Tweetovi

Blokirali ste korisnika/cu @_bhamza

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_bhamza

  1. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    VSCode x * VSCode based GUI * Interactive terminal * Remote file browser (Yes!) * Open source Not on market yet. But you can built it from the source:

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    16. sij

    Bug bounty is free labour. Change my mind

    Poništi
  4. proslijedio/la je Tweet
    18. sij

    Sharing my analyses on the recent malware that targeted instances, categorized by as . Using of course 😍😍😍.

    Poništi
  5. proslijedio/la je Tweet
    5. sij

    3rd app shipped with frida injector in production == sdk. Happy coding

    Poništi
  6. proslijedio/la je Tweet
    30. pro 2019.
    Poništi
  7. proslijedio/la je Tweet
    25. pro 2019.

    Lockdoor Framework 2.0 is OUT! Lockdoor - A Penetration Testing framework Lockdoor is now available on Docker Lockdoor is now optimized for quick execution Lockdoor on DockerHub : Download Lockdoor :

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    21. pro 2019.

    Reverse Engineering a real world 249 bytes backdoor!

    Poništi
  9. proslijedio/la je Tweet
    22. pro 2019.

    Based on community feedback, popularity, and the opinions of , we've compiled this list of the top 10 extensions for pen testers.

    Poništi
  10. 15. pro 2019.

    I once delivered an XSS payload via a SVG file. The client was surprised upon reporting the issue. This was his reply: "Cool finding! I didn't know it was possible to embed JS code in SVG... I will use this *feature* in another product of ours". 😆

    Poništi
  11. proslijedio/la je Tweet
    14. pro 2019.

    Just got my Android malware antivirus engine running on ! It detected a random malicious APK: Very satisfying! If you're a startup or researcher looking to bring your AV engine to market, check out PolySwarm.

    Poništi
  12. proslijedio/la je Tweet
    14. pro 2019.
    Poništi
  13. proslijedio/la je Tweet
    10. pro 2019.

    AOSP just got a web source tool with cross references and searches:

    Poništi
  14. proslijedio/la je Tweet
    9. pro 2019.

    One of my favorite party tricks is showing how you can invert C array indexing syntax such that a[2] is equivalent to 2[a] because syntactic sugar. I wanted to see how that works with multidimensional arrays. Turns out it’s just as fun, maybe more

    Poništi
  15. proslijedio/la je Tweet
    7. pro 2019.

    A new Spot The Bug challenge I made based on a vulnerability I found in the wild. Can you perform command injection?

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    3. pro 2019.

    My newest Polyglot file monstrosity is finished! It's simultaneously a Gameboy ROM, NES ROM, PDF File, HTML File, and ZIP File that contains its own source code. Everything fits nicely in a 32KB Gameboy Cartridge. You can play with it at

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    3. pro 2019.

    I was today years old when I learnt that you can run ELF using ld-linux. Useful when the executable bit is not set (and you can't change it).

    Poništi
  18. proslijedio/la je Tweet
    28. stu 2019.

    Got 5 flareon medals🏅 in 4 different countries 😅 ggwp. Thanks !

    Poništi
  19. proslijedio/la je Tweet

    Updated one of my most used plugins to Python3 / IDA 7.4 - great for looking at any native libs that are 32bit

    Poništi
  20. proslijedio/la je Tweet
    16. stu 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·