Alyssa Herrera   

@Alyssa_Herrera_

WebApp security consultant, and bug bounty hunter on . crowdsource hacker, and Ambassador. Loves birbs. Furry Hacker. She/they

Vrijeme pridruživanja: prosinac 2013.
Rođen/a 12. srpnja 1998.

Tweetovi

Blokirali ste korisnika/cu @Alyssa_Herrera_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Alyssa_Herrera_

  1. Prikvačeni tweet

    Without further delay, and I will now be releasing our Red Teamer's Guide to Pulse Secure SSL VPN.

    Poništi
  2. 3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  3. 1. velj

    Hi, I'm da_667, and I support the Back Door exploit framework.

    Prikaži ovu nit
    Poništi
  4. 30. sij

    binary trans people, you really have to start showing serious solidarity with us nonbinary people in the community. just because our gender identities are less conventional, less understood, doesn’t mean they aren’t just as real. our issues, the discrimination we face, are real.

    Poništi
  5. 29. sij

    Quack the planet.

    Poništi
  6. 25. sij

    Unpopular opinion: Kali is thoroughly unnecessary and any time spent setting it up is time better spent finding bugs.

    Prikaži ovu nit
    Poništi
  7. i cant wait for this to COMPLETELY WRECK AND THRASH bug bounty companies. because, congrats, if you're a bug bounty hunter, and the bounty company tries to claim you're an outside consultant? Nope. According to this you're an employee now.

    Prikaži ovu nit
    Poništi
  8. 20. sij
    Poništi
  9. To everyone dm'ing and asking if I saw the picture, yes I indeed I have.

    Poništi
  10. 19. sij

    no matter how guilty I end up feeling about not responding to DMs/texts/emails right away, it never gets any easier to find the energy to actually do it 🙃

    Poništi
  11. 24. stu 2019.

    so ok i did it. here are all the (current) apple metric blueprints both in light and dark mode. iphone 5 til the latest iphone and alot of ipads. all the apple watches. and airpods/airpods pro i wil do the remainder of the devices wich are missing tomorrow

    Poništi
  12. Sorry for the relative radio silence, been off taking another break, didn't want to burn out.

    Poništi
  13. Poništi
  14. Poništi
  15. 16. sij

    Non-binary = “outside the binary” Non-binary =\= “halfway between male and female” Thanks for coming to my ted talk

    Prikaži ovu nit
    Poništi
  16. 14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  17. 15. sij

    results are in! 52 hackers found 146 valid security vulnerabilities and were awarded a total of $275,000 for their work. Top 3⃣: , , and 🎆 More on :

    Poništi
  18. 14. sij

    In case you were wondering what exactly I'm doing these days:

    Poništi
  19. 14. sij

    I have mixed feelings about bounty hunters doing mass scanning for newly released exploits

    Poništi
  20. 13. sij

    Update CVE-2019-19781 You can exploit the vulnerability without the file and only use the file ! You can inject your payload inside the name of the XML file and fire the command execution ! 🔥💪

    Prikaži ovu nit
    Poništi
  21. 10. sij

    we're sending some extremely mixed messages when we tell people "use strong passwords with no patterns and a big character pool" but then make them /type/ their passwords on goddamn SNES controllers and xylophones and whatever

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·