03xNeo

149 posts

03xNeo banner
03xNeo

03xNeo

@fundi_111

Blockchain nerd and student

Katılım Temmuz 2025
410 Takip Edilen23 Takipçiler
Sabitlenmiş Tweet
03xNeo
03xNeo@fundi_111·
Nothing more to lose, it's all or nothing. I'm going all in.
English
0
0
1
10
Moshood Bushroh
Moshood Bushroh@Beauty23644·
Back to documenting my progress. Worked on a really interesting topic today, authentication-based vuln, focused on brute force attacks. After learning the basics of app sec from Cisco, I continued my journey on PortSwigger, and I’m getting more comfortable using Burp Suite.
Moshood Bushroh tweet mediaMoshood Bushroh tweet media
English
1
2
15
438
Anthropic
Anthropic@AnthropicAI·
Our security bug bounty program is now public on HackerOne. We've run the program privately within the security research community, and their findings have strengthened our products. Now anyone can report vulnerabilities and get rewarded. Read more: hackerone.com/anthropic
English
219
532
4.5K
932K
03xNeo
03xNeo@fundi_111·
Successfully completed SQL injection, command injection and authentication vulnerability labs on portswigger Idk, is this enough to start hunting for bugs? 😄 looking forward to more learning and hunting
English
0
0
2
20
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 Microsoft calls this "intended behaviour," so here we go. How to dump the credentials of every user stored in Microsoft Edge: 1. Open Edge. Don't browse anywhere, just open it. 2. Flip to Task Manager, find Edge, expand the task. 3. Highlight the "browser" sub-task, right-click, and choose "Create Memory Dump." 4. Open the dump file and look for credentials. The logged-in Windows user can dump every stored Edge credential with no additional rights. Which means any malware that user executes has those credentials for the asking. Thanks to Rob VandenBrink at SANS: isc.sans.edu/diary/32954
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
290
2.4K
13.5K
1.1M
03xNeo
03xNeo@fundi_111·
@SharathKumarK00 @VivekIntel I wonder why windows blocked the download, considering the payload doesn't execute automatically when I download the zip file
English
0
0
0
7
Sharath Kumar K
Sharath Kumar K@SharathKumarK00·
@fundi_111 @VivekIntel Content of repository contain code or snippets for sql injection attacks that's why it triggered antivirus
English
1
0
0
17
Vivek | Cybersecurity
Vivek | Cybersecurity@VivekIntel·
💉 Advanced SQL Injection Cheatsheet — SQLi Reference • MySQL, MSSQL, PostgreSQL, Oracle • Error, Union, Blind, Time-based • WAF bypass • LFI via SQLi • Privilege escalation • Payload tricks Flow: Find → Analyze → Bypass → Dump github.com/kleiton0x00/Ad… ⚠️ Authorized use only #SQLi #CyberSecurity
English
4
65
273
11.2K
si🌗
si🌗@security_index·
Googleのバグバウンティで報奨金 $31,337 ゲット✌️ Thank you @GoogleVRP !
si🌗 tweet media
日本語
32
39
1.3K
87.6K
A3R4H4M
A3R4H4M@abrahamonchain·
What if Lazarus Group opens a virtual school to teach hacking, social engineering etc Will you learn from them? Me I'll learn oooooo 😂 😂 😂 Wbu? 🙌
English
15
0
35
1.2K
playboi.eth
playboi.eth@adeolRxxxx·
I took my mom on a date today, she was so happy. I also got to relax after some heated private audits back to back. Motion can’t be stopped. Back to xrp.
playboi.eth tweet mediaplayboi.eth tweet mediaplayboi.eth tweet mediaplayboi.eth tweet media
English
71
16
736
22.4K
Prasenjit
Prasenjit@Star_Knight12·
every decade has a thing 2000 → Social Media 2010 → Crypto 2020 → AI 2030 → ???
English
392
23
571
73.4K
Pashov Audit Group
Pashov Audit Group@PashovAuditGrp·
keep scrolling bro im sure the next post will help you find that Critical in the smart contracts code
English
7
10
96
3.8K