
Black Hat Ethical Hacking
@secur1ty1samyth
Followers
9K
Following
2K
Media
1K
Statuses
3K
Offensive Security, Red Teaming
World Wide Web
Joined August 2016
For individuals interested in embarking on the Bug Bounty Hunting journey, this playlist provides valuable insights into different methodologies. Playlist: #bugbountytips #bugbounty #infosec #hacking
3
2
14
Features:.Dynamic wordlist fetch — Updates paths from GitHub to avoid local bloat.Multithreaded scan — Fast concurrent curl-based enumeration.Redirect/WAF bypass — Follows redirects and shows valid 200 OK only. GitHub Repo: #infosec #cybersecurity.
github.com
AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effectively bypassing WAFs. - blackhatethicalhacking/AdminPBuster
0
0
3
New to Kali Linux? Or are you setting up a fresh install? (Either way, this is for you.). Here’s a guide on the 10 must-do steps after installation. 👉 Read it here: #kalilinux #hacking #infosec #informationsecurity #cybersecurity
0
0
4
2/ Essentially, this one-liner has been adapted to incorporate the latest features introduced by the @pdnuclei team. It enables the optimization of scan quality based on preferences, speed, and specific program rules, whether it involves penetration testing or bug bounty hunting.
1
0
0
1/ One-Liner for Advanced Bulk URL-Targeted Scanning in Bug Bounty Hunting and Penetration Testing with #Nuclei. Nuclei has expanded and enhanced its features. Are you keeping up with these updates, or are you relying solely on the default scans?
1
0
3
BLACK FRIDAY SALE 🚨 - Up to 80% OFF!. Courses Available: .-Offensive Security and Ethical Hacking Course .-The Bug Bounty Hunting Course. Sale ends 04/12. Learn more about each course: #blackfriday #courses #hacking #informationsecurity #cybersecurity
1
0
0
Scammers can easily place fake QR codes over legitimate ones, tricking users into entering sensitive information or making unauthorized payments. It is advisable to always double-check the URL after scanning; if it appears suspicious, do not proceed.
Be careful everyone, this happened in greystones. The lady's daughter was scammed out of €1000, using a QR code that she scanned to pay for parking.
0
0
1
Offensive Security Tool: TerminatorZ. TerminatorZ is developed by @SaintDruG1337 from BHEH and is an efficient web security tool designed to scan for potential vulnerabilities in your web apps. GitHub Repo:
1
0
5
In this article, we will discuss the security risks associated with Local File Inclusion (LFI) vulnerabilities in web applications and demonstrate methods for exploiting these vulnerabilities. Read the post: . #hacking #infosec #informationsecurity
0
1
5
The Bug Bounty Hunting Course Promo!.This course will guide you through the path of achieving the #Hacking mindset using manual techniques to level up your success as a #BugBounty Hunter. FROM €147 / NOW €75 - VALID UNTIL 17/07/2024 . Sign up now:
1
0
6
Nucleimonst3r is written by @SaintDruG1337. It's a vulnerability scanner that can help #BugBounty Hunters find low-hanging fruit vulnerabilities for known CVEs and exploits. GitHub Repo:
github.com
Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs and exploits but also gather all the technology running behi...
0
0
4