Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @Nep_1337_1998
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Nep_1337_1998
-
Prikvačeni tweet
I’m officially an OSCP now.

Thank you @offsectraining for making me Try Harder!#hardworkpaysoffpic.twitter.com/Aykitv6Afc
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pankaj proslijedio/la je Tweet
Over 400+ websites secured thanks to research and coordinated disclosure by
@Nep_1337_1998 at OBB.pic.twitter.com/cqBWDvCBge
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pankaj proslijedio/la je Tweet
I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :) https://netsec.expert/2020/02/01/xss-in-2020.html …
#bugbountytipspic.twitter.com/Mdygq1PI9Z
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pankaj proslijedio/la je Tweet
This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.https://blog.assetnote.io/bug-bounty/2020/02/01/expanding-attack-surface-react-native/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pankaj proslijedio/la je Tweet
Reflected XSS https://link.medium.com/j1cgHbZpq3 https://link.medium.com/q9eeokp2J3 https://link.medium.com/5zdO3gPEw3 https://link.medium.com/vwwEcNQEw3 https://link.medium.com/TH0sHaq2J3 https://link.medium.com/njXx6sq2J3 https://victoni.github.io/bug-hunting-xss-on-cookie-popup-warning … https://gauravnarwani.com/cookie-worth-a-fortune … https://link.medium.com/bx6lLPq2J3 https://link.medium.com/3khM76q2J3
#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Pankaj proslijedio/la je Tweet
For
#DataPrivacyDay here's what I personally recommend: [1/2] +OS:@fedora@Tails_live +Browser:@firefox@torproject +Search:@DuckDuckGo@startpage +DNS:@nextdnsio@AdGuard +VPN:@ProtonVPN +Email:@ProtonMail +Cloud:@MEGAprivacy@Nextclouders#cybersecurity#privacyPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pankaj proslijedio/la je Tweet
Thanks
@Nep_1337_1998 for identifying an information disclosure on our website!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pankaj proslijedio/la je Tweet
Something similar to Optimum HTB Machine :)
#htb#machine#optimum#cybersecurity#atopendoorpic.twitter.com/5FR3ZVafh7
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pankaj proslijedio/la je Tweet
Over 300+ websites secured thanks to research and coordinated disclosure by
@Nep_1337_1998 at OBB.pic.twitter.com/DD5XpLhxdA
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pankaj proslijedio/la je Tweet
if you find 403 Forbidden while testing. Try X-Original-URL and X-Rewrite-URL Headers to bypass restrictions
#Collectedpic.twitter.com/CA3ZYhRy0A
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pankaj proslijedio/la je Tweet
you can use nmap --script dos -Pn site[.]com OR xmlrpc vulnerability without actually launching a dos attack.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pankaj proslijedio/la je Tweet
A shell script ./crt.sh to grab subdomains from https://crt.sh , and probe for working http and https servers with
@TomNomNom's tool httprobe#bugbounty https://github.com/snowoverride/crt.sh …pic.twitter.com/kk66KKCcQZ
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pankaj proslijedio/la je Tweet
#day36#bugbounty#learning WebSocket attacks
1. https://footstep.ninja/posts/idor-via-websockets/ …
2. https://labs.detectify.com/2017/02/28/hacking-slack-using-postmessage-and-websocket-reconnect-to-steal-your-precious-token/ …
3. https://www.vulnano.com/2019/03/facebook-messenger-server-random-memory.html …
4. https://hackerone.com/reports/395729
5. https://medium.com/@sharan.panegav/account-takeover-using-cross-site-websocket-hijacking-cswh-99cf9cea6c50 …
6. https://medium.com/@sharan.panegav/account-takeover-using-cross-site-websocket-hijacking-cswh-99cf9cea6c50 …
7. https://medium.com/@sharan.panegav/account-takeover-using-cross-site-websocket-hijacking-cswh-99cf9cea6c50 …
8. https://www.notsosecure.com/how-cross-site-websocket-hijacking-could-lead-to-full-session-compromise/ …
#day36 ENDS :)Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Hey
@Heystan! I found critical security flaw on your web application. Please contact me ASAP
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pankaj proslijedio/la je Tweet
Hakrawler - Simple, Fast Web Crawler Designed For Easy, Quick Discovery Of Endpoints And Assets Within A Web Applicationhttp://www.kitploit.com/2020/01/hakrawler-simple-fast-web-crawler.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hey
@JKrycha! I found critical security flaw on your web application. Please contact me ASAP
@Canon@CanonAustralia@CanonUSAproHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hey
@alinush407! I found critical security flaw on your web application (XSS). Please contact me ASAP
@MITpic.twitter.com/mt89qd8NkY
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pankaj proslijedio/la je Tweet
Over 200+ websites secured thanks to research and coordinated disclosure by
@Nep_1337_1998 at OBB.pic.twitter.com/JKlMYSA5tt
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pankaj proslijedio/la je Tweet
(nice write-up) Fixing Remote Windows Kernel Payloads to Bypass Meltdown KVA Shadow: https://zerosum0x0.blogspot.com/2019/11/fixing-remote-windows-kernel-payloads-meltdown.html … …
#exploit#kernel#securityHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.