Arman Reposted

Gained a reverse shell through a PNG file using I-Espresso and Xploitra. Curious to try it yourself? Check the links below ⬇️ 🔗 I-Espresso: github.com/AnonKryptiQuz/… 🔗 Xploitra: github.com/AnonKryptiQuz/…


Arman Reposted

Linux Boot Process Illustrated

Tweet Image 1

Arman Reposted
Tweet Image 1

Arman Reposted

Cybersecurity Tools by Category

Tweet Image 1

Arman Reposted

The ultimate OSINT Cheatsheet

Tweet Image 1

Arman Reposted

Shoot

Tweet Image 1

Arman Reposted
Tweet Image 1

Arman Reposted

🔍 Technical Bug Bounty Methodology 🔍

Tweet Image 1

Arman Reposted

New Bug Bounty Alert! @TokemakXYZ's Autopilot, a decentralized liquidity management protocol that optimizes liquidity provision across DEXs, enabling more efficient capital deployment, has launched its bug bounty program on R.xyz. Explore the new…

Tweet Image 1

Arman Reposted

Ongoing Bug Bounty Tokemak will also maintain a bug bounty with @xyz_remedy This increases the distribution of our bug bounty offerings and ensures that more white hats are looking at our code.


Arman Reposted

🔐 Audit Alert: During a recent audit, we identified a High Severity issue: JWT TOKEN SIMPLE PRIVATE KEY. The JWT implementation had a weak HMAC encryption algorithm, making it vulnerable to brute force attacks. We successfully cracked the private key using Hashcat with this…


United States Trends
Loading...

Something went wrong.


Something went wrong.