Th3G3nt3lman

@Th3G3nt3lman

Security Researcher / Bug Bounty Hunter / Red Devil

Hashemite Kingdom of Jordan
Vrijeme pridruživanja: kolovoz 2016.

Tweetovi

Blokirali ste korisnika/cu @Th3G3nt3lman

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Th3G3nt3lman

  1. Prikvačeni tweet
    28. sij

    This is a summary for what i discussed with in our latest stream about my recon process, that will be easier for you as you might mess some when you watch the video later on. Thanks Ben, what you do for community is dope

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    Check out my interview with from my stream last week! Tons of great tips on recon, using , asset management with , and looking for bugs with high impact! Full interview:

    Poništi
  3. proslijedio/la je Tweet
    31. sij

    Just released a quick tool, wordlistgen, I put together for taking a list of URLs/paths from stdin and parsing components (subdomains, paths, query strings & values) to easily/quickly make contextual content discovery wordlists for

    Prikaži ovu nit
    Poništi
  4. 31. sij

    Ladies and Gentleman! It's showtime! Hurry, hurry, step right up! Introducin' the star of our show, his name is You wouldn't wanna be anywhere else in the world this Sunday So without further ado, Ben brings to you 😬

    Poništi
  5. 30. sij

    That monitoring service in is just awesome and saves a lot of time :)

    Poništi
  6. 28. sij

    The new beta interface in is amazing when it comes to sorting stuff .. ex :

    Poništi
  7. proslijedio/la je Tweet
    27. sij

    looking for some new dirs to bruteforce?

    Poništi
  8. proslijedio/la je Tweet
    27. sij

    -API TIP:26/31- Looking for BOLA (IDOR) in APIs? got 401/403 errors? AuthZ bypass tricks: * Wrap ID with an array {“id”:111} --> {“id”:[111]} * JSON wrap {“id”:111} --> {“id”:{“id”:111}} * Send ID twice URL?id=<LEGIT>&id=<VICTIM> * Send wildcard {"user_id":"*"}

    Prikaži ovu nit
    Poništi
  9. 25. sij

    This is gonna be awesome, if you want to know more about recon and being unique in attacking your targets ensure to join us tomorrow ;), Let's Get Ready To Rumble!!!

    Poništi
  10. 16. sij
    Poništi
  11. proslijedio/la je Tweet
    16. sij

    I watched all 44 2019 talks (~32 hours of video) and wrote detailed summaries for you 📚 Learn about , scaling security, threat modeling, building a security program, & more.

    Prikaži ovu nit
    Poništi
  12. 10. sij

    And 2020 started with a "very nice" bounty, thanks to and the great team of for their generosity and professional handling as usual..

    Poništi
  13. 9. sij

    Report submitted as medium , the amazing team of paypal changed severity to critical 😬😍.. 3rd critcal in the last two months ..

    Poništi
  14. 8. sij
    Poništi
  15. 7. sij

    2pac Freestyle on Gz and hustlas beats, Imagine if this GOAT still alive via

    Poništi
  16. 4. sij

    How the little piggies will grunt when they hear how the old boar suffered ...

    Poništi
  17. 4. sij

    Mark Eliyahu - Endless via

    Poništi
  18. 3. sij
    Poništi
  19. 2. sij
    Poništi
  20. 31. pro 2019.

    If 2pac was a bug bounty hunter competing all the best hackers 😁 ..

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·