poprbx Profile
poprbx

@pop_rbx

Followers
27
Following
211
Media
0
Statuses
17

Joined March 2021
Don't wanna be here? Send us removal request.
@ipSlav
Petar Jr. Pranic
2 years
My first research and tool are finally out. If you want to deep dive into some CLR internals and understand how we can abuse it to blend-in within its own logic go check it out. Hope you'll enjoy the read. https://t.co/FegHkegEE9
Tweet card summary image
ipslav.github.io
Abuse the CLR memory (un)safety
9
72
186
@0xor0ne
0xor0ne
3 years
2
126
318
@ITSecurityguard
Patrik Grobshäuser
4 years
This is your yearly reminder that ALL Udemy Bug Bounty courses are a waste of money. The content you need is out there, completely for free. Don't believe me? Here is a list of the best Bug Bounty Ressources out there 🧵👇 #bugbountytips #BugBounty
101
508
2K
@ippsec
ippsec
4 years
Ever come across a file running on a Linux box that was deleted from the disk? Did you know you can likely use DD to recover the file without any non-standard tools?
26
587
3K
@am0nsec
Paul L.
5 years
This book has been published in 2005 and is still one of the best references out there in terms of computer virology. Developing advanced malware and viruses will always be an art.
9
84
531
@rootxyash
Yash Devkate 🇮🇳
4 years
A thread all about XSS Tips. Bookmark & Retweet <3
8
327
664
@aufzayed
ᴀʙᴅᴇʟʀʜᴍᴀɴ ᴢᴀʏᴇᴅ
4 years
Bug Bounty Hunting Search Engine - Made by @payloadartist 🔗 https://t.co/FEjf3YlJNY #bugbounty #cybersecurity #infosec
1
172
388
@zapstiko
𝐑𝐀𝐢𝐡𝐚𝐧 ✪
4 years
Firstly make a Full port scanning then run it @pdnuclei @0xmahmoudJo0 command: rustscan -a 'hosts.txt' -r 1-65535 | grep Open | tee open_ports.txt | sed 's/Open //' | httpx -silent | nuclei -t ~/nuclei-templates/ #bugbountytips #BugBounty #CyberSecurity
7
163
359
@0xmahmoudJo0
Mahmoud Youssef
4 years
If you collected a bunch of alive IP addresses. Don't run @pdnuclei directly on it, Firstly make a Full port scanning then run it, maybe you find some juice stuff on other ports like what I got XD !! The command: https://t.co/cB2zpzZez2 #bugbountytips #BugBounty #CyberSecurity
14
325
879
Blue team tool drop: #log4j internal honeypot for active defense. Alerts you by sending a message to your Slack, Teams, or Mattermost channel if it receives a GET or POST with suspicious ${ in headers or form fields. Use to detect scanning from the inside:
Tweet card summary image
github.com
Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228 - BinaryDefense/log4j-honeypot-flask
4
156
392
@fabio_viggiani
Fabio Viggiani
4 years
I am going to use this image so many times
@johndburger
John Burger
4 years
@a_centrist_15 @ErrataRob The little block the arrow is pointing to has a very serious vulnerability that is fairly easy to exploit.
1
2
16
@mcbazza
B:\a.zza
4 years
Red-Teamers: [lazy]People like me use Notepad++ as a note-taking thing. We create a 'new', then never get around to saving them. They get cached here: C:\Users\{username}\AppData\Roaming\Notepad++\backup If you hit a dev/sysadmin, you'll find all kinds of crazy stuff.
29
436
2K
@0xcharlie
Charlie Miller
5 years
Computer hacking advice from superstar @ThatBigRon, compliments of @nudehaberdasher.
6
43
173