Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @akita_zen
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @akita_zen
-
Prikvačeni tweet
For those who doesn’t know, recently I just hit a €12000

on @yeswehack ! Thanks for this fun interview
https://blog.yeswehack.com/2019/09/24/yeswehack-prophile-on-ak1t4/ … thanks to the amazing people working over this awesome platform @rom1_@free_man_@adrien_jeanneau

#bugbounty#infosec#bugbountytips https://twitter.com/yeswehack/status/1176465677911285760 …pic.twitter.com/E3fuJ0UNqn
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ak1t4 proslijedio/la je Tweet
Give a man an open redirect, and you feed him for a day. Teach a man to chain open redirects with other bugs, and you feed him for a lifetime.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I was wondering why this guy shine
so much?
"beautiful people don't come out of nowhere"
Totally recommended this interview, specially if you are struggling with mental/emotional issues
This is amazing @stokfredrik

Thank you!
https://anchor.fm/bugbountypodcast/episodes/Episode-1-ft--STK-e84lj9 … #bugbounty#infosecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ak1t4 proslijedio/la je Tweet
Some
#bugbounty hunters made over €50.000 in bug bounties with this simple trick.
Thanks for the #BugBountyTip,@rez0__!pic.twitter.com/z9sPFJTNqV
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ak1t4 proslijedio/la je Tweet
@ngalongc,@EdOverflow, and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover. https://blog.reconless.com/samesite-by-default/ …pic.twitter.com/5R23YmpksT
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ak1t4 proslijedio/la je Tweet
I published another blog today. This is a story about an interesting SQL Injection I found. “A Not-So-Blind RCE with SQL Injection” by Prashant Kumarhttps://link.medium.com/sC7JJUxgG3
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ak1t4 proslijedio/la je Tweet
Stream #4 is up on Youtube! These segments I call "Tool Time" and go through some new-ish bounty/appsec tradecraft + tools. Enjoy! https://youtu.be/00xVyT0k-_E pic.twitter.com/VqWt46zX3c
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Thanks
@yeswehack !Special Achievement Awarded: “Surgeon” (max reward
on a program) #bugbounty#infosecpic.twitter.com/b3q8QVUll4
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ak1t4 proslijedio/la je Tweet
We all love Burp suite by
@PortSwigger , right? Want to send over all the ffuf job matches to Burp? Easy with -replay-proxy ffuf -u https://example.org/FUZZ -w wordlist.txt -replay-proxy http://127.0.0.1:8080 If you ffuf on remote box, this totally works through ssh tunnels too!Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ak1t4 proslijedio/la je Tweet
Wrote and just released a simple tool wrapping one of my favorites, LinkFinder. “endpointdiff” will help to discover differences between old & new JS files to determine if any endpoints were removed/added. https://github.com/ameenmaali/endpointdiff …
#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Thanks
@Bugcrowd P1 warrior!
https://twitter.com/bugcrowd/status/1222634277709471746 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
ak1t4 proslijedio/la je Tweet
CVE-2020-5504 SQLI in phpMyAdmin: A malicious user could inject custom SQL in place of their own username when creating queries to this page https://www.phpmyadmin.net/security/PMASA-2020-1/ … fix: https://github.com/phpmyadmin/phpmyadmin/commit/c86acbf3ed49f69cf38b31879886dd5eb86b6983 …pic.twitter.com/S3a3B1zHz4
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ak1t4 proslijedio/la je Tweet
Unrestricted file upload https://link.medium.com/sILCWr8xB3 https://link.medium.com/V8SdaJ8xB3 https://noobe.io/articles/2019-09/exploiting-cookie-based-xss-by-finding-rce … https://link.medium.com/6qTQZwayB3 https://anotherhackerblog.com/exploiting-file-uploads-pt-2 … https://link.medium.com/1wFiIWayB3 https://link.medium.com/5rv5CbbyB3 https://mustafakemalcan.com/asus-rce-vulnerability-on-rma-asus-europe-eu … https://link.medium.com/jFGhtvbyB3 https://link.medium.com/fRfag0byB3
#bougbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ak1t4 proslijedio/la je Tweet
When you're brute forcing for endpoints, don't forget to add extensions. You can also use this method to discover backup files. Here's a command I use frequently: dirsearch -e php,asp,aspx,jsp,py,txt,conf,config,bak,backup,swp,old,db,sql -u <target>
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ak1t4 proslijedio/la je Tweet
Digital Ocean Bucket Takeover:- format: bucketname[.]region[.]digitaloceanspaces[.]com In Console:- Create Space, type the bucket name, make it public :) How to find? site:github[.]com intext:digitaloceanspaces[.]com
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ak1t4 proslijedio/la je Tweet
#BugBountyTip time: combine Arjun from@s0md3v with BurpIntuder to bruteforce parameter values. I once got "?debug" as a valid parameter and got "on" as a good value which disclosed juicy information helping me chain bugs to a P1. Final: "?debug=on"#bugbountytips#pentest RT & LHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ak1t4 proslijedio/la je Tweet
Espectacular como salio el "Buenos Aires Live Meetup" powered by
@Hacker0x01@Arl_rose@sgtcardigan@soyelmago más de 26 bugs reportados incluyendo varios critical, más de U$S 10000 en bounties, arriba los hackers argentinos!#h1meetup#togetherwehitharder#buenosaireslivehackingpic.twitter.com/M7nwYuBNJm
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ak1t4 proslijedio/la je Tweet
We are screaming congratulations to our SEVENTH million-dollar hacker!
@inhibitor181 sprinted across the 7-figure payout mark, bringing in almost $300K in bounties over the last 90-days. You're incredible! Thank you for the work you do in security. Thank you for being you!
pic.twitter.com/yy8Lehg83l
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ak1t4 proslijedio/la je Tweet
I just have write: “Subdomains Enumeration: what is, how to do it, monitoring automation using webhooks and centralizing your findings”. I hope you enjoy it.
#BugBounty#bugbountytips#subdomains#hacking#recon#enumeration#automationhttps://link.medium.com/ShJGprCpu0Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ak1t4 proslijedio/la je Tweet
3 different ways to bypass the
#WAF ! Kudos to: >@Blaklis_ https://twitter.com/Blaklis_/status/1125663871056928769 … >@nicocanicolas https://twitter.com/nicocanicolas/status/1125399154560307205 … >@RenwaX23 https://twitter.com/RenwaX23/status/1125387416175546368 …#bugbountytips#BugBounty#BugBountyQuiz#XSSpic.twitter.com/nMA84yiU9q
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
The 
) is currently mass scanning the internet for these paths:
/admin-app/.env
/api/.env
/app/.env
/apps/.env
/back/.env
/core/.env
/cp/.env
/development/.env
/docker/.env
/fedex/.env
/local/.env
/private/.env
/rest/.env
/shared/.env
/sources/.env
/system/.env
. . .