trick3st Profile Banner
Trickest Profile
Trickest

@trick3st

Followers
11K
Following
1K
Media
419
Statuses
1K

Visualize, operate & scale everything offensive security in one-platform.

Dover, Delaware
Joined May 2020
Don't wanna be here? Send us removal request.
@trick3st
Trickest
18 days
Tools aren't enough. Trickest modules combine multiple techniques into complete workflows. Our admin panel scanner finds exposed admin interfaces across various technology stacks.
Tweet media one
0
0
3
@grok
Grok
14 hours
Generate videos in just a few seconds. Try Grok Imagine, free for a limited time.
187
64
883
@trick3st
Trickest
18 days
ToolShell coverage has been all over the place. We held off publishing until we could reconcile the discrepancies between the original exploit reports, Microsoft’s advisories, public PoCs, and vendor writeups. Appendix breaks down the CVE mixups and variant exploits
Tweet media one
1
2
6
@trick3st
Trickest
18 days
Why spend hours building in-house security workflows when you can deploy proven ones instantly?. Trickest's workflow library lets you copy and run comprehensive attack chains on your targets with just a few clicks. From web server discovery to credential hunting - battle-tested
Tweet media one
0
2
2
@trick3st
Trickest
19 days
Modern attack surface management means having your security data at your fingertips. Query, filter, and analyze your external footprint in real-time to stay ahead of threats and maintain visibility across your entire digital infrastructure. Learn more:
0
1
3
@trick3st
Trickest
27 days
Which of these checks will you add to your workflow first?.
0
0
0
@trick3st
Trickest
27 days
6/ SAST-type scans. Do a quick pass for known bad patterns and dangerous functions using static analysis. This won't replace manual review, but it gives you a starting point, especially useful when you’re short on time or scanning large codebases.
1
0
0
@trick3st
Trickest
27 days
5/ Secret scanning. Scan for hardcoded secrets, tokens, and credentials in JS files. The frontend might be handling things it shouldn't, or something was left behind during development. Hardcoded "Authorization" headers with high privileges pop up more often than you'd expect.
1
0
0
@trick3st
Trickest
27 days
4/ Component scanning. Your automation should extract all imported packages, then for each one, check:.🔵 is it outdated and potentially vulnerable?.🔵 is it unclaimed in a way that allows takeover?.
1
0
0
@trick3st
Trickest
27 days
Your automation should extract all endpoints from JS code, but also log where each one was found (filename, line number, etc). That context helps you track down how an endpoint is used and what parameters it needs.
1
0
0
@trick3st
Trickest
27 days
3/ API endpoint extraction. A lot of app logic lives in JS calling APIs. You won’t catch everything through the UI because a feature might:.🔵 be behind a feature flag, admin access, or a user tier.🔵 trigger after a specific interaction you missed.🔵 not be fully developed yet.
1
0
0
@trick3st
Trickest
27 days
2/ Resolve source maps. What looks like one giant code blob may have started as a dozen source files bundled by a JS build tool. Before trying to prettify or de-obfuscate code, check for source maps. If available, they can help you reconstruct the original source files.
1
0
0
@trick3st
Trickest
27 days
Your automation should:.✅ mirror the output directory structure to match the live website.✅ keep track of which pages referenced which JS file. That way, you can hop around quickly without needing to search your proxy history over and over again.
1
0
1
@trick3st
Trickest
27 days
1/ Download the code while maintaining context. You want the full JS codebase in one folder so you can navigate, search, and build context quickly. But you also don't want to waste time later figuring out:.❓ where a file came from.❓ which page loaded it.
1
0
1
@trick3st
Trickest
27 days
Your JavaScript analysis automation should do these 6 things before handing you the code 🧵👇.
1
0
2
@trick3st
Trickest
2 months
Trickest ASM demo.
0
0
1
@trick3st
Trickest
2 months
High per-asset fees? Rigid scans? Legacy ASM can’t keep up. Trickest ASM gives you:.🔵 Zero per-asset fees ➡️ map every asset with no surprise costs.🔵 Drag-and-drop builder ➡️ easily customize discovery logic.🔵 Scale for 100K+ assets in parallel ➡️ no blind spots. Check out
Tweet media one
1
0
3
@trick3st
Trickest
3 months
Which pitfall has tripped you up before?.
0
0
1
@trick3st
Trickest
3 months
🚩Traffic saturation . Flooding DNS queries too fast can overwhelm your local resources and lead to inaccurate results. Benchmark your setup, understand how your tool manages concurrency and sockets, and if speed is critical, distribute the workload across multiple machines.
1
0
2
@trick3st
Trickest
3 months
🚩 Not handling wildcards. Always check for wildcard DNS behavior before brute forcing. The simplest way is to send a small set of random, likely non-existent subdomains; if they all resolve, you're likely hitting a wildcard. In that case, you'll need to switch up your techniques.
1
0
2