Mohit_panwar

@Mohit__Panwar

Security Engineer. Defensive hacker. CEH. OSCP.

bangalore
Vrijeme pridruživanja: studeni 2014.

Tweetovi

Blokirali ste korisnika/cu @Mohit__Panwar

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Mohit__Panwar

  1. prije 14 sati

    Something to look upto. 😁😁😁

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Watch our "How-to Automate AppSec & Keep up w/ Modern CI/CD" webinar here

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    Some hunters made over €50.000 in bug bounties with this simple trick. 🤑 Thanks for the , !

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    24. sij
    Poništi
  5. proslijedio/la je Tweet
    10. sij

    Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges (binaries + writeups by hacking topics)

    Poništi
  6. proslijedio/la je Tweet
    8. sij

    Good morning Bug Bounty community. If you are a beginner, I suggest checking out github repo for Bug Bounty Beginners. Updates will be pushed monthly, with the 2020.01 version live now.

    Poništi
  7. proslijedio/la je Tweet
    8. sij

    Bug Bounty hunters & Pentesters alike, they all love to run their own domain and DNS Servers to log Out of Band interactions caused by RCEs, XXE's SSRFs and blind requests. And now you can do that too! Better safe than sorry!

    Poništi
  8. proslijedio/la je Tweet
    30. lis 2019.

    I rooted host Steven on The Virtual Hacking Labs ! 1/43. I have completed the course walk-through. Now having a blast knocking out 22 beginner machines to get the VHL Certificate of Completion!

    Poništi
  9. proslijedio/la je Tweet

    Deep dive in a single project, improve my leadership skills, 0-days, read more books and mentor more ppl ❤️

    Poništi
  10. proslijedio/la je Tweet
    29. lis 2019.
    Poništi
  11. proslijedio/la je Tweet
    7. ruj 2018.

    Camera API 2 isn't unlocked on MI A2 while nokia 6.1 plus have it unlocked out of box. People out there want to try Gcam port but stuck on Api 2

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    14. srp 2019.
    Poništi
  13. Poništi
  14. 29. pro 2018.

    Just rooted Carrier from what a machine!!! took 2 days to figure out the game plan. Thanks to for the machine.

    Poništi
  15. 23. pro 2018.

    I just wrote about Stopping Active Directory Enumeration for Critical Infrastructure. Here, have a look. I am writing a series on step by step active directory pentesting and automating the same. Watch this space for full series.…

    Poništi
  16. 14. pro 2018.

    I just wrote about Automating Active Directory Enumeration. Here, have a look. I am writing a series on step by step active directory pentesting and automating the same. Watch this space for full series.

    Poništi
  17. 13. pro 2018.

    I just wrote about Enumerating Active Directory networks and getting DC specific information. Here, have a look. I am writing a series on step by step active directory pentesting and automating the same. Watch this space for ful…

    Poništi
  18. 13. pro 2018.

    I just wrote my interpretation of Kerberoasting and getting around it. Here, have a look. I am writing a series on step by step active directory pentesting and automating the same. Watch this space for full series.

    Poništi
  19. 2. pro 2018.
    Poništi
  20. proslijedio/la je Tweet
    7. lis 2018.

    if server only allows GET and POST method, then try adding "X-HTTP-Method -Override: PUT to achieve RCE via PUT method

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·