Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @aaaaa8716617
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @aaaaa8716617
-
abdo proslijedio/la je Tweet
Follow this step-by-step guide to properly test for
#XSS… Like a#KNOXSS! https://brutelogic.com.br/blog/testing-for-xss-like-a-knoxss/ … by@rodoassis@brutelogicHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
abdo proslijedio/la je Tweet
Building Advanced
#XSS Vectors (2016) http://brutelogic.com.br/docs/advanced-xss.pdf …pic.twitter.com/jdGTPtTyLy
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
abdo proslijedio/la je Tweet
dom xss
#haknfuk Exercise your#JS muscles and pop an alert box on these 3 main DOM-based reflected#XSS cases! https://brutelogic.com.br/blog/dom-based-xss-the-3-sinks/ … by@rodoassis@brutelogicPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
abdo proslijedio/la je Tweet
Here's a small
#XSS list for manual testing (main cases, high success rate). "><img src onerror=alert(1)> "autofocus onfocus=alert(1)// </script><script>alert(1)</script> '-alert(1)-' \'-alert(1)// javascript:alert(1) Try it on: - URL query, fragment & path; - all input fields.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
abdo proslijedio/la je Tweet
Yay, I was awarded a $500 bounty on
@Hacker0x01! https://hackerone.com/mygf#TogetherWeHitHarder for Stored XSSHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
abdo proslijedio/la je Tweet
Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!pic.twitter.com/FekupjS6qG
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
abdo proslijedio/la je Tweet
What is the best way to scare off black hat hackers?

pic.twitter.com/xTL5fI3NBv
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
abdo proslijedio/la je Tweet
For enumerating subdomains I always use
@zer0pwn's Spyse API wrapper. It's so f'in good! https://github.com/zeropwn/spyse.py …#bugbountytips#bugbountytip#bugbounties#bugbounty#infosecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
abdo proslijedio/la je Tweet
Stanford
@CyberApplied having a blast at@wrccdc Quals! Much appreciation to Black, White, Orange, and Red Teams for the
and many hours they commit. Good luck to all the talented teams in the West! Grateful for support from @Stanford_Cyber@StanfordEng.#wrccdc#nationalccdcpic.twitter.com/Cf7TKGA69D
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
abdo proslijedio/la je Tweet
#XSSI Write-ups Effortlessly finding Cross Site Script Inclusion (XSSI) & JSONP for bug bounty https://link.medium.com/g3MwS6YVK2 The Bug That Exposed Your PayPal Password https://link.medium.com/fxCdDmwl52 Yahoo — Two XSSi vulnerabilities https://link.medium.com/jFkPeGsUv3#bugbounty,#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
abdo proslijedio/la je Tweet
$40,000 Bugs Microsoft Edge (Chromium) - EoP via XSS to Potential RCE https://leucosite.com/Edge-Chromium-EoP-RCE … Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty https://samcurry.net/filling-in-the-blanks-exploiting-null-byte-buffer-overflow-for-a-40000-bounty …
#bugbounty,#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
abdo proslijedio/la je Tweet
A filter-confusing one by
@irsdl, inspired from@PortSwiggerRes <script> x = '<!--<script>'/*</script>-->*/;alert(1) </scriptHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
abdo proslijedio/la je Tweet
I once got 90% of a critical vulnerability in Mozilla Persona's password reset. 8 years later, it still hurts that I didn't complete it. Has anyone ever successfully exploited SMTP injection via the Reply-To+Eicar technique or similar non-CC methods?https://bugzilla.mozilla.org/show_bug.cgi?id=741814 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
abdo proslijedio/la je Tweet
Java + AWS serverless is awesome. We have your local dev setup and quickstart guide ready to go.
#serverless#java -
abdo proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
abdo proslijedio/la je Tweet
phpMyAdmin 4.8.x LFI to RCEhttps://blog.vulnspy.com/2018/06/21/phpMyAdmin-4-8-x-Authorited-CLI-to-RCE/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
abdo proslijedio/la je Tweet
See our introductory post about Doctrine Query Language injections:https://blog.deteact.com/dql-injection/
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
abdo proslijedio/la je Tweet
And again Account TakeOver. That's the fourth time. And the second one on the same site. ЫЫhttps://hackerone.com/reports/725707
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
abdo proslijedio/la je Tweet
A WAF bypass payload by
@JayateerthaG <img src=something onauxclick="new Function `al\ert\`xss\``">Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
abdo proslijedio/la je Tweet
Please check this screenshot. Are you checking there (after #)?
#XSS#KNOXSS
https://twitter.com/dark_warlord14/status/1204003326976647168 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.