r0adrunn3r

319 posts

r0adrunn3r

r0adrunn3r

@RoadRunnerHacks

😎 Remote Shell Lover 👩🏻‍💻 x Runner 🌳 x Globe Traveler 🌎

Katılım Temmuz 2019
365 Takip Edilen2.7K Takipçiler
r0adrunn3r retweetledi
Intigriti
Intigriti@intigriti·
XXE vulnerabilities are seemingly harder to detect... 😓 Yet they still remain an impactful vulnerability class worth testing for! In our latest article, we've outlined 8 different XXE exploitation cases! 😎 Read the article today! 👇 buff.ly/Ita0K2U
Intigriti tweet media
English
5
39
219
11.3K
r0adrunn3r retweetledi
Intigriti
Intigriti@intigriti·
🚀 Last week, we hosted an OpenPort event with Grafana Labs 🚀 Ten researchers met the team onsite and hacked on their program. At the end of the day, we had much fun with food, beers, and beats. A proper LAN party! 😎 Grafana's public bug bounty program 👉 app.intigriti.com/programs/grafa… Thank you to all who joined 💙 #HackWithIntigriti #BugBounty #Cybersecurity
Intigriti tweet media
English
1
6
45
4.7K
r0adrunn3r
r0adrunn3r@RoadRunnerHacks·
@0xErubius Then we should have some amazing surprises for you 💜
English
1
0
2
79
jp / kw0
jp / kw0@JoshuaProvoste·
Thinking about leaving @Hacker0x01, the first choice was @intigriti; I logged back in and found a report on an attack vector I’d invented to bypass Active Directory authentication. To my surprise, it had been open for 4 years (😂). Any help to contact mrbombastic? #bugbounty
jp / kw0 tweet media
English
3
0
53
7K
r0adrunn3r retweetledi
0xdf
0xdf@0xdf_·
TIL: grep.app is awesome! Super fast grep across half a million git repos! grep.app
English
4
49
243
19.7K
r0adrunn3r retweetledi
Synack Red Team
Synack Red Team@SynackRedTeam·
Interested in joining the Synack Red Team? Applicants can speed up their application process through our various SRT Pathways! Today, we’re featuring @PortSwigger and its Burp Suite Certified Practitioner (BSCP) pathway. Click here to learn more → hubs.ly/Q02G10s80
Synack Red Team tweet media
English
2
7
27
3.2K
Project Sekai CTF
Project Sekai CTF@ProjectSEKAIctf·
Last weekend we played DiceCTF finals onsite with @r3kapig and finished 5th place. We got 1st in dice-diary and 2nd in dice-grid. Thanks to @dicegangctf for the great event! Huge congrats to @idekCTF for winning, and our HS team @vsctf for 6th overall and 1st in HS division!
Project Sekai CTF tweet mediaProject Sekai CTF tweet mediaProject Sekai CTF tweet mediaProject Sekai CTF tweet media
English
2
6
59
3.3K
r0adrunn3r retweetledi
Intigriti
Intigriti@intigriti·
Who introduced you to bug bounties? And when? 🤠
English
25
3
52
12.5K
Luke Stephens (hakluke)
Luke Stephens (hakluke)@hakluke·
Does anyone else get this thing where you stay up late and they're suuuper tired the next day, but then as soon as night-time hits you have loads of energy again?
English
21
1
86
10.2K
r0adrunn3r retweetledi
mpgn
mpgn@mpgn_x64·
Me helping my team during a ctf
GIF
English
3
2
57
4.1K
r0adrunn3r retweetledi
Hunter
Hunter@HunterMapping·
🚨Alert🚨CVE-2024-3400: Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect(CVSS: 10) ⚠It enables an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. 📊 371K+ Services are found on Hunter.how 🔗Hunter Link: hunter.how/list?searchVal… 📰Deep Dive: unit42.paloaltonetworks.com/cve-2024-3400/… 👇Query Hunter: /product.name="GlobalProtect Portal" FOFA: app="paloalto-GlobalProtect" SHODAN: title:"GlobalProtect Portal" #paloalto #GlobalProtect #hunterhow #infosec #infosecurity #Infosys #Vulnerability
Hunter tweet media
English
2
85
277
62.1K