YoKo Kho

@YoKoAcc

Independent | Part Time Bug Hunter | OSCP | One of 2018 BugCrowd MVP | | (Bahasa) Free!

Vrijeme pridruživanja: rujan 2012.

Tweetovi

Blokirali ste korisnika/cu @YoKoAcc

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @YoKoAcc

  1. Prikvačeni tweet
    31. lis 2019.

    Bismillah. Releasing one of the unique (not new) Issue. $5,000 XSS Issue at Avast & AVG Desktop AntiVirus for Windows (Yes, Desktop!) My Special thanks to and for their cool research related short XSS payload.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet

    Just received permission to share another fun remote code execution chain on an unnamed program! Will be posting it in the coming days at :)

    Poništi
  3. proslijedio/la je Tweet
    prije 9 sati

    A completely free, open source and online course about Reverse Engineering iOS Applications. - awesome ressouce, have a look! Thanks for sharing

    Poništi
  4. proslijedio/la je Tweet
    prije 20 sati

    Pretty cool post titled "Analyzing WhatsApp Calls with Wireshark, radare2 and Frida"! More please! :D

    Poništi
  5. proslijedio/la je Tweet
    prije 16 sati

    A classic bug in SAP HANA and misconfigured NFS share: a tale in two parts

    Poništi
  6. proslijedio/la je Tweet
    prije 20 sati

    How to Pwn A Pwned Citrix? Is it possible to upgrade your recon with the and tweeted the best of the week? All of these answers are available in the latest edition of our ! 👇👇👇

    Poništi
  7. proslijedio/la je Tweet
    5. velj

    CVE-2019-12180 – ReadyAPI & SoapUI command execution via malicous project file

    Poništi
  8. proslijedio/la je Tweet
    5. velj

    Hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources. - you can't read everything 🤣

    Poništi
  9. proslijedio/la je Tweet
    prije 24 sata

    New blog post: Simple Remote Code Execution Vulnerability Examples for Beginners

    Poništi
  10. proslijedio/la je Tweet
    4. velj

    Just a quick blog post: Easily leaking passenger information on a program. Be careful what you share online! :)

    Poništi
  11. proslijedio/la je Tweet

    Exploiting Format Strings in Windows

    Poništi
  12. proslijedio/la je Tweet
    4. velj

    Adding a Backdoor to AD in 400 Milliseconds

    Poništi
  13. proslijedio/la je Tweet
    4. velj

    by $12,500 USD Read From The File System Access (potencial RCE) on Whatsapp Desktop (electron)

    Poništi
  14. proslijedio/la je Tweet
    4. velj
    Poništi
  15. proslijedio/la je Tweet
    4. velj

    I just published a blog post "Responsible Disclosure: Breaking out of a Sandboxed Editor to perform RCE"

    Poništi
  16. Poništi
  17. proslijedio/la je Tweet
    4. velj

    New release of the Social-Engineer Toolkit version 8.0.2. Massive bug fixes and improvements.

    Poništi
  18. proslijedio/la je Tweet
    11. sij

    It deauth nearby access points and upload handshakes to cloud. USED: 40$ Chinese rebranded phone + 5$ external wifi card. Inspired from pwnagotchi.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    4. velj

    During his research into web-cache poisoning, stumbled upon a new route-poisoning trick for systems built on Zend and Symfony frameworks. Try it for yourself:

    Poništi
  20. proslijedio/la je Tweet
    3. velj

    My writeup for H1-415 CTF. Again, hope that you enjoy it. :) Thanks,

    Poništi
  21. proslijedio/la je Tweet
    4. velj
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·