Warlord

@0verflowme

CTF Noob | Love to find BUGS | Gamer | Musicphile

414141414141 in ??( )
Vrijeme pridruživanja: travanj 2016.
Rođen/a 23. studenoga

Tweetovi

Blokirali ste korisnika/cu @0verflowme

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0verflowme

  1. Prikvačeni tweet
    2. sij

    ✨New Year Resolution 2020✨ 🤓Master Reverse Engineering 🌝Finish up ROP 🌞Get hands dirty in IoT 😇 Participate in some good CTFs

    Poništi
  2. proslijedio/la je Tweet
    15. sij

    Don't be this guy 😅

    Poništi
  3. proslijedio/la je Tweet
    31. pro 2019.

    New year gift 🎉 Set up a free server to exploit blind vulnerabilities! 1. 2. sudo apt-get install apache2 pagekite 3. add "ServerName localhost" to /etc/apache2/apache2.conf 4. 80->8080 in /etc/apache2/ports.conf 5. pagekite 8080

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    30. pro 2019.

    2019 is (almost) a wrap. 🌯 Time to look back! We've selected our top 🔟 write-ups from the past year. What were your favorite blogposts? ✍️

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    30. pro 2019.

    Apple: we’re the most secure OS! No bugs, don’t look. Corellium: *provides researches with a proper research environment to find bugs and test their apps* Researchers: *find and report bugs using Corellium* Apple: no no no no nooo NO 😱 *sues Corellium*

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  7. proslijedio/la je Tweet
    26. pro 2019.

    Ever wondered how does a mobile technically operate? I decided to dig into its building blocks in and publish a detailed writeup about it – from SMS messages to geographical location retrieval, as well as app persistency and obfuscation.

    Poništi
  8. proslijedio/la je Tweet
    25. pro 2019.

    Secrets computer developers don’t want you to know

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    Your attitude is always a choice; never a prison.

    Poništi
  10. proslijedio/la je Tweet
    14. lis 2019.
    Poništi
  11. proslijedio/la je Tweet
    29. ruj 2019.

    Wanna bypass `sameorigin` policy ? Try sending a fake Referer header with the value of parent website. EX : - GET / Host: Referer: Results Below :

    Poništi
  12. proslijedio/la je Tweet
    27. ruj 2019.

    Basic structure of a XSS payload

    Poništi
  13. proslijedio/la je Tweet
    17. stu 2019.

    Defenders should deploy this settings: HKLM\SYSTEM\CurrentControlSet\Control\Lsa Dword: RunAsPPL Value: 1 Protects dumping of Lsass with a simple registry value. Encountered that on an engagement recently. 🤯 Mimikatz driver needed to bypass Details

    Poništi
  14. proslijedio/la je Tweet
    28. lis 2019.

    Say Hello to Sileo! (iPad Pro 2017, iPadOS 13.1.3, custom Jailbreak, not checkra1n)

    Poništi
  15. proslijedio/la je Tweet
    24. lis 2019.

    200K HTB Subscribed Members! 🥳 Thank you all for your support and dedication all these years. It has been an amazing journey and we can’t wait for the next adventures to come. As a thank you to the community, RT and three lucky members will win annual VIP. Good Luck!

    Poništi
  16. proslijedio/la je Tweet
    16. lis 2019.
    Poništi
  17. proslijedio/la je Tweet
    16. lis 2019.

    SQL Injection Step By Step:- Part 1:- Part 2:-

    Poništi
  18. proslijedio/la je Tweet

    🔥 CVE-2019-14287 A flaw in Sudo—that comes installed on almost every OS—could let users run commands as "root" even when they're restricted. Details ➤ How? Just by specifying user ID "-1" or "4294967295" in the command instead of the root.

    Prikaži ovu nit
    Poništi
  19. 6. lis 2019.

    First language: Java Had difficulties: Java Most used :Python,C Totally hate: Java Most loved:Python

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·