Raju

230 posts

Raju banner
Raju

Raju

@Cyr33n

Security practitioner | CTFs | Girl in IT

Tanzania Katılım Mayıs 2021
734 Takip Edilen1.1K Takipçiler
Raju retweetledi
OffSec
OffSec@offsectraining·
🔍⬆️ Ready to level up your PEN-200 skills? Join us for our next #OffSecLive session where we’ll walk through the PG Practice Apex machine, step by step. From information gathering to public exploits, fixing code, and tackling password attacks, this session is packed with hands-on techniques and real-world insight. Perfect for aspiring OSCPs and anyone sharpening their offensive security skills! 📅 Don’t miss it! 👉🔗 offs.ec/45iow7Y #TryHarder #PGPractice #OSCPJourney #InfoSecTraining #CyberSkills
OffSec tweet media
English
5
13
65
7.5K
Raju retweetledi
urchinsec
urchinsec@urchinsec_·
We have just released our official writeup for the UrchinSec DTS Finals CTF challenge: 🔥 @urchinsec/urchinsec-dts-winkey" target="_blank" rel="nofollow noopener">hackmd.io/@urchinsec/urc…
English
1
5
17
583
Raju retweetledi
urchinsec
urchinsec@urchinsec_·
🥳Today was the UrchinSec DTS Finals CTF!🥳 Congratulations @AlexiusSamson , masscos99, stuxnet8 and cyrange for winning the competition and receiving the prize of 700k TZS!🎊 And congratulations to everybody who participated in both the semi-finals and the finals!🎊🎊
urchinsec tweet media
English
0
6
25
1.2K
Raju retweetledi
OffSec
OffSec@offsectraining·
Join the #ShePwns movement. offs.ec/4hRNtdB We're championing #womenincyber by providing the knowledge and tools to strengthen their career prospects at every level. Hear from women shaping cybersecurity across all backgrounds, including industry leaders, practitioners, and OffSec-certified professionals, and join our Learn One giveaway!
OffSec tweet media
English
2
13
40
9.3K
Raju retweetledi
urchinsec
urchinsec@urchinsec_·
UrchinSec CTF DTS (Dominating The Servers) is here!! Participate now with your team and have a chance to win 500,000 TZS!🔥 Note: Only Tanzanians are eligible for prizes.👨🏾‍💻 To participate on the semi-finals, register your team now at ctf.urchinsec.com, robots are noisy😉
urchinsec tweet media
English
0
9
31
1.4K
Raju retweetledi
urchinsec
urchinsec@urchinsec_·
We wish you a happy new year!🎊
urchinsec tweet media
English
0
5
24
866
Raju retweetledi
The XSS Rat - Proud XSS N00b :-)
Here is a list of 100 web and API exploits every bug bounty hunter should know: thexssrat.podia.com/christmas2024?… Tell me which ones I missed in a comment <3 1–25: Authentication and Session Management =================================== SQL Injection in Login Forms Password Reset Token Hijacking Weak Password Policy Broken Authentication Brute Force Attacks Session Fixation Cookie Theft Improper Logout Mechanism Token Mismanagement (JWT, OAuth, etc.) Credential Stuffing Default Credentials Sensitive Data Exposure in Session Session Expiry Mismanagement Open Redirect Exploitation in Login Workflows Single Sign-On (SSO) Bypass Replay Attacks Lack of MFA Enforcement Exposed Admin Panels Weak Captcha Implementations Insecure Password Storage Privilege Escalation via Session ID Account Takeover (ATO) Misconfigured Logout from Multiple Devices Reset Link Parameter Manipulation Session ID Enumeration 26–50: Injection Attacks =================================== SQL Injection (Classic, Blind, Time-based) NoSQL Injection Command Injection XPath Injection LDAP Injection XML External Entity (XXE) Injection Server-Side Template Injection (SSTI) Code Injection CRLF Injection Path Traversal Log Injection Second-Order SQL Injection HTML Injection Insecure Deserialization Remote File Inclusion (RFI) Local File Inclusion (LFI) Blind XXE Attacks HQL Injection GraphQL Query Injection Content Injection Data Manipulation through Injection Shell Injection XQuery Injection Email Header Injection Expression Language Injection 51–75: Cross-Site Vulnerabilities =================================== Cross-Site Scripting (XSS) Reflected XSS Stored XSS DOM-based XSS Self-XSS JSONP-based XSS Clickjacking Content Security Policy (CSP) Bypass CSRF (Cross-Site Request Forgery) Cross-Origin Resource Sharing (CORS) Misconfiguration Browser Autofill Exploitation PostMessage Exploitation Subdomain Takeover Cross-Site Script Inclusion (XSSI) SOP Bypass Techniques Open Redirects Web Cache Poisoning Mixed Content Exploitation JSON Hijacking Cross-Site WebSocket Hijacking Tabnabbing Iframe Sandbox Bypass DOM Clobbering Browser Plugin Exploitation UI Redressing Attacks 76–100: API-Specific Exploits =================================== Mass Assignment Rate-Limiting Bypass IDOR (Insecure Direct Object Reference) Unrestricted File Uploads Improper JSON Parsing Excessive Data Exposure GraphQL Introspection Misconfigurations API Key Leakage Improper Input Validation Lack of Output Encoding Broken Object Level Authorization Broken Function Level Authorization Improper Use of API Gateway Misconfigured Rate Limiting Unencrypted Data Transfer Overly Permissive CORS Race Condition Exploits Lack of Scope Enforcement in OAuth Improper Error Messaging API Endpoint Enumeration Method Overriding Hidden Parameters in API Requests Webhooks Exploitation Improper Use of HATEOAS JWT Token Manipulation
English
0
13
75
3.6K
Raju retweetledi
urchinsec
urchinsec@urchinsec_·
It's Cybersecurity Awareness Month🔥 we are hosting a 48-hours CTF (Jeopardy-Style)😎, Awards: 1st Winner - eJPT Voucher + $50 2nd Winner - HTB Pro-Lab Month Voucher 3rd Winner - THM VIP Voucher Register now at ctf.urchinsec.com with code : cyber_security_aw4renessM0nth
urchinsec tweet media
English
2
13
55
2.8K
Raju retweetledi
urchinsec
urchinsec@urchinsec_·
Hello Cybersecurity enthusiasts, Professionals and CTF players. We have just launched our archive for our previous and upcoming CTFs where you can access then and practice their skille through our challenges. Visit : archive.urchinsec.com
English
2
10
16
1.1K
nich0laus 🎭
nich0laus 🎭@nicl4ssic·
Thrilled to announce that I have passed @ine Junior Penetration Tester exam!
nich0laus 🎭 tweet media
English
16
2
28
1.4K
Tahaa Farooq
Tahaa Farooq@tahaafarooq·
Happy to announce, I have just earned my RTO 1 badge marking me as a Certified Red Team Operator (CRTO)!
Tahaa Farooq tweet mediaTahaa Farooq tweet media
English
13
8
58
2.9K
Tahaa Farooq
Tahaa Farooq@tahaafarooq·
Today I had an awesome opportunity to talk about "opportunities in cybersecurity as a developer" more of how to apply the mindset into coping with cybersecurity at the OPEN SOURCE UNLEASHED TANZANIA.I Gave a simple roadmap and met awesome guys @machuche1 @karimnyumba @nicl4ssic
Tahaa Farooq tweet mediaTahaa Farooq tweet media
English
6
8
68
1.8K