Thee Eclipse

259 posts

Thee Eclipse banner
Thee Eclipse

Thee Eclipse

@Thee_Eclipse

👻Hackers are real, monsters are real too, they live inside us and sometimes... They win!!

Cyber Ghost , Io Katılım Ocak 2020
846 Takip Edilen1.1K Takipçiler
Thee Eclipse retweetledi
spaceraccoon | Eugene Lim
spaceraccoon | Eugene Lim@spaceraccoon·
Vulnerability-spoiler-alert has detected its first two live “negative-days” in Grafana! CVE-2025-41117 (XSS) and CVE-2026-21722 (Privesc) are still unpublished right now, but is detectable via commits in the open-source repo. That’s at least 1 hour early. PoCs and more at vulnerabilityspoileralert.com
spaceraccoon | Eugene Lim tweet mediaspaceraccoon | Eugene Lim tweet mediaspaceraccoon | Eugene Lim tweet mediaspaceraccoon | Eugene Lim tweet media
English
0
27
206
12.2K
Thee Eclipse
Thee Eclipse@Thee_Eclipse·
🎲My 2025 Hacking Recap on @Hacker0x01 🎲 Got the Global 70Th and 1st for my country #Kenya 🇰🇪. I did not achieve all the personal milestones but it was a successful year with 100+ validated hacking instances. 2026: Work on high and critical hacking ONLY #Hacking #Cybsecurity
Thee Eclipse tweet mediaThee Eclipse tweet media
English
2
0
11
528
Thee Eclipse retweetledi
zere
zere@j_zere·
Just published my first blog post "Cache Deception + CSPT: Turning Non Impactful Findings into Account Takeover" You can read the full write-up here: zere.es/posts/cache-de…
English
26
141
589
49.7K
Thee Eclipse retweetledi
Critical Thinking - Bug Bounty Podcast
GCP’s instance metadata service is still one of the most interesting targets in cloud environments. SSRF protections look strong on paper but subtle parsing quirks can break them completely. Three neat bypasses: [image] What makes these relevant in 2025 is not the exact payloads (patched long ago) but the thought process: - Protocol mismatches (HTTP/1.0 vs HTTP/1.1) - URL normalization differences - Parsers discarding parts of a path (; or //)
Critical Thinking - Bug Bounty Podcast tweet media
English
6
44
231
14.6K
Thee Eclipse retweetledi
Jenish Sojitra
Jenish Sojitra@_jensec·
#bugbountytips #bugbounty How I was able to find multiple critical vulnerabilities to get Full Account Takeover with the help of PlayStore and AppStore region settings.
Jenish Sojitra tweet media
English
24
238
812
0
Thee Eclipse retweetledi
Rikesh Baniya
Rikesh Baniya@rikeshbaniya·
need uuid but cant find it anywhere ?? just go to target's community discord server ton of people are pasting their error message/screenshots asking for help😂 #bugbounty #bugbountytips
Rikesh Baniya tweet mediaRikesh Baniya tweet media
English
30
41
417
35.7K
stockfish
stockfish@trevorsaudi·
I think we’re close to a possible high/crit (big maybe) then here comes cloudflare with a 1 hour ban for every 3 req🤣
English
2
2
12
919
Thee Eclipse retweetledi
Masato Kinugawa
Masato Kinugawa@kinugawamasato·
lol, this works on Firefox: <object data=# codebase=javascript:alert(document.domain)//> OR <embed src=# codebase=javascript:alert(document.domain)//>
English
9
68
469
41.6K
Thee Eclipse retweetledi
Alex
Alex@enenumxela·
xcrawl3r: Give It a Spin! Unlike xurlfind3r, xcrawl3r interacts directly with the target by spidering its pages. This approach allows it to discover URLs that may be hidden or unindexed, providing a complete picture of the website’s navigational flow and content distribution.
Hueristiq@0xHueristiq

🔎Discover URLs passively & effortlessly with ✨xcrawl3r✨ 👉xcrawl3r is a command-line utility designed to recursively spider webpages for URLs. 📌github.com/hueristiq/xcra… #InfoSec #Cybersecurity #Pentesting #BugBounty #RedTeaming

English
0
3
5
817