@th3_d4rkninj4 Profile picture

D4rkNinj4

@th3_d4rkninj4

🥷 Let me hack you! ✉️ DM For business queries

Similar User
Fares photo

@_2os5

Zhenwarx photo

@zhenwarx

Rahmat Qurishi photo

@RahmatQurishi

Imamul Mursalin photo

@0x0_root

𝐑𝐀𝐢𝐡𝐚𝐧 ✪ photo

@zapstiko

Hammad 🇵🇰🇵🇸 photo

@Hammad7361

Mahmoud Hamed photo

@7odamoo

Lu3ky13 ⚡️⚡️ photo

@lu3ky13

Basavaraj Banakar🇮🇳 photo

@basu_banakar

Naeem Ahmed Sayed 🇧🇩 photo

@0xNaeem

Nihad photo

@nihad_rekany

khan mamun photo

@mamunwhh

Mahbob Alam 🇧🇩 photo

@EmptyMahbob

Roberto Nunes photo

@0x_Akoko

drak3hft7 photo

@drak3hft7

D4rkNinj4 Reposted

𝐇𝐨𝐰 𝐭𝐨 𝐛𝐲𝐩𝐚𝐬𝐬 "𝐔𝐧𝐚𝐮𝐭𝐡𝐨𝐫𝐢𝐳𝐞𝐝 - 403" 👇 If you stumbled upon a "403 Forbidden" page ->chances are there is something juicy that developers try to protect A Thread!!🧵👇

Tweet Image 1

FastAdmin LFI Payload: ..//..//application/database #BugBounty #bugbountytip #bugbountytips #CyberSafety

Tweet Image 1

D4rkNinj4 Reposted

Alhamdulillah ✌️🇵🇰🥇 Finally, we made history. I sincerely thank all my friends who supported me in every situation۔ #Paris2024 #JavelinThrow #GOLD

Tweet Image 1

D4rkNinj4 Reposted

Sir, it’s time @khamenei_ir

Tweet Image 1

D4rkNinj4 Reposted

Today, we honor the hard work and dedication of laborers, while also reinforcing the importance of protecting our digital workforce against cyber threats. Happy Labor Day! #CybersecurityMatters #LabourDay #Cybersecurity #Darkanon #GetSecuredWithDarkanon

Tweet Image 1

D4rkNinj4 Reposted

While the recent defect in a content update in @CrowdStrike may seem like an opportunity for online jabs. At @darkanon_sys, we believe in supporting fellow security firms during these challenging times. Trolling weakens our industry's collective defence #Crowdstrike


D4rkNinj4 Reposted

CVE-2024-3400: OS Command Injection Vulnerability in GlobalProtect Gateway Severity: CRITICAL (10/10) ⚠️ Poc: github.com/DrewskyDev/CVE… Other info: unit42.paloaltonetworks.com/cve-2024-3400/ volexity.com/blog/2024/04/1…

Tweet Image 1

D4rkNinj4 Reposted

CVE-2024-1086 (Local Privilege Escalation) - While the xz backdoor was all over the place, this incredible exploit seemed to "slip" by! - This is working on most Linux kernels from 5.14 to v6.6 - Repo: github.com/Notselwyn/CVE-… - Creator: @notselwyn

Tweet Image 1

D4rkNinj4 Reposted

How we escalated a DOM XSS to a 1-click ATO for $8000 thefrogsec.github.io/2024/04/06/How… We finally have the permission to publish this blog post. Hope you guys will enjoy reading it! 😄 @Benasin3 @LongShrimp0812 #bugbountytips #FrogSecTeam #BugBounty @Hacker0x01 #TogetherWeHitHarder


D4rkNinj4 Reposted

I continue to strongly condemn Israel's ongoing genocide in Gaza in which over 40,000 innocent Palestinians have been killed & many others are being deliberately starved to death. Despite people across the world demanding an immediate ceasefire, the powerful continue to remain…


D4rkNinj4 Reposted

First time to find an admin panel bypass using (admin=1). /admin/tools/* --> 404 not found but in the response there was a new cookie (with empty value) --> Set-Cookie:admin=; Bypass request: GET /admin HTTP/1.1 Cookie:admin=1; #bugbounty #bugbountytips #bypass

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.