Tweetovi

Blokirali ste korisnika/cu @Julien_Legras

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Julien_Legras

  1. proslijedio/la je Tweet
    31. sij

    Friday night trivia (harder than the previous ones... if you're a kid 😋): do you remember this patch?

    Poništi
  2. proslijedio/la je Tweet
    31. sij
    Poništi
  3. proslijedio/la je Tweet
    28. sij

    So I created this Burp Teams it allows you to share repeater/intruder/comparer tabs. It uses nodejs for the server with . But I then found out someone already did this so it won’t be on the BApp store. On the plus side I learnt lots.

    Poništi
  4. proslijedio/la je Tweet
    28. sij

    Qualys Security Advisory: LPE and RCE (CVE-2020-7247) in OpenSMTPD, OpenBSD's mail server. Erroneous logic in smtp_mailaddr() which validates user and domain. More details and PoC at: PS: "Did you ever play tic-tac-toe?"

    Poništi
  5. proslijedio/la je Tweet
    28. sij

    L'équipe Synacktiv vous attend sur le pavillon Bretagne !

    Poništi
  6. proslijedio/la je Tweet
    24. sij

    Friday night trivia: another vulnerability that made history, with its name and logo... 😛 Can you name it?

    Poništi
  7. proslijedio/la je Tweet

    We're wrapping up Miami with one last attempt. Lucas Georges of Synacktiv () targets the Rockwell Automation FactoryTalk View SE with an RCE.

    Poništi
  8. proslijedio/la je Tweet
    23. sij
    Odgovor korisniku/ci
    Poništi
  9. proslijedio/la je Tweet
    23. sij

    Glad to sponsor ! A fantastic platform to learn and have fun!

    Poništi
  10. proslijedio/la je Tweet
    20. sij
    Poništi
  11. proslijedio/la je Tweet
    18. sij

    RDP to RCE: When Fragmentation Goes Wrong AKA: What we know about CVE-2020-0609 and CVE-2020-0610.

    Poništi
  12. proslijedio/la je Tweet
    14. sij
    Poništi
  13. proslijedio/la je Tweet
    12. sij

    Citrix Netscaler AMIs on default vulnerable out of the box. The root password is set to the instance ID; that can be read from the metadata URL. CVE-2019-19781 from nobody to ssh as root in seconds.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    10. sij

    Slides of the attack against WPA3 and EAP-pwd, given at together with

    Poništi
  15. proslijedio/la je Tweet
    10. sij

    Friday night trivia: can you recognize this legendary mistake?

    Poništi
  16. proslijedio/la je Tweet
    8. sij
    Poništi
  17. proslijedio/la je Tweet
    6. sij

    Premier Bière Sécu Toulouse de 2020 le 30 Janvier : . On attend les soumissions !

    Poništi
  18. proslijedio/la je Tweet
    15. pro 2019.

    - Not only Street Fighter: A journey into Moo by and

    Poništi
  19. proslijedio/la je Tweet
    11. pro 2019.

    Our team-members and will talk about "Modern PHP Security" at If you're interested in SSRF, SSTI, arbitrary instantiation, disabled_functions / open_basedir bypasses and other pitfalls, let's catch up in Vienna!

    Poništi
  20. proslijedio/la je Tweet
    29. stu 2019.

    HTTP Request Smuggling in one Screenshot. 🙂

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·