DarkOverFlow

@HAXORANON

•16 years old• •Developer• ARMV7/x86• •reverse engineer• •security researcher• part of blocked by KernelTeamiOS English&&German

sandboxed
Vrijeme pridruživanja: listopad 2016.

Tweetovi

Blokirali ste korisnika/cu @HAXORANON

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @HAXORANON

  1. Prikvačeni tweet
    29. tra 2019.

    My goals after summer : X my first web bug bounty X earn 30k or more from web bug bounties maxium in a year X learn more about ios

    Poništi
  2. 30. sij

    I FUCKING HATE CHINA!!

    Poništi
  3. 28. sij

    I wish there was an way for a time management my new worst enemy is Time as an

    Poništi
  4. 28. stu 2019.
    Poništi
  5. 31. lis 2019.
    Poništi
  6. proslijedio/la je Tweet
    25. lis 2019.

    Impressive and funny talk by about his exploit development journey of a unauthenticated heap-based buffer overflow vulnerability he found. Best talk I’ve seen in a long time!

    Poništi
  7. proslijedio/la je Tweet
    25. lis 2019.

    Just wrote an article about how I found two RCE 0-days (CVE-2019-16662 and CVE-2019-16663) in rConfig network configuration and management software via static code analysis. I didn't expected to find such an easy to spot vulnerabilities in this software.

    Poništi
  8. 24. lis 2019.
    Poništi
  9. 24. lis 2019.

    100 *

    Prikaži ovu nit
    Poništi
  10. 24. lis 2019.
    Poništi
  11. 24. lis 2019.

    Maybe my N/a vuln was just karma for laughing at those who make 10p on bounties

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    24. lis 2019.

    I know DoS attacks are deeply unsexy, and I'm still somewhat in shock that I ever wrote an entire post about them. The core aim of this post is to illustrate how in the right circumstances they can be fun, high-impact and profitable

    Prikaži ovu nit
    Poništi
  13. 24. lis 2019.

    I completed the Web Security Academy lab: Stored XSS into anchor href attribute with double quotes HTML-encoded lol it wasnt difficult i just have to look into the source code sometimes

    Poništi
  14. 24. lis 2019.

    I completed the Web Security Academy lab: Reflected XSS into attribute with angle brackets HTML-encoded

    Poništi
  15. 24. lis 2019.

    I completed the Web Security Academy lab: Stored XSS into HTML context with nothing encoded

    Poništi
  16. 24. lis 2019.

    I completed the Web Security Academy lab: Reflected XSS into HTML context with nothing encoded

    Poništi
  17. 24. lis 2019.

    I completed the Web Security Academy lab: DOM XSS in AngularJS expression with angle brackets and double quotes HTML-encoded just completed the whole DOM XSS

    Poništi
  18. 24. lis 2019.

    I completed the Web Security Academy lab: DOM XSS in jQuery anchor href attribute sink using source

    Poništi
  19. 24. lis 2019.
    Poništi
  20. 24. lis 2019.

    I completed the Web Security Academy lab: DOM XSS in document.write sink using source inside a select element

    Poništi
  21. 24. lis 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·