Looking for quality OSINT resources? We've put together this handy guide based on the tools we recommend in our OSINT course, organized by category to make things easy, like:
✅ Note-keeping tools
✅ Sock puppet resources
✅ Search engine OSINT tools
✅ Image analysis tools…
Conflicting HTTP headers can confuse servers and expose serious flaws.
Here's how HTTP request smuggling vulnerabilities arise 👇
1️⃣ Dual HTTP headers conflict
HTTP/1 allows both Content-Length and Transfer-Encoding. If both headers are present, spec says to ignore…
⚠️ The FBI confirms Lazarus Group (TraderTraitor) is behind the $1.5B Bybit hack.
The attack originated from a compromised Safe{Wallet} developer machine, allowing a malicious transaction to target Bybit’s multisig cold wallet.
The stolen funds are now being laundered across…
Want to Become an Accomplished and Effective Cyberwarrior?
Follow the Path to Cyberwarrior!
A all new 3-year program from Hackers-Arise
hackers-arise.com/post/hackers-a…
Just saw this video with @DanielMiessler on @davidbombal channel about custom AI APIs
This is insane!
The fact that Daniel intends to put his code on Open Source (Fabric) is mindblowing.
youtu.be/vF-MQmVxnCs?fe…
After so much time listening to Occupy the Web (@three_cube) on David Bombal (@davidbombal) channel on YT i now hear OTW voice when reading his books.
"How cool is that"
Can't thank enough to David Bombal and OTW for sharing their knowledge.
Bug Bounty Tip
How to detect potential SQL injection on numeric parameters in the URL query or JSON body.
Query: ?id=31337
or JSON Body: {"id": 31337}
Result: item with ID 31337
Query: ?id=31338-1
or JSON Body: {"id": "31338-1"}
Result: the same item with ID 31337
Cheers!
Giveaway! 🎉
I'm going to buy someone a new MacBook Pro M2 13".
To enter, retweet this tweet, then follow: @hakluke, @hacker_content & @haksecio.
If you're a cybersecurity org looking for high quality content and social media management, check out hackercontent.com 👇
Happy Friday Team - AMA Time Again!! On a plane to #SanFrancisco & doubling up the post with a little bit of motivation, and #AMA. ⬇️⬇️ drop any q’s you have below and help me kill time in this flight. Anything #cybersecurity, life, #career, or w/e!! Stay awesome friends!!!
Dois anos depois das revelações do #LuandaLeaks, dois advogados Holandeses cansados da passividade das autoridades puseram mãos à obra e decidiram avançar com um processo cível visando Isabel dos Santos e todos os seus facilitadores Portugueses.
nrc.nl/nieuws/2022/11…
6K Followers 3K FollowingConnections don't always go as smoothly as we'd like. For help with your Linksys device, remember @LinksysCares.
https://t.co/so3D4lDz5O
3K Followers 874 Followinghttp://t.co/hXf6kGw5UD is a compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.
39 Followers 158 FollowingI am TRON, an opensource Self-Monitoring Security Program coded to curb the abuses of the #MasterControlProgram, or #MCP. Together we must #Fight4TheUSERS.
4K Followers 5K Following#LongCovid 03-2020, #MECVS sinds 1997, pas diagnose per 01-2021. Daarvoor gaslighting/psychologisering.
Niet in beeld. Niet welkom in PostCovid Klinieken.
56K Followers 3 FollowingOfficial account maintained by the CVE™ Program to notify the community of new CVE IDs. Posts contain abbreviated details. Full CVE Records on https://t.co/ALn4YvUtom
12K Followers 17 Following👨💻 Penetration testing
🧑💼 Cybersecurity consulting
🎓Appsec training
🌏 Born in Australia, serving customers globally
Founded by @hakluke
7K Followers 140 FollowingWe create content and manage socials for your cybersecurity organization. 🚀
Sound good? 👉 https://t.co/H8NucTI4zJ
Founded by @hakluke
95K Followers 2K FollowingHacker, marketer. I manage socials and produce amazing technical blogs for cybersecurity orgs. Founder of @hacker_content and @haksecio
3K Followers 111 FollowingH4cker, author of How to Hack Like a Pornstar https://t.co/VvRLVM6MUB & How to Hack Like a Ghost https://t.co/DXpFnQ3rYR
https://t.co/IrQjsNwxGV
247K Followers 3K FollowingPentester, Forensic investigator, and former college professor. Trained hackers at every branch of US military and intelligence.
Visit me at https://t.co/G478wufszw
108K Followers 2 FollowingMonitor your external network, search the Internet of Things and perform empirical market research. You can also find us on https://t.co/nPLFbFy8R5
5.1M Followers 461 FollowingTV Dad, Bodybuilder, Conan, Terminator, and former Governor of California. I killed the Predator. I told you I'd be back. I’m here to pump you up.
1.4M Followers 11 FollowingBuilding the everything exchange. All markets — all in one place. The future of trading lives here.
For support: @CoinbaseSupport.
213K Followers 532 FollowingWe improve the security of apps with community-led open source projects, 260 local chapters, and tens of thousands of members worldwide. Famous for OWASP Top 10
123K Followers 3K FollowingCybersecurity pros: Rapid7 lets you command your attack surface, smash silos, stay steps ahead of attackers, and take breaches from “inevitable” to preventable.
253K Followers 185 FollowingOfficial account of the Metasploit Project, part of the @rapid7 family.
Mastodon: @[email protected]
Slack: https://t.co/ZOLPDG2O2s
325K Followers 119 FollowingEmpowering the world to fight cyber threats with indispensable cybersecurity skills and resources. Build the path to a secure future with OffSec.