Offensive Twitter
19.1K subscribers
888 photos
47 videos
21 files
2.05K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
😈 [ ReconOne_, ReconOne ]

Did you hear about new Confluence CVE-2022-26134 Remote Code Execution? Try to quickly cover your Attack Surface with the help of nuclei πŸ‘‡

#Confluence #reconone #recon #attacksurface #cve2022 #nuclei #bugbountytips

πŸ₯ [ tweet ]
😈 [ ReconOne_, ReconOne ]

GitHub Recon in Manual mode - Part 3 - Database
credits: techgaun/github-dorks

#recon #recontips #github #AttackSurface #bugbountytips #reconone #Database #gitrecon

πŸ₯ [ tweet ]
😈 [ ReconOne_, ReconOne ]

Want to scan for the TOP Exploited Vulnerabilities according to CISA? Try this πŸ‘‡
Credits: @pdiscoveryio

#nuclei #CISA #attacksurface #recon #reconone #bugbountytips #recontips

πŸ₯ [ tweet ]
😈 [ ReconOne_, ReconOne ]

Want to quickly find publicly exposed MySql backup files? Try this πŸ‘‡
Credits: @_bughunter

#recontips #AttackSurface #bugbountytips #mysql #reconone

πŸ₯ [ tweet ]
😈 [ ReconOne_, ReconOne ]

Do you want to focus on "Interesting" subdomains only? Try this πŸ‘†

#recontips #bugbountytips #recon #AttackSurface #subdomains #reconone

πŸ₯ [ tweet ]
😈 [ ReconOne_, ReconOne ]

This is my quick nmap setup, to scan critical ports at fast rate πŸ’ͺ🏻πŸ”₯

#portscan #attacksurface #recontips #bugbountytips #recon #nmap

πŸ₯ [ tweet ]
😈 [ clintgibler, Clint Gibler ]

πŸ—’οΈ Awesome RCE Techniques

A list of techniques to achieve Remote Code Execution on various apps

Including:

CMS - Joomla, Wordpress

LMS - Moodle

Frameworks - JBoss, Tomcat

Other - GiTea, Jenkins

By @podalirius_

#bugbounty #bugbountytips

https://t.co/9kOdw4ammT

πŸ”— https://github.com/p0dalirius/Awesome-RCE-techniques

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ ReconOne_, ReconOne ]

Easy trick: From Shodan to nuclei one liner πŸ‘‡πŸ”₯

Credits: @pdnuclei, @PhilippeDelteil

#recontips #AttackSurface #shodan #bugbountytips #nuclei #recon

πŸ₯ [ tweet ]
😈 [ ReconOne_, ReconOne ]

Shodan Dork in Manual mode - Part 1

Now that you all have Shodan membership it's time to try Shodan Dorks πŸ‘€πŸ‘‡

Credits: @securitytrails

#recon #Shodan #attacksurface #bugbountytips #BugBounty #cybersecurity

πŸ₯ [ tweet ]
😈 [ ReconOne_, ReconOne ]

Have you ever looked for Open Redirects? Try this πŸ‘‡ πŸ’£

#recontips #AttackSurface #bugbountytips #bugbounty #openredirect #recon #httpx

πŸ₯ [ tweet ]
😈 [ NationalCyberS1, National Cyber Security Services ]

LinWinPwn:- A bash script that automates a number of Active Directory Enumeration and Vulnerability checks.

Link:https://t.co/pR8suEn8PZ

#hacking #bugbountytips #informationsecurity #cybersecurity #infosec #cybersecuritytips #Ethicalhacking #Pentesting

https://t.co/uJj502OabP

πŸ”— https://github.com/lefayjey/linWinPwn
πŸ”— https://ncybersecurity.com

πŸ₯ [ tweet ]
😈 [ 0x0SojalSec, Md Ismail Ε ojal ]

The shortest payload for a tiny php reverse shell written in 19 bytes using only non-alphanumeric characters. Hex values inside β›Ά indicate raw bytes.
This will help to bypass WAF and execute PHP reverse shell for RCE.
get more detail about thisπŸ‘‡

πŸ”— https://gist.github.com/0xSojalSec/5bee09c7035985ddc13fddb16f191075

#bugbountyTips #bugbounty

πŸ₯ [ tweet ]
😈 [ 0x0SojalSec, Md Ismail Ε ojal ]

Nuclei Automation.βš”οΈ

https://t.co/CDes83cCD0

Full Nuclei automation script with logic explanation

#bugbountytips #infosec #nuclei #automation

πŸ”— https://github.com/iamthefrogy/nerdbug

πŸ₯ [ tweet ]
πŸ”₯1😁1
😈 [ 0x0SojalSec, Md Ismail Ε ojal ]

#oneliner

βœ… Subdomain enumeration
βœ… Full port scan
βœ… HTTP web server detection

#security #bugbountytips #portscan #subdomain #chaos

πŸ₯ [ tweet ]