Aashish Yadav

@aa5h15h

16/yo | & HOF | HS Infosec Layman | Ocassional Bug Bounty Hunter | Aspiring Security Researcher

127.0.0.1
Vrijeme pridruživanja: siječanj 2018.

Tweetovi

Blokirali ste korisnika/cu @aa5h15h

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @aa5h15h

  1. proslijedio/la je Tweet
    prije 21 sat

    I don't do illegal things just in case anyone else is thinking of DMing me. I will however demand all the roots.

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    99 smartphones are transported in a handcart to generate virtual traffic jam in Google Maps. Through this activity, it is possible to turn a green street red which has an impact in the physical world by navigating cars on another route!

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    31. sij

    Just released a quick tool, wordlistgen, I put together for taking a list of URLs/paths from stdin and parsing components (subdomains, paths, query strings & values) to easily/quickly make contextual content discovery wordlists for

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    30. sij
    Poništi
  5. proslijedio/la je Tweet
    28. sij

    I always had a hard time finding writeups beacuse they were all over the place in different blog posts, so I made this. If you know of something that is not in there, you are more than welcome to contribute! 🎉

    Poništi
  6. proslijedio/la je Tweet
    29. sij

    How to Red Team #1 - A twitter red team mind map Need credentials from the outside? 1. OSINT (Find e-mail/PII) 2. Social Engineer (Trick someone into clicking an e-mail you sent them w/o a payload) 3. Target External Services (Password Spray or find a vulnerable service )

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    30. sij

    In this blog, David Balaban looks at the challenges surrounding effective authorization of access control models. What solutions are there to address these challenges?

    Poništi
  8. proslijedio/la je Tweet
    29. sij
    Poništi
  9. proslijedio/la je Tweet
    29. sij
    Poništi
  10. proslijedio/la je Tweet
    29. sij

    Finding and exploiting CVE-2018–7445 (unauthenticated RCE in MikroTik’s RouterOS SMB)

    Poništi
  11. proslijedio/la je Tweet
    26. sij

    I love messing with ! Check out how much fun I had trolling a Nigerian prince that promised me a fortune. And also learn a bit about the scheme itself.

    Poništi
  12. proslijedio/la je Tweet
    27. sij
    Poništi
  13. Poništi
  14. proslijedio/la je Tweet
    24. sij

    Write-ups Effortlessly finding Cross Site Script Inclusion (XSSI) & JSONP for bug bounty The Bug That Exposed Your PayPal Password Yahoo — Two XSSi vulnerabilities ,

    Poništi
  15. proslijedio/la je Tweet
    23. sij

    PDF to XXE This makes me go in-depth about XML* Q like 1. Why XML is made? 2. Who uses XML? 3. What supports XML? 4. Why it can accept any tag? 5. How the tags are executed? 6. How/WHY does an entity work? 7. etc ENDS :)

    Poništi
  16. proslijedio/la je Tweet
    24. sij
    Poništi
  17. proslijedio/la je Tweet
    24. sij

    You want your photo removed from our facial recognition database? Just send us your photo and government-issued ID...

    Poništi
  18. proslijedio/la je Tweet
    23. sij

    Let’s play a game I need a bit of distraction. Tag your replies with I’ll start. Pwned again by Michael Kiwanuka

    Poništi
  19. proslijedio/la je Tweet
    24. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·