Tweetovi

Blokirali ste korisnika/cu @AlejandroBasso

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @AlejandroBasso

  1. proslijedio/la je Tweet
    31. pro 2019.

    XSS Payload List Burp History parsing tool to discover potential SQL injection points A collection of Portswigger's popular Burp Suite web penetration testing tool ,

    Poništi
  2. Poništi
  3. proslijedio/la je Tweet
    19. sij

    Interesting list of 876 bug bounty programs by company: bounty/programs-list.csv at 3bed32ee073a0a673a33da8feb8f3af324aefc75 · yesnet0/bounty · GitHub

    Poništi
  4. proslijedio/la je Tweet
    24. sij
    Poništi
  5. proslijedio/la je Tweet
    28. pro 2019.

    Cross-Origin Resource Sharing (CORS) can be used to bypass the Same Origin Policy(SOP) and read sensitive user data if implemented improperly. Easy wins all day. Learn more on my blog:

    Poništi
  6. proslijedio/la je Tweet
    22. sij

    New blog post: A Less Known Attack Vector, Second Order IDOR Attacks

    Poništi
  7. proslijedio/la je Tweet
    21. sij

    time: when you see a POST request made with JSON, convert this to XML and test for XXE. You can use "Content-type converter" extension on to do achieve this! RT and Follow, book coming!

    Poništi
  8. proslijedio/la je Tweet
    11. sij

    New video incoming! 🚨 In this video, we talk APIs. What they are, where to find them, and most importantly how to test them for bugs! We cover: API recon, the most common API bugs and teach you how to find them

    Poništi
  9. proslijedio/la je Tweet
    13. sij
    Poništi
  10. proslijedio/la je Tweet
    12. sij

    New series spoilers 🤐

    Poništi
  11. proslijedio/la je Tweet
    5. sij

    Tishna - Complete Automated Pentest Framework For Servers, Application Layer To Web Security

    Poništi
  12. proslijedio/la je Tweet
    6. sij

    LKWA - Lesser Known Web Attack Lab

    Poništi
  13. proslijedio/la je Tweet
    9. sij
    Poništi
  14. proslijedio/la je Tweet
    19. pro 2019.

    For those who are asking How I found my last SQL injection Here is a simple POC

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    20. pro 2019.
    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  16. proslijedio/la je Tweet
    4. sij

    Git All the Payloads:- A collection of web attack payloads.

    Poništi
  17. proslijedio/la je Tweet
    4. sij

    KnowledgeHUB :- A vulnerable education portal. The major web vulnerabilities in this project are :- SQL Injection. Stored XSS. Shell Uploading. Clickjacking. Business Logic. Cross Site Request Forgery.

    Poništi
  18. proslijedio/la je Tweet
    26. svi 2017.

    tip - Open Graph Protocol is a good case for Blind SSRF / Extract of Meta Data. My POC: SSRF in Twitter via a Tweet :) - $5,040

    Poništi
  19. proslijedio/la je Tweet
    Poništi
  20. proslijedio/la je Tweet
    21. pro 2019.

    “Automating BURP to find IDORs” by Aditya Soni

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·