secur1ty1samyth Profile Banner
Black Hat Ethical Hacking Profile
Black Hat Ethical Hacking

@secur1ty1samyth

Followers
9K
Following
2K
Media
1K
Statuses
3K

Offensive Security, Red Teaming

World Wide Web
Joined August 2016
Don't wanna be here? Send us removal request.
@secur1ty1samyth
Black Hat Ethical Hacking
2 years
For individuals interested in embarking on the Bug Bounty Hunting journey, this playlist provides valuable insights into different methodologies. Playlist: #bugbountytips #bugbounty #infosec #hacking
Tweet media one
3
2
14
@secur1ty1samyth
Black Hat Ethical Hacking
2 months
Features:.Dynamic wordlist fetch — Updates paths from GitHub to avoid local bloat.Multithreaded scan — Fast concurrent curl-based enumeration.Redirect/WAF bypass — Follows redirects and shows valid 200 OK only. GitHub Repo: #infosec #cybersecurity.
Tweet card summary image
github.com
AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effectively bypassing WAFs. - blackhatethicalhacking/AdminPBuster
0
0
3
@secur1ty1samyth
Black Hat Ethical Hacking
2 months
AdminPBuster is built to uncover hidden admin panels on web apps using intelligent brute-forcing techniques. The idea for this tool was inspired by the limitations of other tools that no longer function as intended, due to new security measures affecting how curl sends requests.
1
0
6
@secur1ty1samyth
Black Hat Ethical Hacking
5 months
Take a sip and hack the planet—legally, of course. ➡️Grab your piece: . Hack with style, and showcase your dedication to hacker culture with gear that is as dynamic and resilient as you are. ⁠⁠⁠⁠. #merch #swag
1
0
3
@secur1ty1samyth
Black Hat Ethical Hacking
7 months
New to Kali Linux? Or are you setting up a fresh install? (Either way, this is for you.). Here’s a guide on the 10 must-do steps after installation. 👉 Read it here: #kalilinux #hacking #infosec #informationsecurity #cybersecurity
Tweet media one
0
0
4
@secur1ty1samyth
Black Hat Ethical Hacking
7 months
8/. ➡️STEP 6.JSON export for better reporting:. -json-export nuclei_results.json (Exports the results in JSON format for easy integration with other tools.). Additional Feature: -stats (Monitors the scan progress with real-time statistics.).
0
0
0
@secur1ty1samyth
Black Hat Ethical Hacking
7 months
7/. ➡️STEP 4.Fuzzing implementation:. -dast (Enables dynamic application security testing and fuzzing capabilities.). ➡️STEP 5.Scope control techniques:. -dr (Disables redirects to maintain scope control.).
1
0
0
@secur1ty1samyth
Black Hat Ethical Hacking
7 months
6/. ➡️ STEP 2.Authenticated scanning setup:.-sf /root/authentication.txt -ps. Loads credentials & prefetches secrets for authenticated scanning. ➡️ STEP 3.Rate-limiting optimization:.-rl 30. Sets the rate limit to 30 requests to stay within program constraints.
1
0
0
@secur1ty1samyth
Black Hat Ethical Hacking
7 months
5/ Here’s the breakdown 👇. ➡️ STEP 1.Bulk URL scanning with custom templates:.-list urls.txt -t /root/nuclei-templates/http /root/nuclei-templates/cves. Reads multiple URLs from a file and applies specific templates for scanning.
1
0
0
@secur1ty1samyth
Black Hat Ethical Hacking
7 months
4/ This enhances visualizing the results, refining the process of issue creation, testing for false positives, and attempting to exploit discovered vulnerabilities instead of merely documenting them.
1
0
0
@secur1ty1samyth
Black Hat Ethical Hacking
7 months
3/ It facilitates scanning multiple URLs simultaneously instead of processing them individually. In addition, it allows for exporting all results in JSON format, which can be easily imported into the platform of your choice.
1
0
0
@secur1ty1samyth
Black Hat Ethical Hacking
7 months
2/ Essentially, this one-liner has been adapted to incorporate the latest features introduced by the @pdnuclei team. It enables the optimization of scan quality based on preferences, speed, and specific program rules, whether it involves penetration testing or bug bounty hunting.
1
0
0
@secur1ty1samyth
Black Hat Ethical Hacking
7 months
1/ One-Liner for Advanced Bulk URL-Targeted Scanning in Bug Bounty Hunting and Penetration Testing with #Nuclei. Nuclei has expanded and enhanced its features. Are you keeping up with these updates, or are you relying solely on the default scans?
1
0
3
@secur1ty1samyth
Black Hat Ethical Hacking
8 months
BLACK FRIDAY SALE 🚨 - Up to 80% OFF!. Courses Available: .-Offensive Security and Ethical Hacking Course .-The Bug Bounty Hunting Course. Sale ends 04/12. Learn more about each course: #blackfriday #courses #hacking #informationsecurity #cybersecurity
1
0
0
@secur1ty1samyth
Black Hat Ethical Hacking
9 months
Scammers can easily place fake QR codes over legitimate ones, tricking users into entering sensitive information or making unauthorized payments. It is advisable to always double-check the URL after scanning; if it appears suspicious, do not proceed.
@lozzylozboz
lozzyloz
9 months
Be careful everyone, this happened in greystones. The lady's daughter was scammed out of €1000, using a QR code that she scanned to pay for parking.
0
0
1
@secur1ty1samyth
Black Hat Ethical Hacking
11 months
🟢New Version 2.0 Released! This update includes 8 NEW Proofs of Concept (POCs), bringing the total to 24 POCs, along with several other enhancements.
0
0
0
@secur1ty1samyth
Black Hat Ethical Hacking
11 months
It uses a combination of advanced techniques and popular tools like 'waybackurls' and 'curl', to perform passive and quick scans, providing a rapid overview of potential issues.
1
0
2
@secur1ty1samyth
Black Hat Ethical Hacking
11 months
Offensive Security Tool: TerminatorZ. TerminatorZ is developed by @SaintDruG1337 from BHEH and is an efficient web security tool designed to scan for potential vulnerabilities in your web apps. GitHub Repo:
1
0
5
@secur1ty1samyth
Black Hat Ethical Hacking
1 year
In this article, we will discuss the security risks associated with Local File Inclusion (LFI) vulnerabilities in web applications and demonstrate methods for exploiting these vulnerabilities. Read the post: . #hacking #infosec #informationsecurity
Tweet media one
0
1
5
@secur1ty1samyth
Black Hat Ethical Hacking
1 year
The Bug Bounty Hunting Course Promo!.This course will guide you through the path of achieving the #Hacking mindset using manual techniques to level up your success as a #BugBounty Hunter. FROM €147 / NOW €75 - VALID UNTIL 17/07/2024 . Sign up now:
1
0
6
@secur1ty1samyth
Black Hat Ethical Hacking
1 year
Nucleimonst3r is written by @SaintDruG1337. It's a vulnerability scanner that can help #BugBounty Hunters find low-hanging fruit vulnerabilities for known CVEs and exploits. GitHub Repo:
Tweet card summary image
github.com
Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs and exploits but also gather all the technology running behi...
0
0
4