Sundarr Insa

@SUNDARR_INSA

🤑Bug Bounty Hunter🤑

Vrijeme pridruživanja: lipanj 2012.
Rođen/a 1993.

Tweetovi

Blokirali ste korisnika/cu @SUNDARR_INSA

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SUNDARR_INSA

  1. Prikvačeni tweet
    13. ruj 2019.
    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  2. proslijedio/la je Tweet
    prije 22 sata

    CVE-2019-18426  
From Persistent-XSS in Whatsapp to Reading from the File System on Mac/Windows with a potential for RCE

Bounty: $12,500




    Poništi
  3. proslijedio/la je Tweet
    4. velj

    Real-time monitoring of secrets on github, gitlab and bitbucket.

    Poništi
  4. proslijedio/la je Tweet
    prije 12 sati

    2020-02-05:👾 🔒| 🔩Sunday Build: Jan 19 13:24:28 2020 🆕String Dec for ( i = 0; i < len_byt; ++i ) *(_BYTE *)(i + bin) -=*(_BYTE *)(ind + 4 * (iter % arg_div)); Cert 🔽 h/t MD5:31a8623c16177fb3e4619d05d97335fa

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    Poništi
  6. proslijedio/la je Tweet
    prije 16 sati

    I just published Hijacking shared report links in Google Data Studio

    Poništi
  7. proslijedio/la je Tweet
    3. velj

    Anyone! who can explain help in learning about writeable Firebase db? I'm testing again't my own app with public permission! ref: the report and poc at doesn't really show a proper way to write data?

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    4. velj

    Got a new CVE 😃 Title: phpList Authentication Bypass CVE ID: CVE-2020-8547 Vulnerability Type: PHP type Juggling / Loose Comparison

    Poništi
  9. proslijedio/la je Tweet
    2. velj

    GDA Android Reversing Tool - A New Decompiler Written Entirely In C++, So It Does Not Rely On The Java Platform, Which Is Succinct, Portable And Fast, And Supports APK, DEX, ODEX, Oat

    Poništi
  10. proslijedio/la je Tweet
    2. velj

    Buscar dispositivos vulnerables a rce: Shodan: "DreamBox" 200 ok Al entrar busquen un dispositivo con la opción de webadmin en extras y peguen este Exploit: http://<IP>:<PORT>/webadmin/script?command=|<COMANDO> Y LISTO

    Poništi
  11. proslijedio/la je Tweet
    1. velj

    Here is my writeup for Facebook's BountyCon 2020 CTF. Was not able to give much time but enjoyed solving a couple of challenges.🧑‍💻

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    24. sij

    Write-ups Effortlessly finding Cross Site Script Inclusion (XSSI) & JSONP for bug bounty The Bug That Exposed Your PayPal Password Yahoo — Two XSSi vulnerabilities ,

    Poništi
  13. proslijedio/la je Tweet
    24. sij
    Poništi
  14. proslijedio/la je Tweet
    28. sij
    Poništi
  15. proslijedio/la je Tweet

    »_ everything is not as it seems. 🎃 «input»; p=-alert(1)}//\ * var n = {a: "-alert(1)}//\", b: "-alert(1)}//\"}; «input»; p=\&q=-alert(1)// * var n = {a: "\", b: "-alert(1)}//"};

    Poništi
  16. proslijedio/la je Tweet

    FCW Insider: Jan. 31: The latest news and analysis from FCW’s reporters and editors. Advertise on IT…

    Poništi
  17. proslijedio/la je Tweet
    30. sij

    Windows Red Team Cheat Sheet 1. Recon 2. Elevation of Privileges 3. Lateral Movement 4. Golden and Silver Tickets 5. AD Attacks 6. Bypass-Evasion Techniques 7. Miscellaneous 8. Post exploitation - information gathering 9. Summary of tools

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  18. proslijedio/la je Tweet
    31. sij
    Poništi
  19. proslijedio/la je Tweet
    30. sij

    I published another blog today. This is a story about an interesting SQL Injection I found. “A Not-So-Blind RCE with SQL Injection” by Prashant Kumar

    Poništi
  20. proslijedio/la je Tweet
    31. sij
    Poništi
  21. proslijedio/la je Tweet
    30. sij

    I just posted some writeups for the challenges I created for the by . The source codes are coming! :) Thanks again to , la Ruche by , , and .

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·