M. Khizer Javed

@KHIZER_JAVED47

I’m really like this sweet, down to earth, don’t fuck with me or I’ll fuck you up, goofy, sensitive, cry baby, type of gangsta.

Islamabad, Pakistan
Vrijeme pridruživanja: srpanj 2015.

Tweetovi

Blokirali ste korisnika/cu @KHIZER_JAVED47

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @KHIZER_JAVED47

  1. Prikvačeni tweet
    10. lis 2017.
    Poništi
  2. prije 3 sata
    Poništi
  3. proslijedio/la je Tweet

    Quickly get the ASN of an IP address, along with the associated company name and location: curl <ip> This is a great way to confirm ownership of an IP/domain. It also is a great way to services that might be in use (AWS/Azure/Cloudfront/Akamai, etc.)

    Prikaži ovu nit
    Poništi
  4. Bug Hunters after receiving this Email! ❤️

    Poništi
  5. Poništi
  6. Poništi
  7. proslijedio/la je Tweet
    prije 22 sata

    We are looking for a Mobile Security Analyst to join our team at ! If you (or someone you know) are interested in this position feel free to DM me or apply here:

    Poništi
  8. Yay, I was awarded a $750 bounty on ! Discovered an issue in Mapbox Source code! Almost near to 2.5k Reputation So want that H1 Swag!

    Poništi
  9. proslijedio/la je Tweet
    5. velj

    New blog post: Simple Remote Code Execution Vulnerability Examples for Beginners

    Poništi
  10. 5. velj

    Ok! I probably did the dumbest thing in my whole career! 20+ reports for 20+ sub takeovers :/ i was mad duh! Apologies to the team! idk what's gonna happen! All i can say is ./Good_Night ❤️

    Poništi
  11. 4. velj
    Poništi
  12. proslijedio/la je Tweet
    4. velj

    Just a quick blog post: Easily leaking passenger information on a program. Be careful what you share online! :)

    Poništi
  13. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  14. 4. velj

    Updated the Exploit to a Newer, Cleaner & Easy to use code!

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    4. velj

    When testing for SSRF using a black list, take internal IP addresses and when encoding them, dont encode entire IP. Encode 1 octet of the IP address, or 2 or 3. For Instance: AWS Metadata - 0251.254.169.254 (this got the $160,000 payout in Oct 2018)

    Prikaži ovu nit
    Poništi
  16. 4. velj

    Good Morning! Thanks for liking my blogs! I know they’re not so technical at this point but helps me keep track of my work and sharing with people who helped me get here always makes me happy.

    Poništi
  17. 4. velj

    I found myself on wrong patch considering this issue! so i blogged about it i hope people will learn something! sorry for any mistakes!

    Prikaži ovu nit
    Poništi
  18. 4. velj
    Prikaži ovu nit
    Poništi
  19. 4. velj

    Finally! Understood this! and got this one working for me!!!

    Prikaži ovu nit
    Poništi
  20. 3. velj

    Anyone! who can explain help in learning about writeable Firebase db? I'm testing again't my own app with public permission! ref: the report and poc at doesn't really show a proper way to write data?

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    2. velj

    I added a script to generate the PDF & archive for my Exam Report Template in Markdown, as I saw a lot of people where creating their own scripts.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·