Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @Modam3r5
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Modam3r5
-
Prikvačeni tweet
I just published Unauthenticated user can upload an attachment at
@Hacker0x01https://link.medium.com/BIRb51wPUSHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
today was my first day as Security Engineering in
@LibyanSpider lovely/friendly team, so excited
pic.twitter.com/yWXRHC4LEk
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ahamed morad proslijedio/la je Tweet
@ngalongc,@EdOverflow, and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover. https://blog.reconless.com/samesite-by-default/ …pic.twitter.com/5R23YmpksT
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ahamed morad proslijedio/la je Tweet
Someone dropped a PHP zero-day on GitHub. Talked to the PHP team last night. Bug requires local foothold to exploit, so not usable for remote attacks. Also, this is the second exploit for this "disable_functions bypass" in the last few months. https://github.com/mm0r1/exploits/tree/master/php7-backtrace-bypass …pic.twitter.com/MAWD8FpBRx
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ahamed morad proslijedio/la je Tweet
GET /example?param=test .. nothing interesting happened, not vuln to XSS. (<> " was filtered) but if I change it to POST it's reflected as value=\"test\" POST /example#xss param=test+onfocus='alert(0)'id='xss' ..and I can haz XSS bypassing their 'filter'pic.twitter.com/RjRzccus5J
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ahamed morad proslijedio/la je Tweet
Find the history of every connected
#USB device on your computerhttp://ow.ly/BTA030qbqinHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ahamed morad proslijedio/la je Tweet
Just posted Low-Hanging Apples: Hunting Credentials and Secrets in iOS Appshttps://spaceraccoon.dev/low-hanging-apples-hunting-credentials-and-secrets-in-ios-apps …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I hope all of you to be Ok, thanks
@sallyhayd and all of your teamhttps://twitter.com/sallyhayd/status/1211263036343881729 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ahamed morad proslijedio/la je Tweet
في التحقيق الجنائي، اذا نريد نحلل سلوك المستخدم ونعرف ايش كان يفتح من برامج مع الوقت والفتره و مسار الملف وهاش الملف وغيرها من المعلومات. هذه المعلمات موجوده بسبب ان مايكروسوفت فكرت انها تريد تسوي حياه المستخدم اسهل عن طريق تسجيل سلوكه ولما يرجع يستخدم الجهاز مره اخرى
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ahamed morad proslijedio/la je Tweet
اثناء التحقيق الجنائي اذا تريد تعرف مراحل حياة الملف الي مر بها من بدايه انشائه حتى حذفه يمكن استخراج هذه المعلومات من خلال USN journal لنظام الملفات NTFS على سبيل المثال اذا كان هناك ملف تم انشاءه تم الكتابه عليه ثم اعاده تسميته ثم تعديله ثم تسميته مره اخرى ثم حذفه 1/n
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ahamed morad proslijedio/la je Tweet
iOS Pentesting Tools Part 4: Binary Analysis and Debugginghttps://www.allysonomalley.com/2019/01/06/ios-pentesting-tools-part-4-binary-analysis-and-debugging/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ahamed morad proslijedio/la je Tweet
I made Silver public, mass vulnerability scanner
Github: https://github.com/s0md3v/Silver
- Scans are resumable by default
- Get notified on Slack if a vulnerability is found
- Designed for large volume scans
- Caches vuln. data to improve performance over time
- Shodan integrationpic.twitter.com/A1fDgJhksN
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ahamed morad proslijedio/la je Tweet
Here's a simple but interactive guide to Buffer Overflow exploitation: https://nagarrosecurity.com/blog/interactive-buffer-overflow-exploitation … via
@bordplatepic.twitter.com/NC7p7vRkaLHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ahamed morad proslijedio/la je Tweet
Just posted From checkra1n to Frida: iOS App Pentesting Quickstart on iOS 13 - to be followed up with a second writeup on bug I've found with these tools.https://spaceraccoon.dev/from-checkra1n-to-frida-ios-app-pentesting-quickstart-on-ios-13 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ahamed morad proslijedio/la je Tweet
#WeRiseByLiftingOthers#GiveBackToCommunity Open redirect params I come across.. RedirectUrl Return ReturnUrl ClientSideUrl failureUrl ru redir relayState fallbackurl clickurl return_to url goto dest_url urlReturn referer appUrlScheme some leads to xss..@akshukatkar@BugcrowdHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ahamed morad proslijedio/la je Tweet
First blog post in a short series about some vulnerabilities that I found in Ubuntu's crash reporter earlier this year. I learned a lot from working on the exploits, so I am going to share some of the tips and tricks that I learned. https://securitylab.github.com/research/ubuntu-whoopsie-daisy-overview …pic.twitter.com/hqNAm8Bnzn
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ahamed morad proslijedio/la je Tweet
I just published an Another blog on How to Automate Burp to find IDOR vulnerability on any Web Application. Just check it out. :) Happy Hunting! And special thanks to
@stokfredrik and@Regala_#bugbountytips#infosechttps://link.medium.com/4IwxaRTXl2Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ahamed morad proslijedio/la je Tweet
Register and join the training
@HITBSecConf in Amsterdam from 20-22 April 2020 by@monnappa22 on Malware Analysis and Memory Forensics.#HITB2020AMS@cysinfo22@HITBMediahttps://conference.hitb.org/hitbsecconf2020ams/sessions/3-day-training-2-a-practical-approach-to-malware-analysis-and-memory-forensics/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ahamed morad proslijedio/la je Tweet
Google open sources "PathAuditor," a new
#cybersecurity tool that monitors and detects unsafe path access patterns and related vulnerabilities. https://github.com/google/path-auditor …https://security.googleblog.com/2019/12/detecting-unsafe-path-access-patterns.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ahamed morad proslijedio/la je Tweet
v2 of my free Intro to Android App Reverse Engineering workshop is here!
I've added 3 new exercises, walk-through videos for all 7 exercises, a new module on obfuscation, & exercises on vuln hunting rather than just malware. I hope it helps!
http://maddiestone.github.io/AndroidAppRE pic.twitter.com/0iPNoJ3p7y
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ahamed morad proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
