Mantis

@MantisSTS

Security Consultant. Bug Bounty Participant. Free speech advocate. Thots are my own. Twitch:

United Kingdom
Vrijeme pridruživanja: srpanj 2011.

Tweetovi

Blokirali ste korisnika/cu @MantisSTS

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @MantisSTS

  1. Prikvačeni tweet
    27. srp 2019.

    Can everyone tell me which bug bounty platform you prefer and why?

    Poništi
  2. proslijedio/la je Tweet
    Poništi
  3. proslijedio/la je Tweet
    prije 22 sata

    Bug Hunting Tip: Every time you find the word "PROXY" in a URL, ask it for fun stuff.

    Poništi
  4. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  5. proslijedio/la je Tweet
    4. velj

    by $12,500 USD Read From The File System Access (potencial RCE) on Whatsapp Desktop (electron)

    Poništi
  6. proslijedio/la je Tweet
    3. velj

    I’m bored, gonna play some BF

    Poništi
  7. proslijedio/la je Tweet
    3. velj

    Hey bug hunters! Want a look at some of the top vulnerabilities ever found on ? They just released the last blog post I wrote before leaving. Enjoy!

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    2. velj

    Meanwhile at Healthcare .gov.

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  9. proslijedio/la je Tweet
    2. velj

    We don't deserve dogs

    Poništi
  10. proslijedio/la je Tweet
    3. velj

    HTTP Request Smuggling can allow attackers to get unauthorised access, compromise other users etc. It can also be a bug bounty cash cow for the right researcher. There aren't many write-ups that explain it in action, so here you go...

    Poništi
  11. proslijedio/la je Tweet
    28. sij
    Prikaži ovu nit
    Poništi
  12. 3. velj

    I got to see the donut today! \o/

    Poništi
  13. proslijedio/la je Tweet
    3. velj

    My Hacking Channel is now LIVE! Check out my first video (the USB-C one) and get ready for much more! I will be putting my streaming archives here from now on. :)

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet

    If anyone is into OSINT, and wants to work with me over the next year on information operations and disinformation, please get in touch! Likewise, mightily obliged if you could pass on to anyone who might be interested

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    31. sij
    Prikaži ovu nit
    Poništi
  16. 1. velj

    You know what would be awesome? If someone like did a "Rate my Gameplay" style review of someones process to highlight where people are going wrong. So someone could submit a video of them going through an app and testing stuff and it gets criticised

    Poništi
  17. proslijedio/la je Tweet
    31. sij

    Akamai WAF Bypass, worked on a recent program <x onauxclick=a=alert,a(domain)>click

    Poništi
  18. proslijedio/la je Tweet
    Odgovor korisniku/ci
    Poništi
  19. proslijedio/la je Tweet
    31. sij

    Wow! "Resources for Beginner Bug Bounty Hunters" has over 1000 stars on GitHub now and we just pushed a new update! Check it out:

    Poništi
  20. 31. sij
    Poništi
  21. 31. sij

    And !

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·