I have released the first half of "Binary Exploitation 101", a beginner-friendly guide to binary exploitation. You can learn from classic buffer overflow to ret2dlresolve through CTF-like challenges. I am working on the second half now. Stay tuned🔥
r1ru.github.io/categories/bin…
The video and slides for dependency confusion are now available
It’s contains a real world PoC/Examples video is available now on youtube but in arabic 😂, you can turn on the translate 😅 and slides as well
I explained from the detection to exploitation and in the slides I…
Are you a Burp Repeater power user? The latest release introduces a new feature called 'Custom actions'. With these you can quickly build your own repeater features. Here's a few samples I made for you:
I developed a Burp vulnerability scanning plug-in based on #DeepSeek model, which can detect injection vulnerabilities and XSS vulnerabilities at present
#bugbounty#bugbountytips
I welcome your questions in the Github Issues section
github.com/momika233/Deep…
Critical vulnerabilities doesn't have to be complex or have a CVE - @deepseek_ai publicly exposed their internal ClickHouse database to the world, without any authentication at all, and leaked sensitive data.
No one is safe from security mistakes, follow along to learn more 🧵
17K Followers 15 FollowingSecurity reviews and research that keep winners winning. We apply unmatched hacking talent to secure critical software for the most innovative teams.
60K Followers 795 FollowingThreat intelligence platform - Data from Deep Web, Dark Web, Open Web || For data API integration : [email protected] Democratizing Cyber Security.
18K Followers 222 FollowingAnda boleh melakukan segala-galanya dari syurga ke bumi, wanita kecil!!
If you have any questions, please contact me
https://t.co/MkzsavUU9V
3K Followers 1K FollowingThe lamest hacker you know. I find the stuff you leaked online.
Developer by day, Researcher at @divdnl by night.
Restoring my 1928 fixer-upper house inbetween.
22K Followers 0 FollowingAI-Powered Penetration Testing Assistant for offensive security testing, focused on web applications and network penetration testing.
29K Followers 26 FollowingAn account full of silly science comics & occasionally irreverent blog posts. For new content, see our website or one of our other social media accounts.
110K Followers 43K FollowingWelcome, you each make this a supportive & knowledgeable community. Use our FREE online study room 24/7 details via our website or bluesky, telegram & Mastodon.
3K Followers 237 Following"Subject to" (s.t.) offers a series of informal conversations with relevant figures in the fields of #orms, combinatorial #optimization and #logistics.
20K Followers 100 FollowingIn one hand a black pen for creation. In the other, a red pen, for review. By @biodataganache. See also: @PlanetSciComm. IG+FB: redpenblackpen. CC-BY-NC-SA.
4K Followers 224 FollowingProfessor, IEEE and ACM Fellow, fellow of the Royal Society of Canada, CRC Tier 1 at U. of Ottawa, Canada. Director, Lero centre for software research, Ireland.
48K Followers 452 FollowingSecurity researcher with a focus on hardware & firmware. I occasionally publish stuff on YouTube. Co-founder of @hextreeio. Contact: [email protected]
53K Followers 616 FollowingGrzegorz Niedziela - a hacker who documents his hacking journey by creating and curating the best content about bug bounty and offensive security.
1K Followers 95 FollowingBuilding a culture of ethical hacking in Indore! A non-profit, community-conference featuring cutting-edge talks, workshops, and mind-blowing security demos.
188K Followers 6K FollowingThe leading provider of crowdsourced cybersecurity solutions purpose-built to secure the digitally connected world...Unleash Ingenuity™
No recent Favorites. New Favorites will appear here.