rz

@ar33zy_

pwn skiddie of hackstreetboys | I pwn 4 food

Vrijeme pridruživanja: ožujak 2018.

Tweetovi

Blokirali ste korisnika/cu @ar33zy_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ar33zy_

  1. 31. sij

    Ok.

    Poništi
  2. Poništi
  3. proslijedio/la je Tweet
    29. pro 2019.

    Philippines ❤️ if you want a HEAD IN THE CLOUDS PH IN 2020 retweet this and drop an image

    Poništi
  4. proslijedio/la je Tweet

    There's a big difference between choosing to work outside normal hours to better your career, and being required to by a toxic work culture. The claim that you have to spend your 20s working stupid hours is also verifiable false.

    Poništi
  5. proslijedio/la je Tweet
    23. pro 2019.

    I started in helpdesk with very little comsci background, then *heard* pentesting was a thing you could make a career. I begged, borrowed, ++ to learn everything I could about it. You can do it too. I promise. Happy holidays hackers. Especially newbies out there. Keep grinding.

    Poništi
  6. proslijedio/la je Tweet
    21. pro 2019.

    Question: If an app can contain up to 50k medical records per user, and: 1) is exposed to the internet 2) access is not restricted based on IP 3) authentication only requires basic login and no 2FA OR MFA 4) password policy allows Fall2019! is it secure enough? Plz RT

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    23. pro 2019.

    To the people upset by public red team tools. If you cant detect open source tools than what chance do you have at detecting private one off tools. It’s much easier to automate a battle against 100 duck sized horses than it is to face off against a single horse sized duck.

    Prikaži ovu nit
    Poništi
  8. 23. pro 2019.

    Fucking super wasteddddddd

    Poništi
  9. 19. pro 2019.

    Nowhere to go but down hahahahahahahaahahhhahahahahahahahahahaah

    Poništi
  10. proslijedio/la je Tweet
    14. lis 2019.

    How to DELETE 99.9% of your digital footprint from the internet [a thread]

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet

    Who wants to win a hoodie? We'll be launching a brand new Web Security Academy topic later today, including 13 new labs.

    Poništi
  12. 16. pro 2019.
    Poništi
  13. proslijedio/la je Tweet
    14. pro 2019.

    I am exploring fuzzing, started with this

    Poništi
  14. proslijedio/la je Tweet
    9. pro 2019.

    install gss-ntlmssp to allow powershell on kali to connect via Enter-PSSession to a windows box (negotiate auth)

    Poništi
  15. Poništi
  16. proslijedio/la je Tweet
    8. pro 2019.
    Poništi
  17. 8. pro 2019.

    Jisoo in yer area

    Poništi
  18. proslijedio/la je Tweet
    8. pro 2019.

    you can UAC bypass all executable files which are autoelevate true base on my first article. UAC Bypass All the things POCs: sample: Bluetooth uninstall device task (UAC Bypass to administrator)

    Poništi
  19. proslijedio/la je Tweet

    New reversing & exploitation challenge is online ICYMI. More challenges and free livestreams coming soon!

    Poništi
  20. proslijedio/la je Tweet
    7. pro 2019.

    WHY YOUR "TECHNICAL" HACKING QUESTIONS SUCK!!!!! Haxember #7

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·