Splint3r7

@Splint3r7

Enthusiastic Cyber Security Professional | Gamer | Bug Bounty hunter | EJPT | OSCP

0.0.0.0/24
Vrijeme pridruživanja: rujan 2016.

Tweetovi

Blokirali ste korisnika/cu @Splint3r7

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Splint3r7

  1. Prikvačeni tweet
    27. pro 2018.

    Some of my achievements of 2018: - 10k$+ from bug bounties (6 months of hunting) - Top 130 on Bugcrowd - learned Bash and python - learned business - Collab with some amazing hackers! - Expensive & luxury tour to Thailand (twice) Thanks everyone who made my 2018 special👌

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    Here is my writeup for Facebook's BountyCon 2020 CTF. Was not able to give much time but enjoyed solving a couple of challenges.🧑‍💻

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    31. sij

    😱😱😱 is joining me on my stream this Sunday and we have a lot to talk about. I’m excited to see what makes zseano’s approach so unique and how he looks for bugs when he’s hacking!

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    Some hunters made over €50.000 in bug bounties with this simple trick. 🤑 Thanks for the , !

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    28. sij
    Poništi
  6. proslijedio/la je Tweet
    26. sij

    GET /example?param=test .. nothing interesting happened, not vuln to XSS. (<> " was filtered) but if I change it to POST it's reflected as value=\"test\" POST /example#xss param=test+onfocus='alert(0)'id='xss' ..and I can haz XSS bypassing their 'filter'

    Poništi
  7. proslijedio/la je Tweet
    26. sij

    Data extraction bug in Facebook. Sorry, no write-up for this one for the current time!

    Poništi
  8. proslijedio/la je Tweet
    25. sij

    Introducing a recent bug we found "From SSL Pinning Bypass to XXE Injection"

    Poništi
  9. proslijedio/la je Tweet
    25. sij

    Espectacular como salio el "Buenos Aires Live Meetup" powered by más de 26 bugs reportados incluyendo varios critical, más de U$S 10000 en bounties, arriba los hackers argentinos!

    Poništi
  10. proslijedio/la je Tweet
    25. sij

    This is gonna be awesome, if you want to know more about recon and being unique in attacking your targets ensure to join us tomorrow ;), Let's Get Ready To Rumble!!!

    Poništi
  11. proslijedio/la je Tweet
    24. sij

    Do yourself a favour and run "curl ".

    Poništi
  12. proslijedio/la je Tweet
    24. sij
    Poništi
  13. proslijedio/la je Tweet
    23. sij

    "ondragend" event seems to bypass certain WAFs <p ondragend=[1].map(prompt) draggable="true">dragMe</p> cc

    Poništi
  14. proslijedio/la je Tweet
    2. sij
    Odgovor korisnicima

    The plan is for a series of events in Pakistan, Lahore and Islamabad to start, Karachi is possible. Keep an eye on and for dates and details.

    Poništi
  15. proslijedio/la je Tweet
    22. sij

    Hello Everyone With all your support we are able to pay our 1st payment of 5000/- USD to doctor and the implant date is in March. Almost 90% target has been achieved 🙏 If someone still want to donate in good cause then kindly follow the link. Thanks

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    21. sij

    Opensourcing another project from team , Simple and Fast port scanner with handy features to use with another tool in your recon pipeline. Link to project:-

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    19. sij

    1 liner to get a list of all *.mil sites for DeptOfDefense's program on crtsh %.mil | rev | cut -d "." -f 1,2 | rev | sort -u | tee -a ~/recondata/milsite.txt | grep -v "\@"

    Poništi
  18. proslijedio/la je Tweet
    10. sij

    Not sure what search filters are available? Check out our new filter reference page:

    Poništi
  19. proslijedio/la je Tweet
    16. sij

    #!/usr/bin/python from floor import mouse

    Poništi
  20. proslijedio/la je Tweet
    15. sij

    Kali-themes 2020.1.1 just released with new dark and light gnome-shell themes!!🥳🥳 Hope you like them 😁

    Poništi
  21. proslijedio/la je Tweet
    15. sij

    exploit landed in ! With a useful 'check' command to check if you have vulnerable assets. And a meterpreter session if you need to demo something :) CVE-2019-19781

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·