Tweetovi

Blokirali ste korisnika/cu @Atharvvashishth

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Atharvvashishth

  1. proslijedio/la je Tweet
    prije 3 sata

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  2. proslijedio/la je Tweet
    Poništi
  3. proslijedio/la je Tweet

    This abomination is the regex for validating IPv6 addresses:

    Poništi
  4. proslijedio/la je Tweet
    prije 18 sati

    Creating payloads without "'`()[]\%; by ... that's useful...

    Poništi
  5. proslijedio/la je Tweet
    2. velj

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Poništi
  6. proslijedio/la je Tweet
    1. velj

    Here is my massive lib db (for ctfs/wargames/blind pwns etc.). It consists of thousands of libs across over a dozen Linux distributions and architectures spanning the last 20 years. It indexes symbols & gadgets (including one gadgets AKA magic gadgets).

    Poništi
  7. proslijedio/la je Tweet
    22. sij

    Earlier today we published the details of a set of vulnerabilities in Safari's Intelligent Tracking Prevention privacy mechanism: . They are... interesting. [1/9]

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  9. proslijedio/la je Tweet
    2. velj

    📱 If you, like me are starting out to dabble with android mobile hacking. Then check out this easy to grasp workflow and start playing around with firebase and androids apps to find keys and new juicy endpoints. Hats off! Good work and thanks for sharing!

    Poništi
  10. proslijedio/la je Tweet
    1. velj
    Poništi
  11. proslijedio/la je Tweet
    1. velj

    New video! The first episode of Bug in Focus is here and we talk about RCEs. What they are, how people find them & highlight some interesting RCEs. Also, I do a demo of command and code execution. I'm REALLY happy with this video

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    31. sij

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    Poništi
  13. proslijedio/la je Tweet
    29. sij

    One more: Find a subdomain such as <grafana>.corp.company.com which points to a external IP example however only accessible inside VPN and such SSRF could be leveraged in that way. You can often find such hosts over SSL. Have exploited such in pasts. Might even be a

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    22. sij
    Poništi
  15. proslijedio/la je Tweet
    22. sij

    undelete_jpg : Recovers JPG images from SD cards and hard drives : PhotoRec : file data recovery software designed to recover lost files including video, documents and archives from hard disks, CD-ROMs, and lost pictures :

    Poništi
  16. proslijedio/la je Tweet
    21. sij

    Full story on MBS personally 'hacking' Jeff Bezos, according to the Guardian:

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    22. sij
    Poništi
  18. proslijedio/la je Tweet
    24. sij
    Poništi
  19. proslijedio/la je Tweet
    24. sij

    How to Build an Automated Recon Pipeline with Python and Luigi - Part I (Setup and Scope) : recon-pipeline : An automated target reconnaissance pipeline : cc

    Poništi
  20. proslijedio/la je Tweet
    24. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·