Ashish Kunwar

@D0rkerDevil

cyber security researcher, Member , guy who break things ,Chinese call me ZhuFu🙃, 诸府

Your computer
Vrijeme pridruživanja: veljača 2017.

Tweetovi

Blokirali ste korisnika/cu @D0rkerDevil

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @D0rkerDevil

  1. Prikvačeni tweet
    31. pro 2019.

    Great way to end this year 2019!! 2 days worth it ,thanks to for doing collaboration Few more reports to go ..P1 Happy new year everyone 🎉🎉🎈

    Poništi
  2. proslijedio/la je Tweet
    prije 6 sati

    Eject! Wrong Hole! I repeat Eject!! Wrong Hole!

    Poništi
  3. proslijedio/la je Tweet
    prije 58 minuta

    2020-02-03:🆕🔥 Loader➡️ 'HiddenDesktop' 1⃣"FudV"|2⃣Recompiled from Leak| 3⃣AVE_MARIA 🛡️C2: 94.103.81. 79 👾PDB: C:\Users\Administrator\Documents\c++ project\hVNC\Client\Release\FudV.pdb h/t MD5: 6d8d825d00a4a1d8e3f406bad69fa4a7

    Poništi
  4. proslijedio/la je Tweet

    Visma Bug Bounty Program started using today: , pays: 50$ min.

    Poništi
  5. proslijedio/la je Tweet
    prije 10 sati

    Alhamdulillah. Just got my first RCE in 2020 at . Tips: When you can't execute one liner reverse shell on your web shell (because some char was blocked), then try to download those shell to server and execute it via your web shell. style. ماشاءالله

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet

    We are going public with our some of the products in our program . ~10 services will go from private -> public. This will be done gradually over the next two months. The program is now online at Happy hacking!

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    prije 37 minuta
    Poništi
  8. proslijedio/la je Tweet
    prije 5 sati

    RCE story Forbidden 2.HTTP header in request - Login page access 3. Sqli queries tried no success 4. Some recon on gitlab - Found base64 pwd - decrypt 5. Accessed admin panel 6. Admin panel customized - CLI available 7. File read successful

    Poništi
  9. proslijedio/la je Tweet
    prije 2 sata

    CVE-2020-7471: SQLI in Django: django.contrib.postgres.aggregates.StringAgg aggregation function was subject to SQL injection, using a suitably crafted delimiter. FIX:

    Poništi
  10. proslijedio/la je Tweet
    prije 6 sati

    CVE-2019-8449 Exploit for Jira Releases Below v8.3.4. The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allows remote attackers to enumerate usernames via an information disclosure vulnerability.

    Poništi
  11. proslijedio/la je Tweet

    This news explain what SQL injection is, describe some common examples, explain how to find and exploit various kinds of SQL injection vulnerabilities, and summarize how to prevent SQL injection. SQL Injection Payload List

    Poništi
  12. proslijedio/la je Tweet
    prije 21 sat

    Happy to work with our and their initiaves when we can to move the industry forward. Best of luck on your conference … =)

    Poništi
  13. prije 14 sati

    Gimme some Cisco devices to fuzz 🙄

    Poništi
  14. proslijedio/la je Tweet
    prije 14 sati

    GitHub - mufeedvh/CVE-2019-8449: CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4 -

    Poništi
  15. proslijedio/la je Tweet
    prije 23 sata

    There's a new repository for payload generators and helper scripts for ffuf. I wrote a HTTP basic authentication payload generator as an example. Contributions are more than welcome, it's show & tell time!

    Poništi
  16. proslijedio/la je Tweet
    Poništi
  17. proslijedio/la je Tweet
    31. sij

    Just released a quick tool, wordlistgen, I put together for taking a list of URLs/paths from stdin and parsing components (subdomains, paths, query strings & values) to easily/quickly make contextual content discovery wordlists for

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    prije 23 sata

    I added a script to generate the PDF & archive for my Exam Report Template in Markdown, as I saw a lot of people where creating their own scripts.

    Poništi
  19. proslijedio/la je Tweet
    2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  20. prije 23 sata

    things are gonna be lit 😍 grab your seats now , DM me and get coupons for off during seat booking.

    Poništi
  21. proslijedio/la je Tweet
    2. velj

    📱 If you, like me are starting out to dabble with android mobile hacking. Then check out this easy to grasp workflow and start playing around with firebase and androids apps to find keys and new juicy endpoints. Hats off! Good work and thanks for sharing!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·