![Joe Leon Profile](https://pbs.twimg.com/profile_images/1394675396742836230/UkVkjcGS_x96.jpg)
Joe Leon
@JoeLeonJr
Followers
19K
Following
218
Statuses
75
RT @thebinarybot: Here's a couple of things worth a try to get an IDOR Comment below if you've other useful tips & techniques. 🧵👇 #bugbo…
0
106
0
RT @securitytrails: Black Friday is here! Get FREE recurring API credits if you like + retweet this tweet. If we get up to 100 RTs everyon…
0
421
0
RT @securitytrails: Black Friday warmup🔥 Get a chance to win a SecurityTrails swag pack: Comfy t-shirt ✔️ Classic (and a favorite) hacker…
0
228
0
Finished my first week part-time bounty hunting with @synack on the @SynackRedTeam. It’s been an awesome experience and the VulnOps triage team is world class!
0
0
0
RT @RachelTobac: Hitting F12 in a browser is not hacking. If your code leaks personal data via public development tools that any person can…
0
732
0
RT @PortSwigger: 🎵 If you're having cert issues I feel bad for ya son, I got $99 problems but the bill ain't one...🎵 All you have to do is…
0
36
0
RT @nomanramzan91: Burp Suite > Proxy > Options > TLS Pass Through. Add these: .*\.google\.com .*\.gstatic\.com .*\.mozilla\.com .*\.googl…
0
361
0
RT @33y0re: Trying to get into .NET lately I ended up putting together a new project as a result. LittleCorporal is an automated Maldoc ge…
0
119
0
RT @jonasLyk: yarh- for some reason on win11 the SAM file now is READ for users. So if you have shadowvolumes enabled you can read the sam…
0
404
0
RT @_batsec_: I've written a tool to escalate from domain user to a full AD compromise using ESC8 by @SpecterOps. You can see in the pictur…
0
312
0
RT @_Hubbl3: Along with the release of our blog post on #XLSEntanglement we have published a git repo with POC code and some examples htt…
0
58
0
Got some feedback that a guide to customizing C2Concealer would be helpful, so this is part 1/3 in a series on how to customize our tool to automatically generate c2 malleable profiles for #cobaltstrike
New blog post: a guide on customizing C2Concealer! We hope you find it useful. Thank you @JoeLeonJr #CyberSecurity #infosec #cobaltstrike
0
0
1
RT @phraaaaaaa: Process Creation is Dead, Long Live Process Creation — Adding BOFs Support to PEzor Since the release of Beacon Object Fil…
0
138
0
RT @mrd0x: Finally ready! Check out to find out what file extensions are being used by attackers and in what way. D…
0
15
0
RT @s0md3v: If you find an SSRF vulnerability in an ASP application, try reading trace.axd file. It contains logs of HTTP requests, you can…
0
163
0