RadvanSec – Telegram
RadvanSec
990 subscribers
181 photos
27 videos
143 files
595 links
"Security is Just an Illusion"
" امنیت فقط یک توهم است "

RadvanSec.com

Youtube , Instagram : @RadvanSec
Download Telegram
NodeJS_Sec_for_WebApp.pdf
2.4 MB
#Tech_book
#WebApp_Security
"Essential Node.js Security for Express Web Applications", 2023.

// This book aims to equip existing Node.js developers, both beginners and experienced, with expertise and skills in security best practices. The book takes a practical hands-on approach to the Node.js ecosystem by using a good deal of source code examples, as well as leveraging and reviewing well tested and commonly used libraries and industry security standards

⭐️ @Zerosec_team
3🔥1
Hi everyone, I’ve set up the watcher to run about 6 times a day, roughly every 4 hours, so you’ll get the most effective coverage possible

سلام بچه ها واچر رو تنظیم کردم روزی 6 بار ران میشه حدودا هر 4 ساعت یکبار تا بتونید موثر ترین حالت ممکن رو پوشش بدید

Watcher Report : @ZeroSec_group

⭐️ @ZeroSec_team
👍2🔥21
اینو یه هندی گذاشته بود گفتم براتون بزارم 🤣🤣

⭐️ @ZeroSec_team
😁81
📊 Watcher Summary Report

🔹 BUGCROWD: 0 new item
🔹 HACKERONE: 0 new item
🔹 INTIGRITI: 1 new item
🔹 YESWEHACK: 0 new item
🔹 FEDERACY: 0 new item

🔗 Details: Click here

#zerosec #bugbounty #watcher #summary_report


⭐️ @ZeroSec_team
2
Daily dorking on LLMs can provide you with good bugs, especially from the data disclosures of these AI models

⭐️ @ZeroSec_team
👍4🔥21
📊 Watcher Summary Report

🔹 BUGCROWD: 0 new item
🔹 HACKERONE: 90 new items
🔹 INTIGRITI: 1 new item
🔹 YESWEHACK: 0 new item
🔹 FEDERACY: 0 new item

🔗 Details: Click here

#zerosec #bugbounty #watcher #summary_report


⭐️ @ZeroSec_team
2🔥1
📊 Watcher Summary Report

🔹 BUGCROWD: 0 new item
🔹 HACKERONE: 91 new items
🔹 INTIGRITI: 1 new item
🔹 YESWEHACK: 0 new item
🔹 FEDERACY: 0 new item

🔗 Details: Click here

#zerosec #bugbounty #watcher #summary_report


⭐️ @ZeroSec_team
👍1
Bug Bounty Reports Extractor - CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.

https://github.com/newstartlikenoneanthor-pixel/report-extractor

⭐️ @Zerosec_team
1
📊 Watcher Summary Report

🔹 BUGCROWD: 0 new item
🔹 HACKERONE: 91 new items
🔹 INTIGRITI: 1 new item
🔹 YESWEHACK: 0 new item
🔹 FEDERACY: 0 new item

🔗 Details: Click here

#zerosec #bugbounty #watcher #summary_report


⭐️ @ZeroSec_team
3😁1
📊 Watcher Summary Report

🔹 BUGCROWD: 1 new item
🔹 HACKERONE: 92 new items
🔹 INTIGRITI: 1 new item
🔹 YESWEHACK: 1 new item
🔹 FEDERACY: 0 new item

🔗 Details: Click here

#zerosec #bugbounty #watcher #summary_report


⭐️ @ZeroSec_team
TLP_CLEAR_BtHoster_Identifying_noisy_networks_emitting_malicious.pdf
5.7 MB
Evolution of Tycoon 2FA Defense Evasion Mechanisms: Analysis and Timeline

Blog : https://any.run/cybersecurity-blog/tycoon2fa-evasion-analysis/

⭐️ @ZeroSec_team
👍2🔥1
📊 Watcher Summary Report

🔹 BUGCROWD: 1 new item
🔹 HACKERONE: 96 new items
🔹 INTIGRITI: 1 new item
🔹 YESWEHACK: 1 new item
🔹 FEDERACY: 0 new item

🔗 Details: Click here

#zerosec #bugbounty #watcher #summary_report


⭐️ @ZeroSec_team
👍1
In this video, we solve the PortSwigger Web LLM Attack lab step by step.
🔹 Learn what Web LLM Attack is
🔹 See how to exploit it on the PortSwigger lab
🔹 Understand how this vulnerability can be applied in real-world scenarios

This video is perfect for anyone looking to improve their skills in web hacking, bug bounty, and penetration testing.

📌 Topics & Tags:
#WebLLMAttack #PortSwigger #WebSecurity #BugBounty #Hacking

💡 Tip: Don’t forget to like, comment, and subscribe for more web security tutorials!

https://www.youtube.com/watch?v=-UdUgl0pv4w

⭐️ @ZeroSec_team
2🔥1👌1
📊 Watcher Summary Report

🔹 BUGCROWD: 0 new item
🔹 HACKERONE: 11 new items
🔹 INTIGRITI: 0 new item
🔹 YESWEHACK: 0 new item
🔹 FEDERACY: 0 new item

🔗 Details: Click here

#zerosec #bugbounty #watcher #summary_report


⭐️ @ZeroSec_team
3
سلام دوستان رایتاپ باگ هایی که این ماه خودتون زدید رو بفرستید بهتریناشو بزاریم کانال
لینک گپ :‌
@ZeroSec_group
4
با توجه به آمارها، حدود ۸۰٪ از دسترسی اولیه (Initial Access) به سیستم‌ها از طریق حملات مهندسی اجتماعی و phishing صورت می‌گیرد.
مجموعه‌ای از چهار کتاب مرجع و کلیدی در حوزه مهندسی اجتماعی و فیشینگ آماده کرده‌ایم که از امروز به لیست منابع سایت اضافه شدند. توضیحات تکمیلی این کتاب‌ها به زودی در سایت و کانال منتشر خواهد شد.

📚 کتاب‌های معرفی شده:

The Art of Deception
The Science of Human Hacking
Phishing Dark Waters
Ghost in the Wires

⭐️ @ZeroSec_team
5🔥1