root@asjid:~/ #

@0dinshell

Infosec enthusiast | CTF | Full stack web developer | CS Undergraduate

localhost
Vrijeme pridruživanja: kolovoz 2018.

Tweetovi

Blokirali ste korisnika/cu @0dinshell

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0dinshell

  1. proslijedio/la je Tweet
    20. sij

    Happy to announce that you now can find the lecture notes for my Hardware and Embedded Systems Security course online, including tex sources:

    Poništi
  2. proslijedio/la je Tweet
    7. sij
    Poništi
  3. proslijedio/la je Tweet

    Iran’s cyber capabilities are actually fairly sophisticated. Assuming skid hacktivism is nation/state CNO just makes you look naive.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet

    The people laughing because they think some random skid defacing a website is Iran’s response to the recent strikes need to read up on Iranian APTs.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    7. lis 2019.

    XSS using Image file SVG 1. SVG files can be treated as images in HTML 2. SVG files also support inline javascript code 3. website loads a SVG file with an XSS payload it will get executed

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    17. lis 2019.

    I saw lots of payloads for RCE on Flask SSTI, but I really think mine is the simplest 😅 {{config.__class__.__init__.__globals__['os'].popen('ls').read()}} Have Fun 🤓

    Poništi
  7. proslijedio/la je Tweet
    31. pro 2019.

    I just published FALCON STRIKE my first experience on at event thanks to amrita for such a great event and the Arduino kit <3

    Poništi
  8. proslijedio/la je Tweet
    30. pro 2019.
    Poništi
  9. 21. pro 2019.
    Poništi
  10. proslijedio/la je Tweet
    18. pro 2019.
    Odgovor korisniku/ci
    Poništi
  11. proslijedio/la je Tweet
    16. pro 2019.

    Looking for a python challenge over the holiday break? Here is my python CTF challenge that can be solved more than one way:

    Poništi
  12. proslijedio/la je Tweet
    13. pro 2019.

    I wrote a thing about JSC exploitation (including how to leak StructureID) and Safari sandbox escape.

    Poništi
  13. 8. pro 2019.
    Poništi
  14. proslijedio/la je Tweet
    4. pro 2019.

    Ten hours. $1,330,000 raised to save the lives of children with cancer. We DID that, you guys! This is the power of online communities. This is the change we stand for. I am overwhelmed with gratitude.

    Our Tiltify campaign total showing $1,331,816 donated of our $900,000 goal
    , , i još njih 7
    Poništi
  15. proslijedio/la je Tweet
    27. stu 2019.

    hoping this guy succeeds

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    15. lis 2019.

    Can we please stop talking about that sudo bug? It only affects systems using an insane configuration (allow $command as anyone *but* root). I can't come up with any situation where that configuration makes any sense (vs e.g. "allow $command as any member of a given group).

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet

    My nominee for cashier of the year.

    Poništi
  18. proslijedio/la je Tweet
    3. lis 2019.

    GIF Image Could Have Hacked Your Android Phone Using WhatsApp CVE-2019-11932 Does not get triggered by sending a mal GIF file to a victim instead it gets executed when the victim itself simply opens the WhatsApp Gallery Picker

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·