Rakesh Mane

@RakeshMane10

Web & Browser Security.

Pune, India
Vrijeme pridruživanja: lipanj 2013.

Tweetovi

Blokirali ste korisnika/cu @RakeshMane10

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @RakeshMane10

  1. Prikvačeni tweet
    12. srp 2019.
    Poništi
  2. proslijedio/la je Tweet
    10. sij

    We just released the exploit for Remote Code Execution on Citrix Application Delivery Controller and Citrix Gateway (CVE-2019-19781)

    Poništi
  3. proslijedio/la je Tweet
    2. ruj 2019.

    The last part of our Attacking SSL VPN series is out - The Golden Pulse Secure SSL VPN RCE Chain, with Twitter as Case Study! "If you have a nuclear level weapon, when is it ready for public disclosure?"

    Poništi
  4. proslijedio/la je Tweet
    11. sij
    Odgovor korisnicima

    If a working POC of a vulnerability comes out almost after almost 25days of the advisory and also when a mitigation is available, I don’t see anything dealing with ethics and the country here.!

    Poništi
  5. proslijedio/la je Tweet
    10. sij

    Yo hackers! I've built a small website that has some challenges. 🔗 The main challenge for the week is `WW3` All upcoming challenges will be hosted there, so stay tuned :) Would love to know what you guys think. Have fun!

    Poništi
  6. proslijedio/la je Tweet
    7. sij

    We’re 40,000 signatures short of getting attention to the fact that India has shut internet more times than any other country... Via Maro RT

    Poništi
  7. proslijedio/la je Tweet
    5. sij

    India is the best country in the world if you’ve a Canadian Citizenship...

    Poništi
  8. proslijedio/la je Tweet
    24. pro 2019.

    Writeup on how I made $40,000 breaking the new Chromium Edge using essentially two XSS flaws.

    Poništi
  9. proslijedio/la je Tweet
    21. pro 2019.

    New writeup, one of my favorite bugs 🤠 - Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty Featuring...

    Poništi
  10. proslijedio/la je Tweet
    13. pro 2019.

    Hi, If you want to know how SSRF Vulnerability was exist in Vimeo, you should read: Reported through ;)

    Poništi
  11. proslijedio/la je Tweet
    11. pro 2019.
    Poništi
  12. proslijedio/la je Tweet
    10. pro 2019.

    Just blogged CVE-2019-17003, If you scan random QR codes here is a thing for you.

    Poništi
  13. proslijedio/la je Tweet
    7. pro 2019.

    I recently exploited an XXE with a very cool trick and wrote a blog post tl;dr; Exploiting XXE to read files when HTTP OOB is not allowed but errors are enabled :D

    Poništi
  14. proslijedio/la je Tweet
    7. pro 2019.

    New post! Tunneling traffic through MySQL service (or your mysqld is my new SOCKS5) =>

    Poništi
  15. proslijedio/la je Tweet
    5. pro 2019.

    🔥 Free up hard drive space and delete node_modules folders Run `npx npkill`

    Prikaži ovu nit
    Poništi
  16. 6. pro 2019.
    Poništi
  17. proslijedio/la je Tweet
    30. stu 2019.
    Poništi
  18. proslijedio/la je Tweet
    25. stu 2019.

    MS Edge issue with URL fragments handling: an interesting finding by as a solution to the XSS challenge <svg onload=alert(document.domain)>

    Poništi
  19. proslijedio/la je Tweet
    22. stu 2019.

    A completely free, open source and online course about Reverse Engineering iOS Applications

    Poništi
  20. proslijedio/la je Tweet

    🎉 New security blogpost 🎉 Do you know that it's pretty easy to create an HTML/JS/Wasm module polyglot? Those polyglot files are consider as valid: ✅ HTML/Javascript files ✅ WebAssembly modules Kudos to for the help ;)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·