Ch33z_plz  

@Ch33z_plz

Loves all the the 🧀🧀🧀 and computer stuffs!

Vrijeme pridruživanja: studeni 2015.

Tweetovi

Blokirali ste korisnika/cu @Ch33z_plz

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Ch33z_plz

  1. proslijedio/la je Tweet
    26. sij

    Windows / Linux Local Privilege Escalation Workshop (Materials included !) 🥳

    Poništi
  2. proslijedio/la je Tweet
    28. sij

    Qualys Security Advisory: LPE and RCE (CVE-2020-7247) in OpenSMTPD, OpenBSD's mail server. Erroneous logic in smtp_mailaddr() which validates user and domain. More details and PoC at: PS: "Did you ever play tic-tac-toe?"

    Poništi
  3. proslijedio/la je Tweet
    16. sij

    Authentication Bypass Vulnerability in InfiniteWP Client

    Poništi
  4. proslijedio/la je Tweet
    11. sij

    We have just released a new tool for exploiting CVE-2019-19781. Our goal was to keep private as long as possible to have a longer window to fix. Other researchers have published the exploit code in the wild already. Cats out of the bag.

    Poništi
  5. proslijedio/la je Tweet
    9. sij

    Have reproduced Citrix SSL VPN pre-auth RCE successfully on both local and remote. Interesting bug!

    Poništi
  6. proslijedio/la je Tweet
    7. sij

    For the sake of exercising, I looked up some web challenges in a and noticed a cool SQLi one "Secure System". I discovered some cool stuff that you will not find it in tutorials so check it out! 😅

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    3. sij

    Reverse Engineering Encrypted Code Segments: by Ryan Cornateanu

    Poništi
  8. proslijedio/la je Tweet
    2. sij

    Public the exploit code for cve-2019-8038 and cve-2019-8039. Two UAF bug in Adobe reader DC. It could pop a calc after disable ASLR. More details will be described after my final exam....

    Poništi
  9. proslijedio/la je Tweet
    31. pro 2019.

    The first shot in 2020, Apereo CAS 4.2.1 RCE, old but good, some guys ought to say it’s a backdoor.Happy new year and have fun! :D

    Poništi
  10. proslijedio/la je Tweet
    30. lis 2019.
    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    5. pro 2019.

    New deserialisation attack vector discussed at which can lead to RCE, done via Jdbc uri ( usually found in fundamental classes, such as URLClassLoader) Combining this attack vector, can bypass all of the blacklists and gain Remote Code Execution.

    Poništi
  12. proslijedio/la je Tweet
    27. stu 2019.

    Two months ago I found three minor bugs that led to an attacker being able to access confidential data and me getting a $12,000 bounty. It’s a rather long read, but if you want to see what I found: !

    Poništi
  13. proslijedio/la je Tweet
    21. stu 2019.

    -2019-16538 Jenkinks Sandbox bypass vulnerablility in Script Security Plugin. Whitelist will filter the CLASS jenkins.model.Jenkins when you create an instance of the class.

    Poništi
  14. proslijedio/la je Tweet
    21. stu 2019.

    Akamai WAF bypass through right-click trigger by <details onauxclick=confirm`xss`></details>

    Poništi
  15. proslijedio/la je Tweet
    6. stu 2019.

    -721 is a real RCE bug.

    Poništi
  16. proslijedio/la je Tweet
    31. lis 2019.

    Exploiting prototype pollution – RCE in Kibana (CVE-2019-7609)

    Poništi
  17. proslijedio/la je Tweet
    27. lis 2019.

    Wrote the post about the Process Hollowing Technique. Thanks to for the contribution & for the code. 🙏

    Poništi
  18. proslijedio/la je Tweet
    22. lis 2019.

    Freshly patched RCE in PHP-FPM: Exploit: Many nginx+PHP configurations vulnerable, watch out!

    Poništi
  19. proslijedio/la je Tweet
    15. lis 2019.
    Poništi
  20. proslijedio/la je Tweet
    12. lis 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·