0xINT3

@0xINT3

Co-founder | ctf player | Work | Beta Tester

00:0a:95:9d:68:16
Vrijeme pridruživanja: prosinac 2017.

Tweetovi

Blokirali ste korisnika/cu @0xINT3

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xINT3

  1. Prikvačeni tweet
    20. velj 2019.

    I've just begun to write a blog occasionally and I'm loving it! I just published “Jigsaw Ransomware — Analysis using Volatility”

    Poništi
  2. proslijedio/la je Tweet
    6. velj

    初心者向けRCE いいね! Simple Remote Code Execution Vulnerability Examples for Beginners by

    Poništi
  3. proslijedio/la je Tweet
    29. sij

    I made a goose that destroys your computer Download it free here:

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    30. sij

    Some hunters made over €50.000 in bug bounties with this simple trick. 🤑 Thanks for the , !

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    30. sij

    3rd MEETUP 👨🏽‍💻 Amazing workshop by ! Find ways to improve your skills and always Great Work Team! 👏

    Poništi
  6. proslijedio/la je Tweet
    29. sij

    I've been going through some wikis and found wiki to Binary Exploitation a goldmine for beginners. Do check out

    Poništi
  7. proslijedio/la je Tweet
    27. sij

    Try this Kali based service exploitation CTF under 10 minutes (No Sign-in) Link: Video:

    Poništi
  8. proslijedio/la je Tweet
    28. sij

    So glad to finally be able to release Collaborator++! It adds the ability to view interactions from all contexts, manually poll for interactions on old contexts, and secure your private servers with a pre-shared key!

    Poništi
  9. 29. sij

    Also, a huge shout-out to for the amazing swag! Everyone completely loved it! ❤️ Thank you ! 🥳🥳

    Prikaži ovu nit
    Poništi
  10. 29. sij

    So finally today we organized the third meetup at ! It was really a pleasure to host this event! 🥳 A huge shout-out to and entire team for providing us the opportunity and dedicated labs! 🥳❤️

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    29. sij

    Stupid people credit being smart. Smart people credit being lucky.

    Poništi
  12. proslijedio/la je Tweet
    28. sij

    This is a summary for what i discussed with in our latest stream about my recon process, that will be easier for you as you might mess some when you watch the video later on. Thanks Ben, what you do for community is dope

    Poništi
  13. proslijedio/la je Tweet
    27. sij

    looking for some new dirs to bruteforce?

    Poništi
  14. proslijedio/la je Tweet
    24. sij

    G-Maps API Scanner Tool is updated: - Added rejection reasons to console in detail to analyze root cause better, such as if the rejection reason is "Referer headers", researcher can try to bypass the controls manually. For latest version, visit:

    Poništi
  15. proslijedio/la je Tweet
    23. sij

    PDF to XXE This makes me go in-depth about XML* Q like 1. Why XML is made? 2. Who uses XML? 3. What supports XML? 4. Why it can accept any tag? 5. How the tags are executed? 6. How/WHY does an entity work? 7. etc ENDS :)

    Poništi
  16. proslijedio/la je Tweet
    22. sij

    Releasing an automated pipeline for bugbounty target reconnaissance today. Along with it are 6 blog posts detailing the build process / design. The github repo is tagged to correspond to blog posts. Enjoy! 🙃 repo:

    Poništi
  17. proslijedio/la je Tweet
    21. sij
    Poništi
  18. proslijedio/la je Tweet
    20. sij

    Nice collection of chrome sandbox escape POCs/exploits and methodology, go check it out !

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    20. sij

    First blog post: Unauthorized Google Maps API Key Usage Cases, and Why You Need to Care

    Poništi
  20. proslijedio/la je Tweet
    20. sij

    Time for a new tip! When I sign up to a website/newsletter/reset password, I look at the website which hosts the logo/image in the email I receive. This led me multiple time to insecure AWS S3 buckets and scope expansion.

    Poništi
  21. proslijedio/la je Tweet
    18. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·