Strynx

@Strynx_Security

Stiching all your Security Loopholes

Vrijeme pridruživanja: prosinac 2019.

Tweetovi

Blokirali ste korisnika/cu @Strynx_Security

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Strynx_Security

  1. 19. sij

    found a subdomain that says "site can't be reached" try prepend https before the sub[s], also try different different port (follow-up by previous protip )

    Poništi
  2. 4. sij

    do intense nmap scan over the target[s] and watch-out for services like ldap, snmp , etc. And you might end up with good bounties.

    Poništi
  3. 1. sij

    Howdy Infosec peeps! Here’s our another Blog Post by our team member . Here’s how he exploited an ImageMagick Instance running in the server to exploit it to gain Remote Code Execution. Link - Please Subscribe to the blog!

    Poništi
  4. 1. sij

    Thank you for the mention. Hope to write more blogs for the infosec people soon.

    Poništi
  5. 24. pro 2019.

    Here's presenting our first blog post: In this blog, a flaw in one of the world's largest cryptocurrency site was discovered which caused a RCE on the server. Feel free to write any questions in the comments and we will be happy to answer them. Stay Tuned!

    Poništi
  6. 24. pro 2019.

    Beginning is a series of blog posts highlighting the critical issues found and reported by the team members, sharing their experience on how they found it.

    Poništi
  7. 24. pro 2019.

    Hello to all the Security Researchers and Companies out there. We at Strynx strive to secure the internet by providing our expertise in detecting various vulnerabilities out in the open by providing solutions to identify and mitigate them.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·