Tweetovi

Blokirali ste korisnika/cu @Error_Protocol

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Error_Protocol

  1. 99 smart phones in a pull-cart = instant traffic jam

    Poništi
  2. prije 8 sati

    Takeover story of repo 1.A site having github logo 2. Example: Click on logo it'll show you git repo() 3. In my case , It was 404 Main part 4. Created git account with name of company , So it was like Successful takeover

    Poništi
  3. prije 22 sata

    My Hacking Channel is now LIVE! Check out my first video (the USB-C one) and get ready for much more! I will be putting my streaming archives here from now on. :)

    Prikaži ovu nit
    Poništi
  4. prije 8 sati

    Interview of the awesome . I have the exact same mindset. Developers are the best hackers! 😁

    Poništi
  5. 3. velj

    How to get a vuln research job: -Get a fancy CS degree -Find mem corruption bugs, forget about logic bugs -Don't drop 0days out of despair because of getting nowhere in this industry because you'll be labeled untrustworthy People say there is a skill shortage in infosec.. lol.

    Prikaži ovu nit
    Poništi
  6. 2. velj

    SQL Injection Payload List by Password Cracking Is Easy: Here’s How to Do It by in API Security Testing(Part 1) by Saumya Prakash Rana

    Poništi
  7. Poništi
  8. 31. sij

    Cloudflare XSS Bypass <a"/onmouseover=(confirm)('clodflare-bypass-doskey_history')>click

    Poništi
  9. 31. sij

    Steps 0) Login in with Twitter 1) Host Header Injection [to a.cxx] 2) Generate OAuth Token's Link 3) Send link to Victim, after victim authorize 4) Verifier send to a.cxx 5) Reuse use token Account Takeover by

    Poništi
  10. Poništi
  11. 31. sij

    If an application uses markdown, make sure to test it for xss. I used [Click here](javascript:alert(1)), to create a link via markdown and when the user clicks on Click here, the xss will get executed. Read this article.

    Poništi
  12. 30. sij

    My write-up on how I tracked down an alleged member of REvil group utilizing methods. If you enjoyed reading this please share it and I will work hard to create more write-ups like this!

    Prikaži ovu nit
    Poništi
  13. 30. sij

    I published another blog today. This is a story about an interesting SQL Injection I found. “A Not-So-Blind RCE with SQL Injection” by Prashant Kumar

    Poništi
  14. 31. sij

    Okay, check this out. 2020 edition. 1.) Android is now considered to be possibly more secure than iPhone. 2.) Android is Linux. 3.) Windows is now considered more secure than Linux on the desktop. By the transitive property: 4.) Windows is more secure than iPhone.

    Prikaži ovu nit
    Poništi
  15. Poništi
  16. 30. sij

    Some hunters made over €50.000 in bug bounties with this simple trick. 🤑 Thanks for the , !

    Prikaži ovu nit
    Poništi
  17. 30. sij

    Top 10 Startups by Valuation ByteDance (TicTok) $75B Didi $56B Juul $50B (e-cig) Stripe $35B AirBnB $35B SpaceX $35B Kuaishow $18B Paytm $16B (only one from 🇮🇳) Epic Games $15B DJI $15B (Drones)

    Poništi
  18. 29. sij

    We now have 116 awesome labs on the Web Security Academy. We'll be adding some more soon.

    Poništi
  19. 28. sij

    I'm looking for a new role doing something AppSec/Red Team/OSINT related in Seattle or remote. My strong suite is web and mobile security, with lots of bug bounty experience. My resume and contact info are on , DMs open as well. RT's are much appreciated.

    Poništi
  20. 28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·