Justin Gardner

@Rhynorater

Christian | Penetration Tester | OSCP I Bug Bounty Hunter | Lover of Python | | 🗣️🇺🇸🇮🇹🇯🇵 | Married to 💖💖

DISTURBANCE
Vrijeme pridruživanja: listopad 2015.

Tweetovi

Blokirali ste korisnika/cu @Rhynorater

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Rhynorater

  1. prije 10 sati

    Def follow her on Mixer too!

    Prikaži ovu nit
    Poništi
  2. prije 10 sati

    Any of my followers who are into video games should go follow my wife ! She streams mostly League of Legends and Paladins!

    Prikaži ovu nit
    Poništi
  3. 3. velj

    Tweet with this hashtag and $1 will be donated to !

    Poništi
  4. proslijedio/la je Tweet
    2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  5. 1. velj

    Going wide this past month. In January, I submitted 19 vulnerabilities to 12 programs on .

    Poništi
  6. proslijedio/la je Tweet
    31. sij

    Neat xss payload required to bypass filters: 1. No periods allowed 2. Regex filter on text followed by '(' Blocking "alert(, confirm(, etc", but the self['alert']( got by the filter Payload: ?t=test'*self['alert'](document['domain'])*'test

    Poništi
  7. proslijedio/la je Tweet
    31. sij

    So I just found out about the Application for a Pardon I can send to .. I am going to try and request a pardon to have all of my rights restored from my previous hacking convictions. I am going to need character witnesses for this process... 1/x

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    31. sij

    So gonna give it a shot. Any shares/retweets on this thread would be greatly appreciated for the additional help of finding those that could vouch for me.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    8. sij

    New Writing Bypass SameSite Cookies Default to Lax and get CSRF Looking at a new Chrome feature and the 2 minute quirk which make it possible to bypass it, also solution to my CSRF challenge.

    Poništi
  10. proslijedio/la je Tweet
    29. sij

    ffuf 1.0 released! phew, this is a big one. Feature highlights in this thread Huge thanks for all the contributors, and special thanks to for pulling off a feature bounty and for fulfilling it in a record time (and contributing said bounty to charity).

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    26. sij

    If you haven't voted for my post yet, please do! Poll ends in a few hours. Thanks so much :)

    Poništi
  12. proslijedio/la je Tweet
    26. sij

    As I have no cool new findings, lets start the year with an old IE bug - bypassing Content-Disposition: attachment with mhtml:

    Poništi
  13. proslijedio/la je Tweet
    25. sij

    Please retweet this

    Poništi
  14. proslijedio/la je Tweet
    24. sij

    My blog post been nominated for inclusion in PortSwigger’s list of Top 10 Web Hacking Techniques of 2019! If you don’t mind, would you please vote for “Remote Code Execution via Insecure Deserialization in Telerik UI” at the following poll?

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    22. sij

    if you find 403 Forbidden while testing. Try X-Original-URL and X-Rewrite-URL Headers to bypass restrictions

    Poništi
  16. 24. sij

    League of Legends players: Please retweet this! Would love to see Mixer + League of Legends tournament would be amazing and my wife would kill it!

    Poništi
  17. proslijedio/la je Tweet
    24. sij

    Cross-Site Websocket Hijacking bug in Facebook that leads to account takeover By Bounty: $12500

    Poništi
  18. proslijedio/la je Tweet
    18. sij

    My mod Sammy made this amazing infographic of my life!! 😂 Fav highlights - the crazy accurate representations of my mods below and beside me, and the perfect amount of Patrick.

    Poništi
  19. 16. sij

    Some research I contributed to got nominated for top 10 new web hacking techniques! Please vote for "Exploring Continuous Integration Services"!

    Poništi
  20. proslijedio/la je Tweet
    13. sij

    Update CVE-2019-19781 You can exploit the vulnerability without the file and only use the file ! You can inject your payload inside the name of the XML file and fire the command execution ! 🔥💪

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·