Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @SilverPoision
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SilverPoision
-
Prikvačeni tweet
So the time has come to release the Beast from the cage and let him make some noise around our community. Rock-On a tool that I made is now live on Github and ready to rock. Check it's full guid on Github: https://github.com/SilverPoision/Rock-ON … and stay tuned for a good blog post describing it
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Piyush Kumar proslijedio/la je Tweet
Cross-Site Websocket Hijacking bug in Facebook that leads to account takeover By
@Samm0uda https://ysamm.com/?p=363 Bounty: $12500#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Piyush Kumar proslijedio/la je Tweet
My main takeaway is that, in the bug bounty world, you may have a duplicate for the XSS but not for the RCE (for the exact same vector)
https://medium.com/@abhishake100/my-first-rce-stressed-employee-gets-me-2x-bounty-c4879c277e37 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Piyush Kumar proslijedio/la je Tweet
Wondering what snakes
and SSTIs have in common? What the best Linux
distro is or how to find bugs in API's
? The latest edition of our #BugBytes provides all the answers -- and more!

https://go.intigriti.com/bugbytes-54 Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Piyush Kumar proslijedio/la je Tweet
https://github.com/arkadiyt/bounty-targets-data … This repo contains data dumps of Hackerone and Bugcrowd scopes(i.e. the domains that are eligible for bug bounty reports) in both text and JSON format and the interesting part is it is updated hourly :)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Piyush Kumar proslijedio/la je Tweet
Interesting list of 876 bug bounty programs by company: bounty/programs-list.csv at 3bed32ee073a0a673a33da8feb8f3af324aefc75 · yesnet0/bounty · GitHub https://github.com/yesnet0/bounty/blob/3bed32ee073a0a673a33da8feb8f3af324aefc75/programs-list.csv …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Piyush Kumar proslijedio/la je Tweet
Back to blogging! CSRF-protected forms,
@Burp_Suite Intruder, and no macros. A step-by-step walkthrough based on@DVWA that you can follow along at home... https://www.agarri.fr/blog/archives/2020/01/13/intruder_and_csrf-protected_form_without_macros/index.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Piyush Kumar proslijedio/la je Tweet
JSON Hijacking, SOP Bypass Technic with Cache-Control https://ift.tt/2TfoVCV New post by
#hahwul#BugBounty,#BugBountyTips,#BypassTechnic,#Hacking,#JSONHijacking,#SOP,#WebHackingHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Piyush Kumar proslijedio/la je Tweet
Ppl interested to learn about SSRF attacks
1. https://medium.com/bugbountywriteup/server-side-request-forgery-ssrf-testing-b9dfe57cca35 …
2. https://www.shorebreaksecurity.com/blog/ssrfs-up-real-world-server-side-request-forgery-ssrf/ …
3. https://hackerone.com/reports/115748
4. https://www.kernelpicnic.net/2017/05/29/Pivoting-from-blind-SSRF-to-RCE-with-Hashicorp-Consul.html …
5. https://geleta.eu/2019/my-first-ssrf-using-dns-rebinfing/ …
6. https://medium.com/@androgaming1912/gain-adfly-smtp-access-with-ssrf-via-gopher-protocol-26a26d0ec2cb …
7. https://medium.com/@w_hat_boy/server-side-request-forgery-ssrf-port-issue-hidden-approch-f4e67bd8cc86 …
8. https://medium.com/@armaanpathan/pdfreacter-ssrf-to-root-level-local-file-read-which-led-to-rce-eb460ffb3129 …
WriteupsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Piyush Kumar proslijedio/la je Tweet
I just published "Hunting Good Bugs with only <HTML>" https://link.medium.com/oTrMsKEM72
#bugbounty#infosec I hope you enjoy this post!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Piyush Kumar proslijedio/la je Tweet
I've just published my research on the Two Factor Authentication security subject https://bit.ly/2T95RWU . I had fun and enjoyed writing this one, hope you'll enjoy reading! Have a good read!
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Piyush Kumar proslijedio/la je Tweet
Have reproduced Citrix SSL VPN pre-auth RCE successfully on both local and remote. Interesting bug!https://www.tripwire.com/state-of-security/vert/citrix-netscaler-cve-2019-19781-what-you-need-to-know/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Piyush Kumar proslijedio/la je Tweet
Pro tip: do not conduct automated testing on contact forms, as this may end up being annoying for the people on the other side.
pic.twitter.com/7txziEetyw
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Piyush Kumar proslijedio/la je Tweet
We are excited to announce the Microsoft Identity Research Project Grant, a new opportunity in partnership with the security community to help protect Microsoft customers, with grant awards of up to $75,000 USD. For more information please visithttps://msrc-blog.microsoft.com/?p=11516
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Piyush Kumar proslijedio/la je Tweet
Here it is the first part of my blog post about request smuggling: Crossing The Borders : The illegal trade of HTTP requests https://link.medium.com/zfJBkMpxI2
#bugbounty#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Piyush Kumar proslijedio/la je Tweet
Writeup of an SOP bypass on
#Hackerone using a little trick learned from@BitK_ ! https://enumerated.wordpress.com/2019/12/24/sop-bypass-via-browser-cache/ …@Hacker0x01#TogetherWeHitHarder#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Piyush Kumar proslijedio/la je Tweet
Are you a student interested in making a career in Penetration Testing? We will be giving a seat in our Web Application Hacking - Pro Level training, free of cost, to someone in need. Retweet to spread the word. Tag friends you want to recommend.
#bugbountypic.twitter.com/xnSSLWXsTq
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Piyush Kumar proslijedio/la je Tweet
Using burp as an Evil Proxy on your next SSRF attack:https://medium.com/@Master_SEC/weaponizing-burp-to-work-as-an-evil-ssrf-confluence-server-e077d71b4ef2 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Piyush Kumar proslijedio/la je Tweet
Now use your favorite Google Dorks techniques to find vulnerabilities and earn Bounties. with the help of this customized The Bounty Dorks cheat sheet.
#bugbounty#togetherwehitharderhttps://github.com/shauryasharma-05/The-Bounty-Dorks …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Piyush Kumar proslijedio/la je Tweet
In the latest edition of our
#BugBytes, you'll learn how to use unicode for shorter XSS payloads, how to get
numbers for free, we look back on @hacker0x01's session leakage incident this week (+ their excellent response) and much more!

https://go.intigriti.com/bugbytes-48 Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Piyush Kumar proslijedio/la je Tweet
Breaking the chains on HTTP Request Smuggler, by
@albinowaxhttps://portswigger.net/research/breaking-the-chains-on-http-request-smuggler …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.