TIM Enterprise(@TIM_Enterprise) 's Twitter Profile Photo

I servizi di & , erogati dagli esperti dell' di Telsy, identificano le vulnerabilitร  informatiche della tua organizzazione, prima che lo faccia qualcun altro.

Scopri di piรน: telsy.com/wp-content/uplโ€ฆ

account_circle
ecscorporation(@ecscorporation) 's Twitter Profile Photo

๐๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐ฒ๐จ๐ฎ๐ซ ๐๐ข๐ ๐ข๐ญ๐š๐ฅ ๐Ÿ๐จ๐ซ๐ญ๐ซ๐ž๐ฌ๐ฌ ๐ฐ๐ข๐ญ๐ก ๐•๐€๐๐“ - ๐ญ๐ก๐ž ๐ฌ๐ก๐ข๐ž๐ฅ๐ ๐š๐ ๐š๐ข๐ง๐ฌ๐ญ ๐ฎ๐ง๐ฌ๐ž๐ž๐ง ๐ญ๐ก๐ซ๐ž๐š๐ญ๐ฌ.๐Ÿ“ท
๐’๐œ๐ก๐ž๐๐ฎ๐ฅ๐ž ๐ฒ๐จ๐ฎ๐ซ ๐š๐ฌ๐ฌ๐ž๐ฌ๐ฌ๐ฆ๐ž๐ง๐ญ ๐ญ๐จ๐๐š๐ฒ!๐Ÿ“ท

๐๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐ฒ๐จ๐ฎ๐ซ ๐๐ข๐ ๐ข๐ญ๐š๐ฅ ๐Ÿ๐จ๐ซ๐ญ๐ซ๐ž๐ฌ๐ฌ ๐ฐ๐ข๐ญ๐ก ๐•๐€๐๐“ - ๐ญ๐ก๐ž ๐ฌ๐ก๐ข๐ž๐ฅ๐ ๐š๐ ๐š๐ข๐ง๐ฌ๐ญ ๐ฎ๐ง๐ฌ๐ž๐ž๐ง ๐ญ๐ก๐ซ๐ž๐š๐ญ๐ฌ.๐Ÿ“ท
๐’๐œ๐ก๐ž๐๐ฎ๐ฅ๐ž ๐ฒ๐จ๐ฎ๐ซ ๐š๐ฌ๐ฌ๐ž๐ฌ๐ฌ๐ฆ๐ž๐ง๐ญ ๐ญ๐จ๐๐š๐ฒ!๐Ÿ“ท

#CyberSecurity #PenetrationTesting #VulnerabilityAssessment #DataProtection
account_circle
iSec(@iSec_eg) 's Twitter Profile Photo

Vulnerability Assessment A vulnerability assessment is a systematic review of security weaknesses in an information system.
for our services please fill out the form: bit.ly/3SGD3E3

account_circle
Leonidas D. Ace (Md Rafi Ahamed) ๐Ÿ‡ง๐Ÿ‡ฉ(@L3onid1s) 's Twitter Profile Photo

Critical hit on the 2nd day of Q2 on Yogosha โ€ฆ. ๐Ÿ’ช๐Ÿป๐Ÿ”ฅ

Bug: IDORโ€ฆโœŒ๐Ÿป

Had to change 3 parameters value simultaneously to steal money from every single userโ€ฆ ๐Ÿ˜Ž ๐Ÿ™Œ๐Ÿป

urity bounty
bounty tips

Critical hit on the 2nd day of Q2 on @YogoshaOfficial โ€ฆ. ๐Ÿ’ช๐Ÿป๐Ÿ”ฅ

Bug: IDORโ€ฆโœŒ๐Ÿป

Had to change 3 parameters value simultaneously to steal money from every single userโ€ฆ ๐Ÿ˜Ž ๐Ÿ™Œ๐Ÿป

#infosec #infosecurity #bugbounty #whitehat #bug #vulnerabilityassessment #ethicalhacking
#bugbountytips
account_circle
Leonidas D. Ace (Md Rafi Ahamed) ๐Ÿ‡ง๐Ÿ‡ฉ(@L3onid1s) 's Twitter Profile Photo

Just sharing my last critical on Yogosha โ€ฆ. ๐Ÿ’ช๐Ÿป๐Ÿ”ฅ

Bug: ๐—œ๐—ป๐—ท๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—ผ๐—ป ๐—”๐—ฃ๐—œโ€ฆ. ๐Ÿ’‰

Will do a write-up on this one soonโ€ฆ โœŒ๐Ÿป

urity bounty

testing

Just sharing my last critical on @YogoshaOfficial โ€ฆ. ๐Ÿ’ช๐Ÿป๐Ÿ”ฅ

Bug: ๐—œ๐—ป๐—ท๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—ผ๐—ป ๐—”๐—ฃ๐—œโ€ฆ. ๐Ÿ’‰

Will do a write-up on this one soonโ€ฆ โœŒ๐Ÿป

#infosec #infosecurity #bugbounty #whitehat #bug #vulnerabilityassessment #ethicalhacking
#api
#apitesting
account_circle
Beyond Key(@KeyBeyond) 's Twitter Profile Photo

Check out this case study from the manufacturing floor to the online store to discover how we helped our client conduct vulnerability scanning to ensure a safe cyber structure while reducing costs by 40%. Learn more: okt.to/cvNIoR
ย 

Check out this case study from the manufacturing floor to the online store to discover how we helped our client conduct vulnerability scanning to ensure a safe cyber structure while reducing costs by 40%. Learn more:  okt.to/cvNIoR
ย 
#VAPT #VulnerabilityAssessment
account_circle
Cybersapiens(@Cybersapiens101) 's Twitter Profile Photo

We sincerely congratulate all the interns who worked diligently to uncover and report vulnerabilities in our client Target during the Vulnerability Assessment and Penetration Testing (VAPT) process.

We sincerely congratulate all the interns who worked diligently to uncover and report vulnerabilities in our client Target during the Vulnerability Assessment and Penetration Testing (VAPT) process.

#interns #congratulations #vulnerabilityassessment #penetrationtesting #VAPT
account_circle
Briskinfosec Technology and Consulting Pvt Ltd(@briskinfosec) 's Twitter Profile Photo

๐Ÿ” Keep your mobile apps safe from hackers! Protecting your digital assets from cyber threats is crucial. That's why we've compiled a list of the top 10 for mobile app security.

lications development

๐Ÿ” Keep your mobile apps safe from hackers! Protecting your digital assets from cyber threats is crucial. That's why we've compiled a list of the top 10 #tools for mobile app security.

#mobileapplications #mobileapp #mobileappdevelopment #pentesting #vulnerabilityassessment
account_circle
Leonidas D. Ace (Md Rafi Ahamed) ๐Ÿ‡ง๐Ÿ‡ฉ(@L3onid1s) 's Twitter Profile Photo

Hitting hard on Yogosha one againโ€ฆ Working with mature security team is always a winโ€ฆ ๐Ÿคœ๐Ÿป๐Ÿค›๐Ÿป

Bug: Open redirection to XSS ๐Ÿ”ฅ
Payload: Javascript:prompt(1);//

urity bounty

Hitting hard on @YogoshaOfficial one againโ€ฆ Working with mature security team is always a winโ€ฆ ๐Ÿคœ๐Ÿป๐Ÿค›๐Ÿป

Bug: Open redirection to XSS ๐Ÿ”ฅ
Payload: Javascript:prompt(1);// 

#infosec #infosecurity #bugbounty #whitehat #bug #vulnerabilityassessment #ethicalhacking
account_circle
Leonidas D. Ace (Md Rafi Ahamed) ๐Ÿ‡ง๐Ÿ‡ฉ(@L3onid1s) 's Twitter Profile Photo

Just pushing hard for the upcoming event. Letโ€™s see where it takes me ๐Ÿ˜ฎโ€๐Ÿ’จ

Bugs:
1.Resource allowance bypass
2. Broken Access Control

Hunt onโ€ฆ. ๐Ÿ’ช๐Ÿป๐Ÿ”ฅ

urity bounty

Just pushing hard for the upcoming event. Letโ€™s see where it takes me ๐Ÿ˜ฎโ€๐Ÿ’จ

Bugs:
1.Resource allowance bypass
2. Broken Access Control 

Hunt onโ€ฆ. ๐Ÿ’ช๐Ÿป๐Ÿ”ฅ

#infosec #infosecurity #bugbounty #whitehat #bug #vulnerabilityassessment #ethicalhacking
account_circle