ahamed morad

@Modam3r5

a lot of dreams and less in reality

Vrijeme pridruživanja: srpanj 2014.

Tweetovi

Blokirali ste korisnika/cu @Modam3r5

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Modam3r5

  1. Prikvačeni tweet
    24. pro 2018.

    I just published Unauthenticated user can upload an attachment at

    Poništi
  2. 2. velj

    today was my first day as Security Engineering in lovely/friendly team, so excited 🙏

    Poništi
  3. proslijedio/la je Tweet
    31. sij

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    Poništi
  4. proslijedio/la je Tweet
    31. sij

    Someone dropped a PHP zero-day on GitHub. Talked to the PHP team last night. Bug requires local foothold to exploit, so not usable for remote attacks. Also, this is the second exploit for this "disable_functions bypass" in the last few months.

    Poništi
  5. proslijedio/la je Tweet
    26. sij

    GET /example?param=test .. nothing interesting happened, not vuln to XSS. (<> " was filtered) but if I change it to POST it's reflected as value=\"test\" POST /example#xss param=test+onfocus='alert(0)'id='xss' ..and I can haz XSS bypassing their 'filter'

    Poništi
  6. proslijedio/la je Tweet
    23. sij

    Find the history of every connected device on your computer

    Poništi
  7. proslijedio/la je Tweet

    Just posted Low-Hanging Apples: Hunting Credentials and Secrets in iOS Apps

    Poništi
  8. 29. pro 2019.

    I hope all of you to be Ok, thanks and all of your team

    Poništi
  9. proslijedio/la je Tweet
    26. pro 2019.

    في التحقيق الجنائي، اذا نريد نحلل سلوك المستخدم ونعرف ايش كان يفتح من برامج مع الوقت والفتره و مسار الملف وهاش الملف وغيرها من المعلومات. هذه المعلمات موجوده بسبب ان مايكروسوفت فكرت انها تريد تسوي حياه المستخدم اسهل عن طريق تسجيل سلوكه ولما يرجع يستخدم الجهاز مره اخرى

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    19. pro 2019.

    اثناء التحقيق الجنائي اذا تريد تعرف مراحل حياة الملف الي مر بها من بدايه انشائه حتى حذفه يمكن استخراج هذه المعلومات من خلال USN journal لنظام الملفات NTFS على سبيل المثال اذا كان هناك ملف تم انشاءه تم الكتابه عليه ثم اعاده تسميته ثم تعديله ثم تسميته مره اخرى ثم حذفه 1/n

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    6. sij 2019.
    Poništi
  12. proslijedio/la je Tweet
    17. pro 2019.

    I made Silver public, mass vulnerability scanner 🔥 Github: - Scans are resumable by default - Get notified on Slack if a vulnerability is found - Designed for large volume scans - Caches vuln. data to improve performance over time - Shodan integration

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet

    Here's a simple but interactive guide to Buffer Overflow exploitation: via

    Poništi
  14. proslijedio/la je Tweet

    Just posted From checkra1n to Frida: iOS App Pentesting Quickstart on iOS 13 - to be followed up with a second writeup on bug I've found with these tools.

    Poništi
  15. proslijedio/la je Tweet
    13. pro 2019.

    Open redirect params I come across.. RedirectUrl Return ReturnUrl ClientSideUrl failureUrl ru redir relayState fallbackurl clickurl return_to url goto dest_url urlReturn referer appUrlScheme some leads to xss..

    Poništi
  16. proslijedio/la je Tweet
    12. pro 2019.

    First blog post in a short series about some vulnerabilities that I found in Ubuntu's crash reporter earlier this year. I learned a lot from working on the exploits, so I am going to share some of the tips and tricks that I learned.

    Poništi
  17. proslijedio/la je Tweet
    11. pro 2019.

    I just published an Another blog on How to Automate Burp to find IDOR vulnerability on any Web Application. Just check it out. :) Happy Hunting! And special thanks to and

    Poništi
  18. proslijedio/la je Tweet
    12. pro 2019.
    Poništi
  19. proslijedio/la je Tweet

    Google open sources "PathAuditor," a new tool that monitors and detects unsafe path access patterns and related vulnerabilities.

    Poništi
  20. proslijedio/la je Tweet
    5. pro 2019.

    🌟v2 of my free Intro to Android App Reverse Engineering workshop is here! 🌟 I've added 3 new exercises, walk-through videos for all 7 exercises, a new module on obfuscation, & exercises on vuln hunting rather than just malware. I hope it helps!

    Screenshot of the table of contents at maddiestone.github.io/AndroidAppRE
    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    29. stu 2019.

    HTTP Request Smuggling in one Screenshot. 🙂

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·