3 years
Default credentials cheat sheet with 3445 products by @ih3bski #BBRENewsletter38 https://t.co/Jv46gVwIUV
6
53
197
@Limbo0x01
MrLimbo
3 years
I found a Dark-Web service where it gives you hundreds or thousands of valid accounts on any Domain literally or platform like online games! I CAN'T imagine the amount of damage this could cause Can you? I tried H1/BC companies accounts and it worked!! #bugbountytip #redteaming
47
109
662
@javarevisited
Javarevisited
3 years
5 Best Linux courses for Beginners in 2022 1. Linux for Beginners - https://t.co/SxWV1ckr45 2. Linux Basics - https://t.co/rg5u5y0zKQ 3. Learn Linux in 5 Days - https://t.co/4oyEsPmR5a 4. Linux Bootcamp - https://t.co/FlP5WKqM8O 5. Linux Sysadmin - https://t.co/keCR83ivsn
36
689
2K
@mahfujwhh
𝔸π•ͺπ•šπ•£π•’π•— β„π•’π•™π•žπ•’π•Ÿ
3 years
Awesome writeup. Reflected xss find in robots.txt file. https://t.co/Tjd9jTD6Xr
Tweet card summary image
c0nqr0r.medium.com
Hello mates, Back again with new writeup, I hope it will be useful for you InshallahΒ , In this write-up, I’m gonna share with you how I…
1
50
122
@ReconOne_bk
ReconOne
3 years
GitHub Dorks in Manual mode - Part 3 Use GitHub Search to find Interesting Files - 3 of 6 πŸ‘‡ πŸ’£ #recontips #bugbountytips #bugbounty #AttackSurfaceManagement #github #dorks #OSINT #recon #cybersecurity
2
31
94
@thatstraw
TRΓ„W🀟
4 years
Best searchπŸ”engines for Pentesters and Security Professionals. β†’ Shodan .io β†’ Censys .io β†’ Hunter .io β†’ ZoomEye .org β†’ WiGLE .net β†’ PublicWWW .com β†’ Pulsedive .com β†’ intelx .io β†’ reposify .com β†’ viz. greynoise .io Which one is your favourite?πŸ˜‡
49
754
3K
@CristiVlad25
πŸ‡·πŸ‡΄ cristi
4 years
SQLi + XSS + SSTI: '"><svg/onload=prompt(5);>{{7*7}} (another great one by @Six2dez1)
8
82
327
@0x2nac0nda
Abdalla Abdelrhman
3 years
Read local file : <script> x=new XMLHttpRequest; x.onload=function(){document.write(btoa(this.responseText))}; https://t.co/bfymtAiLmk("GET","file:///etc/passwd");x.send(); </script> #bugbountytips #bugbounty
7
54
228
@momika233
张惠倩
3 years
OS Command Injection in Openssl CVE-2022-1292
12
202
720
@reverseame
reverseame
3 years
CVE-2022-28219: Unauthenticated XXE to RCE and Domain Compromise in ManageEngine ADAudit Plus
0
61
135
@stealthmole_int
Fusion Intelligence Center @ StealthMole
3 years
[August 2022] Stealer Malware Intelligence Report - Italy 167,833 of credentials are leaked from Italian users infected with Stealer malware and are distributed on Dark and Deep Web.
0
9
24