Tweetovi

Blokirali ste korisnika/cu @_hipotermia_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_hipotermia_

  1. Prikvačeni tweet
    3. sij

    To start the new year I'm releasing another write-up where I explain the process of detecting and exploiting a chained HTTP request smuggling vulnerability which led me to an account takeover.

    Poništi
  2. prije 44 minute

    Just received this amazing hoodie from & for being one of the first ten people to finish access control labs. Thanks guys!

    Poništi
  3. proslijedio/la je Tweet
    3. velj

    Here's my write-up for ’s CTF challenge!

    Poništi
  4. proslijedio/la je Tweet
    2. velj

    WooT! There is always a way. New short write up! Chain the bugs till you get what you want. Some steps were not mentionned. RT, Like and Comments are appreciated. For any pentest work DM me:) 🎉🎉

    Prikaži ovu nit
    Poništi
  5. 1. velj

    In January, I submitted 10 vulnerabilities to 3 programs on .

    Poništi
  6. proslijedio/la je Tweet
    31. sij

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    Poništi
  7. proslijedio/la je Tweet
    31. sij

    Join the BootCamp "Web Hacking 101 & Bug Bounty Hunting" by and . Does include ticket for the main event. Join us!

    Poništi
  8. proslijedio/la je Tweet
    31. sij

    Come to and learn with the how to start in the Hunters world. Let´s have fun with my bros and !!!

    Poništi
  9. proslijedio/la je Tweet
    27. sij

    One of the cooler bugs we ( ) found in 2019 would definitely be the CSTI->XSS->RCE chain in EA's Origin client :)

    Poništi
  10. 25. sij

    Happy to announce that I'll be helping on the web hacking 101 & bug bounty hunting bootcamp during this year's . You can buy your tickets on the following link:

    Poništi
  11. proslijedio/la je Tweet
    22. sij
    Odgovor korisniku/ci

    Insert Mr. Robot spoilers every time they trigger your WAF.

    Poništi
  12. 16. sij

    After spending almost the last 72h doing my OSWE exam, the only thing I wanted to do these days is spend some time away from my computer. I guess this will have to wait... thanks 🙃

    Poništi
  13. proslijedio/la je Tweet
    12. sij

    Just posted Remote Code Execution in Three Acts: Chaining Exposed Actuators and H2 Database Aliases in Spring Boot 2. Using a payload containing three different programming languages :)

    Poništi
  14. proslijedio/la je Tweet
    8. sij
    Prikaži ovu nit
    Poništi
  15. 30. pro 2019.

    And of course, all these crazy stickers that I took home.

    Prikaži ovu nit
    Poništi
  16. 30. pro 2019.

    Kudos for that assembly who was giving away these amazing 3D printed pokémon.

    Prikaži ovu nit
    Poništi
  17. 30. pro 2019.

    Lights everywhere.

    Prikaži ovu nit
    Poništi
  18. 30. pro 2019.

    A big shout out to this girl/boy who was just standing there for all the fucking congress.

    Prikaži ovu nit
    Poništi
  19. 30. pro 2019.

    This pong on 1 dimension it's probably the best game I've ever played.

    Prikaži ovu nit
    Poništi
  20. 30. pro 2019.

    Thanks to everyone who made this possible. Looking forward to see you all next year! Here's some pictures of some cool stuff I found during these days 👇🏼👇🏼👇🏼

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·