Hannan Haseeb

@HannanHaseebJa1

A passionate Cyber Security enthusiast - who knows computer better than ordinary.

Lahore, Pakistan
Vrijeme pridruživanja: svibanj 2019.
Rođen/a 11. veljače 2000.

Tweetovi

Blokirali ste korisnika/cu @HannanHaseebJa1

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @HannanHaseebJa1

  1. Prikvačeni tweet
    8. sij
    Poništi
  2. prije 9 sati
    Poništi
  3. proslijedio/la je Tweet
    prije 11 sati

    XSS filter bypass using stripped </p> tag to obfuscate. P2 Stored XSS $1500 on a private bug bounty program. XSS Payload: <</p>iframe src=javascript:alert()//

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet

    Takeover story of repo 1.A site having github logo 2. Example: Click on logo it'll show you git repo() 3. In my case , It was 404 Main part 4. Created git account with name of company , So it was like Successful takeover

    Poništi
  5. proslijedio/la je Tweet

    A source code analyzer built for surfacing features Burp Bounty(a quick and simple way, to improve the active and passive scanner) Sublert is a security and reconnaissance tool ,

    Poništi
  6. proslijedio/la je Tweet
    Poništi
  7. proslijedio/la je Tweet
    1. sij

    sorry to 2019 and here's to the new year and improving. 2020 .. the year you can all get your hands on my methodology :)

    Poništi
  8. proslijedio/la je Tweet
    2. velj

    There's a new repository for payload generators and helper scripts for ffuf. I wrote a HTTP basic authentication payload generator as an example. Contributions are more than welcome, it's show & tell time!

    Poništi
  9. Poništi
  10. proslijedio/la je Tweet
    1. velj
    Odgovor korisniku/ci
    Poništi
  11. proslijedio/la je Tweet
    1. velj

    I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)

    Poništi
  12. proslijedio/la je Tweet
    2. velj

    Success in is 50% metagame. Learn what bugs programs pay more for. Learn when to file similar bugs as one High and when to file them as separate Lows/Meds. Learn how to build a relationship with the program. Learn when to take a break and go outside.

    Poništi
  13. proslijedio/la je Tweet
    2. velj

    no offense but does this feel legit to you?

    Poništi
  14. proslijedio/la je Tweet
    2. velj

    SQL Injection Payload List by Password Cracking Is Easy: Here’s How to Do It by in API Security Testing(Part 1) by Saumya Prakash Rana

    Poništi
  15. proslijedio/la je Tweet
    2. velj
    Poništi
  16. Poništi
  17. proslijedio/la je Tweet
    6. sij
    Poništi
  18. Poništi
  19. proslijedio/la je Tweet
    10. sij

    Hunting Good Bugs with only <HTML> by @knowledge_2014 Blind SQL Injection without an ‘in’ by terjanq Payment Gateway Bypass of Zostel: India’s Biggest Hostel Chain ,

    Poništi
  20. Poništi
  21. proslijedio/la je Tweet
    15. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·