jineesh

@Jin33sh4k

Security Engineer | Bug Bounty Hunter

Vrijeme pridruživanja: rujan 2015.

Tweetovi

Blokirali ste korisnika/cu @Jin33sh4k

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Jin33sh4k

  1. Prikvačeni tweet
    21. lis 2019.
    Poništi
  2. proslijedio/la je Tweet
    2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  3. 1. velj
    Poništi
  4. proslijedio/la je Tweet
    29. sij

    Findomain 1.2.0 is out! The last benchmark resulted in Findomain being able to resolve 33668 subdomains for google[.]com in 580 seconds (3480 subdomains resolved per minute) using --threads 100.

    Poništi
  5. proslijedio/la je Tweet
    28. sij

    Do you know what 2nd order IDORs are? 🙋 Wondering how does recon or how breaks the web? Read everything in this week's ! ⬇️

    Poništi
  6. proslijedio/la je Tweet
    19. sij
    Poništi
  7. proslijedio/la je Tweet
    7. sij

    So my guest blog post for about my recon techniques is finally out. Check it out here-

    Poništi
  8. proslijedio/la je Tweet
    6. sij

    OWASP API Security Top 10 2019 - The Ten Most Critical Risks

    Poništi
  9. proslijedio/la je Tweet
    1. sij

    New year greetings, folks! We are proudly announcing a dedicated Red Teaming and Pentesting Labs for the community. As part of beta testing, we are opening the Red Team vs Blue Team CTF (which we had organized at c0c0n conference) totally free for one month.

    Poništi
  10. 30. pro 2019.
    Poništi
  11. proslijedio/la je Tweet
    6. stu 2019.

    getallurls - fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl: Quick script that I use religiously for content discovery.

    Poništi
  12. proslijedio/la je Tweet
    26. pro 2019.

    Well, who wants to fool an AI anti-virus product? A short article on executing PowerShell scripts without invoking powershell.exe and antivirus/edr bypass.

    Poništi
  13. proslijedio/la je Tweet
    19. pro 2019.

    Bypass SSL Pinning and intercept HTTPS with Burp with apk-mitm - A CLI application that automatically prepares Android APK files for HTTPS inspection

    Poništi
  14. proslijedio/la je Tweet
    13. pro 2019.

    Just published a PoC exploit for CVE-2019-18935 (), RCE via insecure deserialization affecting Telerik UI. See full write-up below. Thanks to for discovering this issue, and for collaborating on exploit dev.

    Poništi
  15. proslijedio/la je Tweet
    15. pro 2019.

    Not really happy with 8th but at least is buying me Giflar for winning this solo

    Poništi
  16. proslijedio/la je Tweet
    7. pro 2019.

    Want to know which web files on a website are cached? Here is an online tool!! Where the result displays .css, .js files, and some subdomains as well

    Poništi
  17. proslijedio/la je Tweet
    5. pro 2019.

    Just released subfinder v2.0. It's now faster, better and more clean. Get it now at

    Poništi
  18. proslijedio/la je Tweet
    3. pro 2019.

    Repository for secrets scanning .ftpconfig sftp-config.json .idea/WebServers.xml ruby/config/master.key web/ruby/secrets.yml db/.pgpass .docker/config.json cloud/heroku.json db/dump.sql misc-keys/putty-example.ppk more..

    Poništi
  19. proslijedio/la je Tweet
    29. stu 2019.

    Finally took the time to do a write up! Wrote up my first RCE (was also my first critical at that time): There’s some shout-outs in this post to:

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    26. stu 2019.

    To celebrate Black Friday, our cheapest plan is now 90% off for the first month! 😱 Get your subscription now for only €0.99 at

    Poništi
  21. proslijedio/la je Tweet
    22. stu 2019.

    10 years ago launched the Shodan website! To celebrate a decade of discovery and growth we're going to offer the membership for $1 (marked down from $49) for the next 24 hours (0:00 UTC to 24:00 UTC):

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·