Roll4Combat (@badat_computers) 's Twitter Profile
Roll4Combat

@badat_computers

Penetration Tester / Bug Bounty Hunter

ID: 1417591495838810118

linkhttps://www.linkedin.com/in/roll4combat/ calendar_today20-07-2021 21:05:47

1,1K Tweet

1,1K Followers

1,1K Following

Jason Haddix (@jhaddix) 's Twitter Profile Photo

On June 23rd i'll be giving my "Credential Operations" / "Operationalizing Cybercrime Data for Red Teamers and Offsec" training for FREE! It's gonna be 🔥🔥🔥 Registration link in 1st reply 👇

On June 23rd i'll be giving my "Credential Operations" / "Operationalizing Cybercrime Data for Red Teamers and Offsec" training for FREE! 

It's gonna be 🔥🔥🔥

Registration link in 1st reply 👇
shubs (@infosec_au) 's Twitter Profile Photo

IP whitelisting is fundamentally broken. At Assetnote, we've successfully bypassed network controls by routing traffic through a specific location (cloud provider, geo-location). Today, we're releasing Newtowner, to help test for this issue: github.com/assetnote/newt…

Bug Bounty Village (@bugbountydefcon) 's Twitter Profile Photo

Only ONE WEEK left to join as a sponsor of Bug Bounty Village at DEF CON 33. The deadline is June 15. If your team wants a presence in the heart of hacker-led security research, now's the time. Reach out and let's make it happen. #BugBounty #DEFCON #BBV #BugBountyVillage

Blaklis (@blaklis_) 's Twitter Profile Photo

Hey the community! I feel the need to react to x.com/GodfatherOrwa/…, as it targets me specifically and is doing a clear defamation there. I guess it's useless to say that the claims of me telling that I'll block people based on the fact that they're muslim is a complete lie,

Hey the community!

I feel the need to react to x.com/GodfatherOrwa/…, as it targets me specifically and is doing a clear defamation there.

I guess it's useless to say that the claims of me telling that I'll block people based on the fact that they're muslim is a complete lie,
Harley (@infinitelogins) 's Twitter Profile Photo

This week, Disclosed. Shubs wins the LHE with Salesforce. Free NahamCon talks. Tools for fuzzing, IP whitelisting, and JWT automation. Plus: SSRF in Lichess, OAuth deep dives, and the return of leHACK. Full issue + links → getdisclosed.com Highlights below 🧵

John Wilander 🇺🇦 (@johnwilander) 's Twitter Profile Photo

Create and run Linux containers as lightweight virtual machines on your Mac with Container. Open source, written in Swift, and optimized for Apple silicon. No Docker or similar needed. · GitHub repo: github.com/apple/container · Intro presentation: developer.apple.com/videos/play/ww…

Roll4Combat (@badat_computers) 's Twitter Profile Photo

Trying but failing miserably. If I can get caught up this weekend while trying to move then I’ll consider actually working normal hours.

arthur aires (@arthurair_es) 's Twitter Profile Photo

I really like the tools built by / XNL -н4cĸ3r (and @xnl-h4ck3r in the new Sky) , they have certainly helped me many times during my tests. If you like his tools and can support his development: ko-fi.com/xnlh4ck3r

Jason Haddix (@jhaddix) 's Twitter Profile Photo

Check out the newest episode of the MLSecOps podcast where I talk about assessing AI enabled applications! 🔗Transcript, audio/video, and links to episode resources available at bit.ly/43Ils3Q

Jason Haddix (@jhaddix) 's Twitter Profile Photo

I re-wrote all my recon tools to include benchmarking. There is difference between how normal people find sub domains and how I find subdomains:

I re-wrote all my recon tools to include benchmarking. 

There is difference between how normal people find sub domains and how I find subdomains:
Jason Haddix (@jhaddix) 's Twitter Profile Photo

This is a fantastic read about how the world is changing and how @[email protected] would approach his career starting over in the now. I agree with 100% of his advice. securing.dev/posts/if-i-wer…