Tweetovi

Blokirali ste korisnika/cu @Sarace_D

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Sarace_D

  1. proslijedio/la je Tweet
    31. pro 2019.

    NGINX error_page request smuggling Example Vulnerable Request GET /a HTTP/1.1 Host: localhost Content-Length: 56 GET /_hidden/index.html HTTP/1.1 Host: notlocalhost. Vulnerable Versions: 1.8.1 1.8.1 1.9.5 1.14.1 1.14.2 1.15.9 1.16.1 1.17.6

    Poništi
  2. proslijedio/la je Tweet
    21. pro 2019.

    by is a great tool, but I see a lot of people not realising you can set the -p flag for extra probes, add -p http:81 -p http:8000 -p http:8080 -p https:8443 to find those extra http & https servers

    Poništi
  3. proslijedio/la je Tweet
    19. pro 2019.
    Odgovor korisnicima i sljedećem broju korisnika:

    1/ most good things in life require hard work and dedication. while I'd love to say there's a silver bullet, there really isn't -- bug bounty is something that builds upon existing security concepts and classes of vulnerabilities. without those, you're going to be struggling

    Poništi
  4. proslijedio/la je Tweet
    12. pro 2019.

    My favorite Burp extensions: - Autorize - Reflection - Logger++ - Bypass WAF - JSON Beautifier - JSON Web Tokens - CSP Auditor - CSP-Bypass - Hackvertor - Active Scan++ - Backslash Powered Scanner - Auto repeater - Auth matrix - Hunter - CO2 - Xss validator and yours?

    Poništi
  5. proslijedio/la je Tweet
    11. pro 2019.

    What I'm seeing nowadays is beginners in are too much obsessed with advice. They want advice from every possible people and that's actually good for them but the problem arises when you don't work yourself. (1/5)

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·