Pankaj     

@Nep_1337_1998

Security Researcher | OSCP | Acknowledged by • Google • Microsoft • Apple • Twitter • IBM

localhost
Vrijeme pridruživanja: listopad 2017.

Tweetovi

Blokirali ste korisnika/cu @Nep_1337_1998

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Nep_1337_1998

  1. Prikvačeni tweet

    I’m officially an OSCP now. 😈💪🏻Thank you for making me Try Harder!

    Poništi
  2. proslijedio/la je Tweet

    Over 400+ websites secured thanks to research and coordinated disclosure by at OBB.

    Poništi
  3. proslijedio/la je Tweet
    1. velj

    I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)

    Poništi
  4. proslijedio/la je Tweet
    2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  5. Poništi
  6. Poništi
  7. proslijedio/la je Tweet
    31. sij

    For here's what I personally recommend: [1/2] +OS: +Browser: +Search: +DNS: +VPN: +Email: +Cloud:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    28. sij

    Thanks for identifying an information disclosure on our website!

    Poništi
  9. proslijedio/la je Tweet
    27. sij

    Something similar to Optimum HTB Machine :)

    Poništi
  10. proslijedio/la je Tweet
    23. sij

    Over 300+ websites secured thanks to research and coordinated disclosure by at OBB.

    Poništi
  11. proslijedio/la je Tweet
    22. sij

    if you find 403 Forbidden while testing. Try X-Original-URL and X-Rewrite-URL Headers to bypass restrictions

    Poništi
  12. proslijedio/la je Tweet
    30. lis 2019.
    Odgovor korisnicima

    you can use nmap --script dos -Pn site[.]com OR xmlrpc vulnerability without actually launching a dos attack.

    Poništi
  13. proslijedio/la je Tweet
    3. pro 2019.

    A shell script ./crt.sh to grab subdomains from , and probe for working http and https servers with 's tool httprobe

    Prikaži ovu nit
    Poništi
  14. Poništi
  15. Poništi
  16. Hey ! I found critical security flaw on your web application. Please contact me ASAP 😉

    Poništi
  17. proslijedio/la je Tweet
    16. sij

    Hakrawler - Simple, Fast Web Crawler Designed For Easy, Quick Discovery Of Endpoints And Assets Within A Web Application

    Poništi
  18. Hey ! I found critical security flaw on your web application. Please contact me ASAP 😉

    Poništi
  19. Hey ! I found critical security flaw on your web application (XSS). Please contact me ASAP 😉

    Poništi
  20. proslijedio/la je Tweet
    16. sij

    Over 200+ websites secured thanks to research and coordinated disclosure by at OBB.

    Poništi
  21. proslijedio/la je Tweet

    (nice write-up) Fixing Remote Windows Kernel Payloads to Bypass Meltdown KVA Shadow:  …

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·