Sadiq West

@Sadiq_West

Security Enthusiast | Footballer | 🐛 Hunter | 🕷🕸

Your Computer
Vrijeme pridruživanja: prosinac 2015.

Tweetovi

Blokirali ste korisnika/cu @Sadiq_West

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Sadiq_West

  1. proslijedio/la je Tweet
    4. velj

    I just published a blog post "Responsible Disclosure: Breaking out of a Sandboxed Editor to perform RCE"

    Poništi
  2. proslijedio/la je Tweet
    3. velj
    Poništi
  3. proslijedio/la je Tweet
    2. velj

    WooT! There is always a way. New short write up! Chain the bugs till you get what you want. Some steps were not mentionned. RT, Like and Comments are appreciated. For any pentest work DM me:) 🎉🎉

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    29. sij

    We all love Burp suite by , right? Want to send over all the ffuf job matches to Burp? Easy with -replay-proxy ffuf -u -w wordlist.txt -replay-proxy http://127.0.0.1:8080 If you ffuf on remote box, this totally works through ssh tunnels too!

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    26. sij

    A familiar story to those of you who like to responsibly report the bugs you find, security researcher goes the extra mile to get the job done.

    Poništi
  6. 26. sij
    Poništi
  7. 22. sij
    Poništi
  8. proslijedio/la je Tweet
    13. sij

    Want Free💰? Jump on the Citrix wagon! Pick a program on git clone cd check-cve-2019-19781 pip3 install -r requirements.txt cat hosts.txt | while read url ; do cve-2019-19781 ;done > loot.txt 2>&1 cat loot.txt | grep appear

    Poništi
  9. proslijedio/la je Tweet
    13. sij
    Poništi
  10. 7. sij
    Poništi
  11. 5. sij

    الحمد لله My 2020 Start with SSRF on Here is an Amazing thing i wish to share to Noobs like me.

    Poništi
  12. 31. pro 2019.

    Thanks man, gcloud is one of my go-in tools, i no longer use VM i run whatever tools i want: No need to use any Vm again

    Poništi
  13. proslijedio/la je Tweet
    21. pro 2019.

    New writeup, one of my favorite bugs 🤠 - Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty Featuring...

    Poništi
  14. 17. pro 2019.
    Poništi
  15. proslijedio/la je Tweet
    13. pro 2019.

    Hi, If you want to know how SSRF Vulnerability was exist in Vimeo, you should read: Reported through ;)

    Poništi
  16. 13. lis 2019.
    Poništi
  17. proslijedio/la je Tweet
    8. ožu 2019.

    Did a Write up of Vimeo SSRF , It was an interesting one. RT if you like it.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    25. ožu 2019.
    Poništi
  19. 26. kol 2019.
    Poništi
  20. proslijedio/la je Tweet
    25. kol 2019.

    As per the vote results, here you go! A cool XXE resulting from a SSRF found on local company website during a pentest. DMs are open, retweet and like if you love this style of PoC! 😎

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·