@_jc4rlos Profile picture

JCarlos Garcia

@_jc4rlos

Mobile penetration tester 💀 | bug Bounty 🐛 | Wannabe Red Teamer 🎒 🥹

Joined June 2010
Similar User
SrRéquiem photo

@0xRequiem

xeniel photo

@zxeniel

Luis Santos photo

@ZER0Luis

JCarlos Garcia Reposted

The wayback machine has been compromised. See you all in HIBP!

Tweet Image 1

JCarlos Garcia Reposted

finds vulnerabilities in "Jira", I use it and recommend it git clone github.com/MayankPandey01… cd Jira-Lens sudo python3 -m pip install -r requirements.txt cd Jira-Lens python3 Jira-Lens.py -u ejemploweb.com credit: @HackingTeam777 #Bugbountytips

Tweet Image 1

JCarlos Garcia Reposted

If you use windows don’t connect to random wifi because CVE-2024-30078 RCE on windows Can Be Exploited Without Any User Interaction ☠️☠️ #cybersecurity


JCarlos Garcia Reposted

drozer 3.0.0 After almost 7 years, new version of drozer compatible with Python 3 and modern Java was released If you don't know, drozer was a very popular security testing framework for Android github.com/WithSecureLabs…

Tweet Image 1

JCarlos Garcia Reposted

CVE-2024-30078 is the finding of the year?

If you use windows don’t connect to random wifi because CVE-2024-30078 RCE on windows Can Be Exploited Without Any User Interaction ☠️☠️ #cybersecurity



JCarlos Garcia Reposted

Easy P2,p3 bug methodology to find sqli, xss and injection attacks 1. waybackurls target.com | grep = | tee param.txt git clone = github.com/projectdiscove… 2. cat param.txt | nuclei -t fuzzing-templates By:@xitsec credit: @RootMoksha #bugbountytips

Tweet Image 1

JCarlos Garcia Reposted

CVE-2024-26229: An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. PoC github.com/varwara/CVE-20…

Tweet Image 1

JCarlos Garcia Reposted

JS Recon Pentest Guide Tips to find juicy info, endpoints, token, hidden files and hostnames. #bugbountytips #bugbounty

Tweet Image 1

JCarlos Garcia Reposted

Kali NetHunter 2024.2 Update the latest NetHunter image via Magisk or TWRP recovery What's new: -option to load kernel modules -inject Rubber Ducky scripts via Bluetooth with option to change Bluetooth class (impersonated device would be discovered as headset, printer, PC etc.)

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

JCarlos Garcia Reposted

¿Sabes cómo puedes proteger tus datos en tu dispositivo #iOS? En nuestra imagen te aportamos los detalles sobre cómo cifrar datos en iOS. ¡Mantén tus datos seguros y mejora tu ciberseguridad 🛡️! incibe.es/sites/default/… #CifraTuInfo #PlanDeRecuperación

Tweet Image 1

JCarlos Garcia Reposted

Microsoft announces deprecation of Windows NTLM authentication - @billtoulas bleepingcomputer.com/news/microsoft…">bleepingcomputer.com/news/microsoft… bleepingcomputer.com/news/microsoft…">bleepingcomputer.com/news/microsoft…


JCarlos Garcia Reposted

💻 How Did I Easily Find Stored XSS at Apple And Earn $5000 ? 💻 👉 Writeup 🖇️ : medium.com/@xrypt0/how-di…


JCarlos Garcia Reposted

CSRF Functions + Bypass Checklist #bugbounty #bugbountytips

Tweet Image 1

JCarlos Garcia Reposted

Hey folks! Welcome to API Hacking Series. Today let’s learn about OWASP Top 1 API Bug - Broken Object Level Authorization (BOLA) Learn: - What is BOLA - Where to find BOLA vulnerability and more... #typefully #Day1


JCarlos Garcia Reposted

🚨Alert🚨CVE-2024-27497: Replace Your Linksys E2000 Router Now! There’s no fix in sight! ⚠A severe security flaw in the Linksys E2000 router lets hackers waltz right into your network. 📊 300+ Services are found on the Hunter.how 🔗Hunter Link:…

Tweet Image 1

JCarlos Garcia Reposted

Ever came across an API endpoint like the one below? 🧐️ If you skipped testing these before, you probably missed out on a few IDOR vulnerabilities... 😬️ Here's how 🤑 👇️

Tweet Image 1

JCarlos Garcia Reposted

Apache Tomcat HTTP Request Smuggling (Client-Side Desync) Recently, a critical vulnerability was discovered in Apache Tomcat, which was assigned the code CVE-2024-21733. Hackerone Report : hackerone.com/reports/2327341 #cve #bugbounty #apache

Tweet Image 1

United States Trends
Loading...

Something went wrong.


Something went wrong.