HUNTER

3.3K posts

HUNTER banner
HUNTER

HUNTER

@OX0DAYS

/Future/Billionaire/Hacker/Web2/Web3/Trader/Crypto/Forex/NFT/Maker/SaaS/AI/IT/Services/Provider/

Bug Bounty انضم Temmuz 2020
6.2K يتبع464 المتابعون
HUNTER أُعيد تغريده
Intigriti
Intigriti@intigriti·
Google dorking is essential when performing recon! But it can easily become a tedious process... 😓 Xnldorker by @xnl_h4ck3r gathers search results from multiple search engines simultaneously, including Google, Bing, DuckDuckGo, and more! It also features concurrent anti-bot detection and automatic result deduplication! 😎 Check it out! 👇 🔗 github.com/xnl-h4ck3r/xnl…
Intigriti tweet media
English
8
122
557
23.7K
HUNTER أُعيد تغريده
YesWeHack ⠵
YesWeHack ⠵@yeswehack·
Looking for reliable wordlists for Bug Bounty recon? Wordlists by @Assetnote delivers automated and manually curated lists, updated monthly, for content discovery, subdomain enumeration, parameter fuzzing, and API endpoint hunting. 👉 github.com/assetnote/word… #BugBountyTips
YesWeHack ⠵ tweet media
English
2
23
116
5.3K
HUNTER أُعيد تغريده
Aditya
Aditya@ADITYASHENDE17·
Recon Smarter: Finding Sensitive Files in Large URL Lists Most bug hunters stop at URLs. Real impact comes from what those URLs expose. This workflow combines: • high-risk file extensions • real-world secret patterns • automated URL discovery Result → fewer URLs, higher signal, better findings. Step 1: Asset discovery subfinder -d domains.com | httpx -mc 200,401,403,404 | tee domains.txt Step 2 URL extraction cat domains.txt | katana | tee urls.txt Step 3: Smart grep (FILES + SECRETS) We combine: • Sensitive file extensions • High-signal secret regex cat urls.txt | grep -aiE "\.(zip|rar|tar|gz|config|log|bak|backup|java|old|xlsx|json|pdf|doc|docx|pptx|csv|htaccess|7z)$|(?i)(?:(?:access_key|access_token|admin_pass|admin_user|algolia_admin_key|algolia_api_key|alias_pass|alicloud_access_key|amazon_secret_access_key|amazonaws|ansible_vault_password|aos_key|api_key|api_key_secret|api_key_sid|api_secret|api.googlemaps AIza|apidocs|apikey|apiSecret|app_debug|app_id|app_key|app_log_level|app_secret|appkey|appkeysecret|application_key|appsecret|appspot|auth_token|authorizationToken|authsecret|aws_access|aws_access_key_id|aws_bucket|aws_key|aws_secret|aws_secret_key|aws_token|AWSSecretKey|b2_app_key|bashrc password|bintray_apikey|bintray_gpg_password|bintray_key|bintraykey|bluemix_api_key|bluemix_pass|browserstack_access_key|bucket_password|bucketeer_aws_access_key_id|bucketeer_aws_secret_access_key|built_branch_deploy_key|bx_password|cache_driver|cache_s3_secret_key|cattle_access_key|cattle_secret_key|certificate_password|ci_deploy_password|client_secret|client_zpk_secret_key|clojars_password|cloud_api_key|cloud_watch_aws_access_key|cloudant_password|cloudflare_api_key|cloudflare_auth_key|cloudinary_api_secret|cloudinary_name|codecov_token|config|conn.login|connectionstring|consumer_key|consumer_secret|credentials|cypress_record_key|database_password|database_schema_test|datadog_api_key|datadog_app_key|db_password|db_server|db_username|dbpasswd|dbpassword|dbuser|deploy_password|digitalocean_ssh_key_body|digitalocean_ssh_key_ids|docker_hub_password|docker_key|docker_pass|docker_passwd|docker_password|dockerhub_password|dockerhubpassword|dot-files|dotfiles|droplet_travis_password|dynamoaccesskeyid|dynamosecretaccesskey|elastica_host|elastica_port|elasticsearch_password|encryption_key|encryption_password|env.heroku_api_key|env.sonatype_password|eureka.awssecretkey)[a-z0-9_.,-]{0,25})[:<>=|]{1,2}.{0,5}['\"]([0-9A-Za-z\-_=]{8,64})['\"]" #bugbounty #recon #infosec #cybersecurity #pentesting #websecurity #hacking
Aditya tweet media
English
13
95
458
18.4K
HUNTER أُعيد تغريده
Lu3ky13 ⚡️⚡️
Lu3ky13 ⚡️⚡️@lu3ky13·
1/1 How to Bypass Akamai WAF Using AI What was the idea? Many researchers are afraid to test Akamai directly because you can't easily bypass it or find working payloads through Google searches. Akamai constantly blocks anything you try, so you need your own custom payloads.
Lu3ky13 ⚡️⚡️ tweet media
English
5
26
272
15.3K
HUNTER أُعيد تغريده
Intigriti
Intigriti@intigriti·
⏰ It's CHALLENGE O'CLOCK! 👉 Pop an alert before Monday the 23rd of February 👉 Win €400 in SWAG prizes 👉 We'll release a tip for every 100 likes on this tweet Thanks @d3dn0v4 for the challenge 👇 challenge-0226.intigriti.io
Intigriti tweet media
English
15
10
159
34.2K
HUNTER أُعيد تغريده
bugcrowd
bugcrowd@Bugcrowd·
You don’t need 20 tabs for recon. You just need a pipe. Here’s the one-liner 👇 subfinder → httpx → gau → grep Turn passive recon into real findings.
bugcrowd tweet media
English
4
68
410
13.1K
HUNTER أُعيد تغريده
N$
N$@nav1n0x·
I was reconning earlier today and "accidentally" found an #XSS in crt.sh😂
N$ tweet media
English
15
19
425
28.2K
HUNTER أُعيد تغريده
Teng Yan · Chain of Thought AI
your old Android phones are a better agent server than a Mac mini. while most users spend $600+ on dedicated hardware for @openclaw, the real efficiency is hiding in your junk drawer. i saw some developers use Termux and Node.js to turn 3 watt devices into constant research hubs. by running npm install -g clawdbot, these discarded screens handle market monitoring and Telegram summaries without a break. 3 phones can roughly match the output of a Mac mini for almost 0 cost. this setup runs Clawdbot 24/7 to pipe private signal alerts directly to a primary device. i suspect the hardware bottleneck for autonomous agents is already dead. compute is now so cheap that our junk phones is sufficient!
Teng Yan · Chain of Thought AI tweet media
Chip.hl // Evgeny Yurchenko@chip1cr

I run Clawdbot on 3 old Android phones. Twitter research. Market monitoring. Telegram chats daily summaries. Private groups signals flashing to my main phone. Running on cheap models like glm-4-flash when ok to save on Claude sub Combined power: same as one Mac Mini. Cost: $0 total. That old phone in your drawer? Turn it into a 24/7 AI server: Download Termux from F-Droid. Run: pkg install nodejs-lts git npm install -g clawdbot clawdbot gateway start Remote access from your computer or main phone. Deploy skills. Cron jobs. Telegram bot. Code. 3-5W per device. Built-in UPS lmao! 🔥 Don't have one? Buy Redmi Note 10 Pro ($60). Pixel 4a ($80). Galaxy A52 ($100). Mac Mini energy. Junk drawer budget. VPS companies hate this setup too.

English
133
253
2.7K
294.5K
bugcrowd
bugcrowd@Bugcrowd·
One thing we hear over and over from this community: “Consistency pays off.” 💪 How long have you been in the game? No wrong answers.
English
5
2
56
6.2K
HUNTER أُعيد تغريده
Julian Goldie SEO
Julian Goldie SEO@JulianGoldieSEO·
Kimmy K2.5 just launched a local cloud model. And it runs Open Claw for FREE forever. No API costs. No token limits. No subscriptions. Here's the setup 👇 → Download Ollama at ollama.com. → Install Kimmy K2.5 cloud model. → Launch Open Claw with one command. → Runs locally but uses cloud processing. → Zero laptop slowdown. → Works on older machines perfectly. I just set it up in under 2 minutes. Zero configuration. Zero technical skills. Want the commands? DM me.
English
144
197
2.1K
238.6K
HUNTER أُعيد تغريده
Intigriti
Intigriti@intigriti·
Exploiting information disclosure vulnerabilities! 🤠
Intigriti tweet mediaIntigriti tweet mediaIntigriti tweet mediaIntigriti tweet media
English
3
6
84
5.5K
HUNTER أُعيد تغريده
Alex Prompter
Alex Prompter@alex_prompter·
the best 20 accounts to follow in AI: @karpathy = LLMs king @steipete = built openclaw @gregisenberg = startup ideas king @rileybrown = vibecode king @corbin_braun = cursor king @jackfriks = solo apps king @levelsio = solo startups king @marclou = solo startups king @EXM7777 = AI ops + systems king @eptwts = AI money twitter king @godofprompt = prompt king @vasuman = AI agents king @AmirMushich= AI ads king @0xROAS = AI UGCs king @egeberkina = AI images king @MengTo= AI landing pages king @rryssf_ = automations king @kloss_xyz = systems architecture king @emollick = AI science king @Hesamation = AI/ML king follow them all and learn.
English
324
1.4K
8.9K
1.1M
HUNTER أُعيد تغريده
Web Security Academy
Web Security Academy@WebSecAcademy·
Web security isn't just for security practitioners. It's essential for everyone involved in the web ecosystem. 🌐 Explore the world of web security and learn about real-world vulnerabilities! 30+ Topics, 100+ Labs. portswigger.net/web-security/a…
Web Security Academy tweet media
English
0
22
147
5.6K
HUNTER أُعيد تغريده
DEF CON
DEF CON@defcon·
The wait is over - online reg for DEF CON Singapore is open! It’s all happening at the Marina Bay Sands, April 28-30. You can learn all about it at defcon.org/html/defcon-si… Online registration will be open until April 24, but if you secure your spot before February 15 there’s an Early Bird discount available, along with a Student discount. DEF CON Singapore Training registration is open as well! Join us before the conference (April 26-27) if you’re looking to level up your skills with some intense, hands-on education from our world class trainers. Sessions and pricing are online at training.defcon.org. Tickets for the conference and the trainings are waiting for you at sg.shop.defcon.org. See you in Singapore!
DEF CON tweet media
English
3
27
158
18.9K
HUNTER أُعيد تغريده
Intigriti
Intigriti@intigriti·
Most hackers limit themselves to only using proxy interceptor, repeater, and intruder... 🤠 But these 8 unpopular Burp Suite features can save you hours of testing time (and find you more vulnerabilities)! 🤑 A thread! 🧵👇
Intigriti tweet media
English
2
62
314
21.3K
HUNTER أُعيد تغريده
Intigriti
Intigriti@intigriti·
Want to find more vulnerabilities using BurpSuite match & replace rules? 🤑 Open this thread! 🧵 👇
Intigriti tweet media
English
6
180
714
59K