Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @Splint3r7
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Splint3r7
-
Prikvačeni tweet
Some of my achievements of 2018: - 10k$+ from bug bounties (6 months of hunting) - Top 130 on Bugcrowd - learned Bash and python - learned business - Collab with some amazing hackers! - Expensive & luxury tour to Thailand (twice) Thanks everyone who made my 2018 special
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Splint3r7 proslijedio/la je Tweet
Here is my writeup for Facebook's BountyCon 2020 CTF. Was not able to give much time but enjoyed solving a couple of challenges.
#bugbounty#ctfhttps://blog.shoebpatel.com/2020/01/31/Facebooks-BountyCon-2020-CTF-Writeup/ …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Splint3r7 proslijedio/la je Tweet



@zseano is joining me on my stream this Sunday and we have a lot to talk about. I’m excited to see what makes zseano’s approach so unique and how he looks for bugs when he’s hacking!pic.twitter.com/nUtQ4TUNuS
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Splint3r7 proslijedio/la je Tweet
Some
#bugbounty hunters made over €50.000 in bug bounties with this simple trick.
Thanks for the #BugBountyTip,@rez0__!pic.twitter.com/z9sPFJTNqV
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Splint3r7 proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Splint3r7 proslijedio/la je Tweet
GET /example?param=test .. nothing interesting happened, not vuln to XSS. (<> " was filtered) but if I change it to POST it's reflected as value=\"test\" POST /example#xss param=test+onfocus='alert(0)'id='xss' ..and I can haz XSS bypassing their 'filter'pic.twitter.com/RjRzccus5J
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Splint3r7 proslijedio/la je Tweet
Data extraction bug in Facebook. Sorry, no write-up for this one for the current time!
#BugBountypic.twitter.com/EX4tXLPH2J
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Splint3r7 proslijedio/la je Tweet
Introducing a recent bug we found "From SSL Pinning Bypass to XXE Injection"pic.twitter.com/3X22xVk3O3
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Splint3r7 proslijedio/la je Tweet
Espectacular como salio el "Buenos Aires Live Meetup" powered by
@Hacker0x01@Arl_rose@sgtcardigan@soyelmago más de 26 bugs reportados incluyendo varios critical, más de U$S 10000 en bounties, arriba los hackers argentinos!#h1meetup#togetherwehitharder#buenosaireslivehackingpic.twitter.com/M7nwYuBNJm
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Splint3r7 proslijedio/la je Tweet
This is gonna be awesome, if you want to know more about recon and being unique in attacking your targets ensure to join us tomorrow ;), Let's Get Ready To Rumble!!!
#BugBounty#infosechttps://twitter.com/NahamSec/status/1221164586696613890 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Splint3r7 proslijedio/la je Tweet
Do yourself a favour and run "curl http://parrot.live ".pic.twitter.com/oErlLbWscv
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Splint3r7 proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Splint3r7 proslijedio/la je Tweet
"ondragend" event seems to bypass certain WAFs <p ondragend=[1].map(prompt) draggable="true">dragMe</p> cc
@brutelogicpic.twitter.com/l6rwW18NWc
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Splint3r7 proslijedio/la je Tweet
The plan is for a series of events in Pakistan, Lahore and Islamabad to start, Karachi is possible. Keep an eye on
@BsidesIslamabad and@BsidesLahore for dates and details.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Splint3r7 proslijedio/la je Tweet
Hello Everyone With all your support we are able to pay our 1st payment of 5000/- USD to doctor and the implant date is in March. Almost 90% target has been achieved
If someone still want to donate in good cause then kindly follow the link.
https://www.gofundme.com/f/help-shahzil-hear-again …
Thankspic.twitter.com/bIfaYulobd
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Splint3r7 proslijedio/la je Tweet
Opensourcing another project from team
@pdiscoveryio#Nabbu, Simple and Fast port scanner with handy features to use with another tool in your recon pipeline. Link to project:- https://github.com/projectdiscovery/naabu …#naabu#bugbounty#infosec#pentestingpic.twitter.com/9SVwfXziqNPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Splint3r7 proslijedio/la je Tweet
1 liner to get a list of all *.mil sites for DeptOfDefense's program on
@Hacker0x01 crtsh %.mil | rev | cut -d "." -f 1,2 | rev | sort -u | tee -a ~/recondata/milsite.txt | grep -v "\@"Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Splint3r7 proslijedio/la je Tweet
Not sure what search filters are available? Check out our new filter reference page: https://beta.shodan.io/search/filters pic.twitter.com/bUJX1D8ChQ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Splint3r7 proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Splint3r7 proslijedio/la je Tweet
Kali-themes 2020.1.1 just released with new dark and light gnome-shell themes!!

Hope you like them
@kalilinux#gnomeshellpic.twitter.com/rrhRJEBcIS
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Splint3r7 proslijedio/la je Tweet
#Shitrix exploit landed in#metasploit ! With a useful 'check' command to check if you have vulnerable assets. And a meterpreter session if you need to demo something :) CVE-2019-19781 https://github.com/rapid7/metasploit-framework/pull/12816 …pic.twitter.com/xmMrgUfj4i
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
) is currently mass scanning the internet for these paths:
/admin-app/.env
/api/.env
/app/.env
/apps/.env
/back/.env
/core/.env
/cp/.env
/development/.env
/docker/.env
/fedex/.env
/local/.env
/private/.env
/rest/.env
/shared/.env
/sources/.env
/system/.env
. . .