Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @Paresh_parmar1
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Paresh_parmar1
-
Prikvačeni tweet
#bugbountytip decompile android app. and go to : Resources > resources.arsc > res > values > strings.xml search for *.firebaseio.com in xml file. ,and open browser try https://*.firebaseio.com/.json , you might find read access to database there.#bugbountytips .pic.twitter.com/eZPSqnAbWV
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Paresh proslijedio/la je Tweet
WooT! There is always a way. New
#bugbounty#pentest short write up! Chain the bugs till you get what you want.#bugbountytip#bugbountytips#hacking Some steps were not mentionned. RT, Like and Comments are appreciated. For any pentest work DM me:)
pic.twitter.com/nlAv4pMPhx
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Paresh proslijedio/la je Tweet
1/n
@faasos's rider asked for an OTP, I was hesitant because generally they never asked for it before, I knew something was phishy, *let's check them out* immediately after sharing the OTP, my account was accessed from a different location & that clever chap gave 5
ratingPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Paresh proslijedio/la je Tweet
Did you know that the address '<a@b.com>c@d.com' when given to SES will send an email to a@b.com? this could lead to interesting exploit scenarios with some email parsing libraries/code https://nathandavison.com/blog/exploiting-email-address-parsing-with-aws-ses …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Paresh proslijedio/la je Tweet
Cross-Site Websocket Hijacking bug in Facebook that leads to account takeover https://ysamm.com/?p=363
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Paresh proslijedio/la je Tweet
Opensourcing another project from team
@pdiscoveryio#Nabbu, Simple and Fast port scanner with handy features to use with another tool in your recon pipeline. Link to project:- https://github.com/projectdiscovery/naabu …#naabu#bugbounty#infosec#pentestingpic.twitter.com/9SVwfXziqNPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This shoulder move. Didn’t expect that.
knocked him down in just 44 seconds. #ufc246https://twitter.com/GuoBlue/status/1218772464919924736 …
0:45Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Paresh proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Paresh proslijedio/la je Tweet
One line HTTP server. https://gist.github.com/willurd/5720255 pic.twitter.com/N7MGitSavG
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Paresh proslijedio/la je Tweet
We should learn from
@fransrosen how to value money, how to unconditionally keep learning and keep growing !! Checkout his interview#bsidesahmedabad#bugbounty#bugbountytips Hack-Eat-Sleep-Repeat
https://www.youtube.com/watch?v=PcuFw1A8QWA&feature=youtu.be …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Paresh proslijedio/la je Tweet
If a working POC of a vulnerability comes out almost after almost 25days of the advisory https://support.citrix.com/article/CTX267027 … and also when a mitigation is available, I don’t see anything dealing with ethics and the country here.!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Paresh proslijedio/la je Tweet
Watch BSides Ahmedabad 2019 in a glimpse
https://youtu.be/MQyMkip2JDo
A special thanks to each and every one for making this happen
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Paresh proslijedio/la je Tweet
Bug Bounty hunters & Pentesters alike, they all love to run their own domain and DNS Servers to log Out of Band interactions caused by RCEs, XXE's SSRFs and blind requests. And now you can do that too! Better safe than sorry! https://www.youtube.com/watch?v=p8wbebEgtDk …
#bugbountytip#infosec#howtopic.twitter.com/W5DyPENH5z
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Paresh proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Didn’t know this. But it’s good.
@GoogleVRPhttps://twitter.com/sirdarckcat/status/1214662938176507904 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Paresh proslijedio/la je Tweet
As an American I'm so sick of people waging war on my behalf. Bragging about spending 2 trillion on tanks when people can't pay for healthcare or school lunches is sick beyond belief.https://twitter.com/realDonaldTrump/status/1213689342272659456 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Paresh proslijedio/la je Tweet
To start the new year I'm releasing another write-up where I explain the process of detecting and exploiting a chained HTTP request smuggling vulnerability which led me to an account takeover.https://hipotermia.pw/bb/http-desync-account-takeover …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
damn this is epic
@NICKMERCShttps://twitter.com/NICKMERCS/status/1211709844715122688 …
0:11Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

What I wish knew when I was 20.
