An0nym0us

@MeetAn0nym0us

Just a 19 years old guy who loves to hack and solve problems.

Faisalabad, Pakistan
Vrijeme pridruživanja: listopad 2017.
Rođen/a 2000.

Tweetovi

Blokirali ste korisnika/cu @MeetAn0nym0us

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @MeetAn0nym0us

  1. 1. velj

    In January, I didn't submit any vulnerabilities, but this month I will!

    Poništi
  2. 13. sij
    Poništi
  3. proslijedio/la je Tweet
    30. pro 2019.

    We are excited to announce plans to conduct first ever BSides in Islamabad, Pakistan in 2020. Plans include security talks, hacking village, Capture The Flag (CTF), workshops and panel discussions. Stay tuned for details.

    Prikaži ovu nit
    Poništi
  4. 6. sij

    Iran Bug bounty program offers more than Google/Apple RCE 😂

    Poništi
  5. 3. sij
    Poništi
  6. 3. sij
    Poništi
  7. 30. pro 2019.
    Poništi
  8. 27. pro 2019.
    Poništi
  9. 26. pro 2019.
    Poništi
  10. 1. pro 2019.

    In November, I submitted 3 vulnerabilities to 2 programs on .

    Poništi
  11. proslijedio/la je Tweet
    19. stu 2019.
    Poništi
  12. proslijedio/la je Tweet
    18. stu 2019.

    Earnings from bugbounties are so uncertain you either earn like a drugdealer or a janitor.

    Poništi
  13. 1. stu 2019.

    In October, I submitted 4 vulnerabilities to 3 programs on .

    Poništi
  14. 25. lis 2019.
    Poništi
  15. proslijedio/la je Tweet
    13. lis 2019.

    No telnet or netcat/nc? Use curl with telnet://host:port :)

    Poništi
  16. proslijedio/la je Tweet
    26. ruj 2019.

    We are proud to launch our brand new interactive XSS cheatsheet featuring novel vectors from

    Poništi
  17. 10. lis 2019.

    Yay, I was awarded a $500 bounty on ! Yay, got my Birthday gift lol,

    Poništi
  18. proslijedio/la je Tweet
    7. ruj 2019.

    if the password reset link is shortened in email try checking for common hashes/encodings you may end up with gold mine, in the below scenario the url was shortened and the url id was sequential and encoded in base64 -->Scraping all generated password resets links.

    Poništi
  19. 7. ruj 2019.

    While testing a Laravel site try injecting different kinds of payloads or change Request methods to GET>POST or POST>GET. this will result in Laravel exception handler error Disclosing AWS, Database, and SMTP Credentials.

    Poništi
  20. proslijedio/la je Tweet
    21. kol 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·