Dhamu

@Dhamu_offi

Red Teamer | PentTester | Bug Bounty | 0day guy!

Tamil Nadu
Vrijeme pridruživanja: studeni 2012.

Tweetovi

Blokirali ste korisnika/cu @Dhamu_offi

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Dhamu_offi

  1. Prikvačeni tweet
    30. lis 2019.

    Don't use Automated exploit tools regarding CVE-2019-11510 - Pre-auth Arbitrary File Reading. Again I try to manually exploited successfully Data breach staff username and password via Pulse Secure Access.

    Poništi
  2. 30. sij

    Awesome Payloads Server-Side Template Injection Linux - Privilege Escalation

    Poništi
  3. proslijedio/la je Tweet
    27. sij

    We coordinately invite all security researchers & experts to 2020. Be a part of the biggest event to develop your hacking skills with a lot of challenges & build engagement with experts Register to mark your presence

    Poništi
  4. 31. pro 2019.

    NGINX error_page request smuggling Example Vulnerable Request GET /a HTTP/1.1 Host: localhost Content-Length: 56 GET /_hidden/index.html HTTP/1.1 Host: notlocalhost. Vulnerable Versions: 1.8.1 1.8.1 1.9.5 1.14.1 1.14.2 1.15.9 1.16.1 1.17.6

    Poništi
  5. 17. pro 2019.
    Poništi
  6. 17. pro 2019.

    Hacking GitHub with Unicode's dotless 'I'. : Password reset emails delıvered to the wrong address.

    Poništi
  7. 13. pro 2019.

    Sensitive configuration Error information disclosure: Open the search engine enter the any name.

    Poništi
  8. 11. pro 2019.

    Login Page Authentication bypass: Any file name / authorize account/connect/authorize home/authorize dashboard/authorize account/authorize/

    Poništi
  9. 9. pro 2019.
    Poništi
  10. 3. pro 2019.

    Repository for secrets scanning .ftpconfig sftp-config.json .idea/WebServers.xml ruby/config/master.key web/ruby/secrets.yml db/.pgpass .docker/config.json cloud/heroku.json db/dump.sql misc-keys/putty-example.ppk more..

    Poništi
  11. 1. pro 2019.
    Poništi
  12. 18. stu 2019.
    Poništi
  13. 6. stu 2019.

    Top GitHub Dorks and Scan GitHub Repositories for Sensitive Data password dbpassword dbuser access_key secret_access_key bucket_password redis_password root_password HOST= filename:.htpasswd extension:sql mysql dump

    Poništi
  14. proslijedio/la je Tweet
    1. stu 2019.

    CVE-2019-11510, Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability .

    Poništi
  15. 23. lis 2019.

    CPDoS: Cache Poisoned Denial of Service

    Poništi
  16. 18. lis 2019.

    Microsoft Azure Exploitation Framework.This tool useful exploitation modules for penetration testing

    Poništi
  17. 17. lis 2019.
    Poništi
  18. 16. lis 2019.

    Thanks for Bug CVE-2018-0296 SSL VPN Service Bounty Recon you can use Shodan, Censys or any other OSINT tools to enumerate vulnerable servers or simply google dork /+CSCOE+/logon.html. Figure it out :)

    Poništi
  19. 15. lis 2019.

    Thanks for CVE-2019-16278 RCE Nostromo httpd is prone to 2 cricital vulnerabilities for versions <= 1.9.6

    Poništi
  20. 15. lis 2019.

    This is a collection of writeups, cheatsheets, videos, related to SSRF in one single location.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·