(((Gamliel)))

@Gamliel_InfoSec

🐧 Technical Operations Manager by day | 🐝🔍 | Bug Hunter sometimes at nights |

Vrijeme pridruživanja: listopad 2015.

Tweetovi

Blokirali ste korisnika/cu @Gamliel_InfoSec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Gamliel_InfoSec

  1. Prikvačeni tweet
    26. tra 2017.

    "Lo que importa es que nunca te rindas de hacer en lo que tú crees." ~Arriba & más allá

    Poništi
  2. proslijedio/la je Tweet
    3. velj

    My writeup for H1-415 CTF. Again, hope that you enjoy it. :) Thanks,

    Poništi
  3. proslijedio/la je Tweet
    4. velj

    by $12,500 USD Read From The File System Access (potencial RCE) on Whatsapp Desktop (electron)

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    Im really going to enjoy this. Parse current JS files for endpoints Scrape endpoints from wayback create wordlist of endpoints Run through FFUF Bring into burp for further testing.

    Poništi
  5. proslijedio/la je Tweet
    29. sij

    This tweet is for guys who ask me about duplicates! I started hunting in 2016 Nov and I’m still trying to avoide duplicates! But they never stopped me from hunting and learning more! Keep grinding! Good Luck

    Poništi
  6. 28. sij
    Poništi
  7. proslijedio/la je Tweet
    27. sij

    When you're brute forcing for endpoints, don't forget to add extensions. You can also use this method to discover backup files. Here's a command I use frequently: dirsearch -e php,asp,aspx,jsp,py,txt,conf,config,bak,backup,swp,old,db,sql -u <target>

    Poništi
  8. 28. sij
    Poništi
  9. 27. sij
    Poništi
  10. proslijedio/la je Tweet
    23. sij

    2nd critical of this week. Abuse ouath Sign-up flow: 1) Use phone number instead email in 3rd party to sign-up. 2) Link victim's email to your 3rd party account while singnup on target. 3) Login to vicitim's account using your 3rd party account.

    Poništi
  11. proslijedio/la je Tweet
    25. sij

    We are screaming congratulations to our SEVENTH million-dollar hacker! sprinted across the 7-figure payout mark, bringing in almost $300K in bounties over the last 90-days. You're incredible! Thank you for the work you do in security. Thank you for being you! ❤️🎇

    Poništi
  12. proslijedio/la je Tweet
    13. sij
    Poništi
  13. proslijedio/la je Tweet
    12. sij
    Poništi
  14. proslijedio/la je Tweet
    11. sij

    Follow this step-by-step guide to properly test for … Like a ! by

    Poništi
  15. proslijedio/la je Tweet
    12. sij

    Lesser Known Web Attack Lab - train your advances web security skills 😎

    Poništi
  16. proslijedio/la je Tweet
    12. sij
    Poništi
  17. Poništi
  18. 13. sij
    Poništi
  19. proslijedio/la je Tweet
    7. sij

    live now! Coffee and wrapping up SSRF on ! Let’s hack Carlos!

    Poništi
  20. proslijedio/la je Tweet
    7. sij

    Google Dorking is powerful but requires a lot of typing, I'm trying to reduce that typing with this semi-automated helper that generates links and then all you have to do is open tabs. Feel free to add your ideas to it and share! (I love that title)

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    6. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·