Tweetovi

Blokirali ste korisnika/cu @Dokkillo

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Dokkillo

  1. Prikvačeni tweet
    26. pro 2019.

    1. Be top 10 in 2. Duplicate my bounties of 2019 3. Back to 4. Send a valid vulnerability in all gov programs. 5. Do hacking with others bug hunters.

    Poništi
  2. prije 8 sati

    Frase motivacional del dia de hoy.....

    Poništi
  3. proslijedio/la je Tweet
    4. velj

    On Friday night (6th March), ROOTEDCON will organize a limited event for hackers. Focusing on the search for on well-known platforms. There will be a prize of € 3,000 for the best one added to the finding rewards

    Poništi
  4. proslijedio/la je Tweet
    4. velj

    When testing for SSRF using a black list, take internal IP addresses and when encoding them, dont encode entire IP. Encode 1 octet of the IP address, or 2 or 3. For Instance: AWS Metadata - 0251.254.169.254 (this got the $160,000 payout in Oct 2018)

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    4. velj

    If during your scans, the Backslash Powered Scanner plugin finds something like this. Try changing COM1 value for different numerical values, the result may surprise you. In this way I was able to extract registered users from an application.

    Poništi
  6. proslijedio/la je Tweet
    2. velj
    Poništi
  7. proslijedio/la je Tweet
    31. sij

    My buddy is doing a bug bounty bootcamp at ! If you’re in the area, I highly recommend you check this out!

    Poništi
  8. proslijedio/la je Tweet
    12. kol 2019.

    Here are the slides from our talk at - "Owning the clout through SSRF and PDF generators". We'll probably write 3 blog posts on a few bug bounty examples soon! Also a big thank you to for being my partner in crime through this research.

    Poništi
  9. proslijedio/la je Tweet
    2. velj
    Poništi
  10. proslijedio/la je Tweet
    29. sij

    Guy catches adorable groundhog eating his veggie garden — and lets him have whatever he wants 💚

    Poništi
  11. proslijedio/la je Tweet
    2. velj
    Poništi
  12. proslijedio/la je Tweet
    2. velj

    Llega la epidemia del coronavirus y el gobierno chino monta a toda velocidad dos hospitales normales y corrientes, no un megacentro de acupuntura ni de medicina tradicional china. Lo pilláis ¿no?

    Poništi
  13. proslijedio/la je Tweet
    23. svi 2018.

    can somebody read your passwd file with: "/???/?at /???/????w?" ? yes. bypass blacklisted words filter (or firewalls) via bash wildcards. /b'i'n/c'a't /e't'c/p'a's's'w'd' /???/?at /???/????w? /usr/b'i'n/'n'c 2130706433 80 /???/???/n? 2130706433 80

    Poništi
  14. proslijedio/la je Tweet
    2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  15. proslijedio/la je Tweet
    1. velj

    For anyone wondering, yes it’s written in C# and yes I will be totally adding it as a SILENTTRINITY module if I can get the source code (a few changes need to be made in order for it to run in memory).

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    1. velj

    ☝️nunca llegarás al final de un viaje si te paras a tiras piedras a cada perro que te ladre .

    Poništi
  17. 1. velj

    Ei , muy buena la charla, lastima que llegue tarde 😓, el lunes te escribo y te pregunto unas cosas!

    Poništi
  18. 1. velj

    Apagan las luces, networking sigue – mjesto: La N@ve

    Poništi
  19. 1. velj
    Poništi
  20. 1. velj
    Poništi
  21. 1. velj

    Charla de de EvilTrust – mjesto: La N@ve

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·