Donato Scaramuzzo
@ramirezVIISenior Penetration Tester & AI Explorer - #AI #NoCode
Similar User
@invisiblebyte
@AndreaTheMiddle
@syrion89
@sbox90
@TS_WAY_SRL
@MrB0LTv2
@sqleto
@Aryan_2808
@mariozagaria
@antonioierano
@prince7007
@binay_cdry
📌 My Top Burp Suite Extension 1. Autorize 2. JS Miner 3. Param Miner 4. Reshaper (just discovered) 5. 403 Bypasser 6. HTTP Request Smuggler 7. Wsdler 8. Backslash Powered Scanner #pentesting #cybersecurity #burpsuite #BugBounty
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter Source: github.com/Az0x7/vulnerab…
Leave your neighbor out of this 🙅 A new Module is here to teach you about Wi-Fi security. Learn how to exploit vulnerabilities in #wifi networks, discover hidden networks, and bypass MAC filtering implemented by access points using aircrack-ng tools: okt.to/AnXdtB
🚀 v0.42.0 is out! You can now route traffic through SOCKS proxies, with the ability to assign different proxies based on the destination target. Check all the details about the latest release here: github.com/caido/caido/re…
If you love the @pdiscoveryio tools, you should check out their Tool Manager "pdtm"! You can update ALL of the ProjectDiscovery tools with this one simple command: ⌨️ pdtm -ua Install here: loom.ly/BrxEACM
New writeup from @_specters_ and I: we're finally allowed to disclose a vulnerability reported to Kia which would've allowed an attacker to remotely control almost all vehicles made after 2013 using only the license plate. Full disclosure: samcurry.net/hacking-kia
During internal assessments I realized that the most difficult part is to detect all subnets. Running nmap is good but long . So what if we let computers and servers talk to us instead and monitor incoming packets ? (1/2)
Hunting IDORs with Z-winK 🪲 What is an IDOR? 🐞 How IDORs manifest 🐛 Methods to test for IDORs 🐜 Using tools like Burp Suite for exploitation 🪳 Best practices for safe testing Watch now 📺👇 loom.ly/ToGdDxo
Wanna futureproof your offensive security career? Add these to your skillset: 1️⃣ API Testing 2️⃣ AI Red Teaming (model and infra) 3️⃣ IoT and Hardware Hacking 4️⃣ Internal / Assumed Breach Testing (AD+++) 5️⃣ Defense (at code level, and architecture level)
Recon Guide for bug hunting
Add to your wordlist juicy-paths: /_vti_pvt/service.pwd /master.passwd/master.passwd.txt /servudaemon.ini /app/config/config.local.neon /app/etc/local.xml /home/000~ROOT~000 #bugbountytips #bugbounty #bugbountytip
The Burp Suite Deep Dive course is now fully uploaded and completely free on YouTube. Monetization is turned off so you should have an ad-free experience. Feel free to spread the word. #pentesting #appsec #cybersecurity #bugbounty #infosec youtube.com/playlist?list=…
My main stack of free AI tools • Overall: ChatGPT • Writing: Claude 3.5 Sonnet • Image: Ideogram, Freepik • Video: Kling AI, Luma • Coding: Cursor AI • Automation: Zapier • Voice: ElevenLabs • Search: Perplexity, You • Assistants: Poe, Coze • Presentation: Gamma
☁️Cloud Pentesting Checklist #cloud #pentest #pentesting #aws #googlecloud #azure #cloudbughunting #cloudhunting #cloudpentest #redteam #cybersecurity #infosec github.com/kh4sh3i/cloud-…
🐞Use Burpsuite like Pro by @daffainfo Match and Replace Feature which is not known by many hunters or doesn't use it at all. Source: github.com/daffainfo/matc… #bugbounty #bugbountytips #burpsuite #pentesting #cybersecurity #hacking #ethicalhacking #xss #wafbypass #waf
Want a comprehensive guide on how to exploit SQL injections? 🤑 Check out Advanced SQL Injection Techniques by @nav1n0x! 😎 A Gitbook covering some of the most common and advanced SQL injections that may be present on your target! 👇 buff.ly/3AfzUUz
Don’t expect AI to write for you. Instead: • Brainstorm with it • Plan with it • Research with it • Innovate with it • Strategize with it • Learn with it • Collaborate with it • Solve problems with it • Explore with it AI can’t take your job but it sure can amplify it
Hey Bug Hunters! If you don't have time to listen to @ctbbpodcast excellent podcast, you can read an amazing summary on the podcast's blog. It's worth it! 👇 👇 [link in the first comment] #BugBounty #bugbountytips #podcast #cybersecurity #infosec
Give some advice to someone that keeps finding dupes 👇
@NahamSec is back with streams! He went live into recon techniques, sharing tips, exploring vulnerabilities, and showcasing hacking methods using our public Asset Inventory Solution of 1,200 companies 🏢 Sign up on Trickest to get this data ✍️ youtube.com/watch?v=9mdLNR…
United States Trends
- 1. $CUTO 9.632 posts
- 2. ICBM 5.678 posts
- 3. #KashOnly 22,7 B posts
- 4. The ICC 115 B posts
- 5. Good Thursday 29 B posts
- 6. #thursdayvibes 4.068 posts
- 7. International Criminal Court 60,6 B posts
- 8. #ThursdayMotivation 5.629 posts
- 9. Gallant 153 B posts
- 10. Katie Couric N/A
- 11. Bezos 31,1 B posts
- 12. Dnipro 60,9 B posts
- 13. $BTC 846 B posts
- 14. Adani 26,3 B posts
- 15. Happy Friday Eve N/A
- 16. Vegito 2.669 posts
- 17. #21Nov 3.428 posts
- 18. #ThursdayThoughts 3.648 posts
- 19. Reece James 10,4 B posts
- 20. Nikki Haley 31,9 B posts
Who to follow
Something went wrong.
Something went wrong.