clumps (@idistend) 's Twitter Profile
clumps

@idistend

A wanabee hacker, learning how to break web tech stuff legally.

ID: 1735920357721231360

calendar_today16-12-2023 07:10:50

358 Tweet

223 Followers

135 Following

James Kettle (@albinowax) 's Twitter Profile Photo

I was nervous about researching timing attacks because they have a reputation of rarely working outside lab conditions. Even if my techniques worked, there was a risk people wouldn't give them a chance. Hence my slightly snarky subtitle "Timing attacks that actually work" 😂

STÖK ✌️ (@stokfredrik) 's Twitter Profile Photo

Men, If it feels scary, do it If it feels uncomfortable, do it If it feels hard, do it If if causes uncertainty. do it If it pushes you to your edge, do it Growth awaits, embrace it

Luke Stephens (hakluke) (@hakluke) 's Twitter Profile Photo

If you're a hacker, and you feel bad about not knowing everything, listen up: No one knows everything. No one. The best hackers in the world only know a tiny fraction of everything there is to know about hacking.

Jason Haddix (@jhaddix) 's Twitter Profile Photo

A freebie from next weeks tbhmlive.com - my revisions to renniepak 's javascript parsing bookmarklet. 1⃣ Create any bookmark in Chrome 2⃣ Right click edit it 3⃣ Rename jsparser and paste the js from the Gist in the URL section. Viola. Visit a site and click the

Masonhck357 (@masonhck3571) 's Twitter Profile Photo

Remember, with hacking you must always stay curious, embrace challenges, and learn from every experience. Every step forward is progress. You've got this!

Alsanosi (@01alsanosi) 's Twitter Profile Photo

When hunting for vulnerabilities, one effective method is to look for internal domains exposed through SSL certificates . This can reveal internal infrastructure or services that might be accessible due to misconfigurations or overlooked security measures. #bugbountytips

When hunting for vulnerabilities, one effective method is to look for internal domains exposed through SSL certificates . This can reveal internal infrastructure or services that might be accessible due to misconfigurations or overlooked security measures. 
#bugbountytips
Hussein Daher (@hussein98d) 's Twitter Profile Photo

It all starts with little habits and discipline. Small steps lead to great achievements. Set some small goals that look easy to do for 1 week, then increase for the next week and so on.

James Kettle (@albinowax) 's Twitter Profile Photo

The whitepaper is live! Listen to the whispers: web timing attacks that actually work. Read it here -> portswigger.net/research/liste…

Jayesh Madnani (@jayesh25_) 's Twitter Profile Photo

Bug Bounty Tips: Extract API Endpoints and Construct Complex HTTP Requests from JavaScript Files Using AI Stuck analyzing complex JS files while manually hunting on a target and can't figure out how to construct those GET/POST requests? 🤯 No fancy tools needed! 👉 Quick tip: