Akhil Reni

@akhilreni_hs

CTO at WeSecureApp. This is a personal stream, opinions expressed are mine.

Vrijeme pridruživanja: veljača 2015.

Tweetovi

Blokirali ste korisnika/cu @akhilreni_hs

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @akhilreni_hs

  1. proslijedio/la je Tweet
    4. velj

    Got a room full of future unicorns for Day One of CyRise Cohort 2020. We are officially in session. Pumped! Will announce the six clever cyber security startups soon..

    Poništi
  2. proslijedio/la je Tweet
    prije 23 sata

    A well-known motto created a full generation of people who are sorry every time they ask a question (despite paying you to learn from you)... It’s 👏 ok 👏 to 👏 ask 👏 (dumb) 👏 questions, 👏 you 👏 are 👏 here 👏 to 👏 learn 👏!

    Poništi
  3. proslijedio/la je Tweet
    4. velj

    by $12,500 USD Read From The File System Access (potencial RCE) on Whatsapp Desktop (electron)

    Poništi
  4. proslijedio/la je Tweet
    4. velj
    Prikaži ovu nit
    Poništi
  5. 3. velj

    I didn't sleep the whole night, is it the excitement or the jet lag?

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    3. velj

    Being an intern at is like getting surrounded by 😎cool skilled Hackers , Everyone here at WSA motivate you in every move of finding vulns , doing Research Learning awesome stuff 🎉😍

    Poništi
  7. 3. velj

    I strongly believe "when you know how to build it, you'll know how to break and fix it" We at teach every Intern that joins us to write code in PHP, find vulnerabilities in their own code and fix it. cc:

    Poništi
  8. 3. velj
    Prikaži ovu nit
    Poništi
  9. 1. velj

    So I'll be in Australia for the next 4 months and I have a pretty neat plan - Meet prospects for our product - make our product better - hack more - write blogs

    Poništi
  10. proslijedio/la je Tweet
    28. sij
    Prikaži ovu nit
    Poništi
  11. 26. sij
    Poništi
  12. 22. sij

    I stopped using swiggy and started using Amazing suggestions and much user friendly!

    Poništi
  13. 21. sij

    <pd4ml:attachment description="attached.txt" icon="PushPin">file:///etc/passwd</pd4ml:attachment> <pd4ml:attachment description="attached.txt" icon="PushPin"> http://169.254.169.254/latest/meta-data/</pd4ml:attachment> CC:

    Prikaži ovu nit
    Poništi
  14. 21. sij

    One of the apps we tested was using PD4ML for HTML to PDF, we got an XSS and later escalated to LFI using Iframe. But the funny part was PD4ML API supports attachment through <pd4ml:attachment> tag using which you can attach a file that lists directory or file content

    Prikaži ovu nit
    Poništi
  15. 18. sij

    chipak chipak ke rehne mai maza aata hai

    Poništi
  16. 18. sij

    Looks like OWASP website has been updated with new design

    Poništi
  17. 15. sij
    Poništi
  18. proslijedio/la je Tweet
    15. sij

    At last I got selected for an internship at , I was dreaming to work for this awesome company from long time . Thank you for providing such a great opportunity looking forward to learn a lot from awesome team at

    Poništi
  19. 13. sij

    Are there any good threat intel sources with data mapped to CVE(s)?

    Poništi
  20. 10. sij

    I have seen people throwing command execution payloads after url hash I have seen people throwing random encoded XSS payloads without knowing the context 🤦‍♂️

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·