3P1C

@_3P1C

Occasional Bug Bounty Hunter | CTF Player | | Everybody was once a noob🤓

/proc/self/cwd
Vrijeme pridruživanja: travanj 2019.

Tweetovi

Blokirali ste korisnika/cu @_3P1C

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_3P1C

  1. proslijedio/la je Tweet
    28. sij

    Also for the iPhone 11 Pro Max, iOS 13.3.1 beta3 Jailbreak

    Poništi
  2. proslijedio/la je Tweet
    14. sij

    Better late than never right ?

    Poništi
  3. proslijedio/la je Tweet
    6. sij

    One of the scarier bugs I’ve found: with Microsoft’s go-ahead & after many hours spent, I’m excited to finally publish this writeup and PoC! 👩🏼‍💻

    Poništi
  4. proslijedio/la je Tweet
    21. lis 2019.
    Poništi
  5. proslijedio/la je Tweet
    4. sij

    I've recently been fuzzing the PHP interpreter, and took a UaF bug all the way from crashing-sample to weaponized code execution. Here is the first of several blog posts I plan to write about the process.

    Poništi
  6. proslijedio/la je Tweet
    3. sij

    blc : Integrate Ghidra's decompiler as an Ida plugin : cc

    Poništi
  7. proslijedio/la je Tweet
    1. sij

    900 startups that hire REMOTELY: If you're looking for a remote job, could be worth checking out the spreadsheet. (not made by me) Spreadsheet includes: • company • what do they do • website • CEO • and more! RT to help someone find a job 😄

    Poništi
  8. proslijedio/la je Tweet
    2. sij

    CVE-2019-10758 post-auth Remote Code Execution in mongo-express < 0.54.0 via endpoints that uses the `toBSON` method however there are lots of no-auth mongo-express ... shodan: poc:

    Poništi
  9. proslijedio/la je Tweet
    3. sij

    P1 on new year (zimbra LFI) []/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz?v=091214175450&skin=../../../../../../../../../etc/passwd%00

    Poništi
  10. proslijedio/la je Tweet
    24. pro 2019.

    Writeup on how I made $40,000 breaking the new Chromium Edge using essentially two XSS flaws.

    Poništi
  11. proslijedio/la je Tweet

    WannaCry explained

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    22. pro 2019.
    Poništi
  13. 17. pro 2019.
    Poništi
  14. proslijedio/la je Tweet
    15. pro 2019.

    the FORBIDDEN ctf tactics the pros DONT want you to know!

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    12. pro 2019.

    Good news! Stalker is now ready for fuzzing and my frida-fuzzer is ready to fuzz APIs of Android apps. With a logic inspired by AFL, it has a libFuzzer-like harness interface. The project is in his early stage, look at the TODOs to contribute.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    9. pro 2019.

    I've published to the the unique actually working app to record the screen with internal audio record (root required). Obviously powered by which replace the audioserver functions granting permissions to do so. It's obviously totally free. <3

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    Odgovor korisnicima

    For command injection-related syntaxing, check out this project

    Poništi
  18. proslijedio/la je Tweet
    7. pro 2019.

    - Execute bash commands without spaces with two methods: 1- {ping,-c,1,127.0.0.1} 2- ping${IFS}-c${IFS}1${IFS}127.0.0.1 - terminal will translate ${IFS} into a space Thanks

    Poništi
  19. proslijedio/la je Tweet
    3. pro 2019.

    Another quick tip today. How to find the main() function when you don’t have symbols in a stripped binary. Haxember #3

    Poništi
  20. proslijedio/la je Tweet
    4. pro 2019.

    Reverse Engineering WhatsApp Encryption for Chat Manipulation and More


    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·