Tweetovi

Blokirali ste korisnika/cu @bambishee

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @bambishee

  1. Prikvačeni tweet
    23. tra 2019.

    ScanQLi - SQL injection scanner to detect SQL vulns in all pages of a website from 1 URL!

    Poništi
  2. proslijedio/la je Tweet
    prije 2 sata

    From CSRF to RCE and WordPress-site (Code Snippets plugin) takeover: CVE-2020-8417

    Poništi
  3. proslijedio/la je Tweet
    prije 7 sati

    8 of the 10 Most Exploited Bugs Last Year Involved Microsoft Products by

    Poništi
  4. proslijedio/la je Tweet
    prije 7 sati

    How to Use Nikto for Scanning Vulnerabilities of Any Website in Kali Linux Follow Link:

    Poništi
  5. proslijedio/la je Tweet
    4. velj
    Poništi
  6. proslijedio/la je Tweet

    The issues could have been exploited to push (by URL manipulation) campaigns or execute JS code (in the context of the browser or app). Weizman demonstrated the attack by accessing the content of the "C:\Windows\System32\drivers\etc\hosts" file from a victim's PC.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet

    Discovered by , the latest file read attack against for desktop users is combination of ➡️ a dangerous open-redirect flaw, ➡️ a persistent XSS, ➡️ an insecure CSP configuration.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    4. velj

    detect the version of the target SSH server: msf > use auxiliary/scanner/ssh/ssh_version msf auxiliary(ssh_version) > set RHOSTS xx.xx.xx.xx/24 msf auxiliary(ssh_version) > set THREADS 256 msf auxiliary(ssh_version) > run

    Poništi
  9. proslijedio/la je Tweet
    4. velj

    A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo

    Poništi
  10. proslijedio/la je Tweet
    4. velj

    PEASS - Privilege Escalation Awesome Scripts SUITE is a collection of privilege escalation scripts. These tools search for local privilege escalation paths that you could exploit, and print them with colors so you can recognize misconfigurations easily.

    Poništi
  11. proslijedio/la je Tweet
    4. velj

    detect the version of the target FTP server: msf > use auxiliary/scanner/ftp/ftp_version msf auxiliary(ftp_version) > set RHOSTS xx.xx.xx.xx/24 msf auxiliary(ftp_version) > set THREADS 256 msf auxiliary(ftp_version) > run

    Poništi
  12. proslijedio/la je Tweet
    3. velj
    Poništi
  13. proslijedio/la je Tweet
    3. velj
    Poništi
  14. proslijedio/la je Tweet

    Yet Another Sudo ! When 'pwfeedback' is enabled, a new Sudo bug could let low privileged & users (or malicious programs) execute arbitrary commands with 'root' privileges. Details for CVE-2019-18634 ➤

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    1. velj

    I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)

    Poništi
  16. proslijedio/la je Tweet
    2. velj

    S3Enum - Fast Amazon S3 Bucket Enumeration Tool For Pentesters

    Poništi
  17. proslijedio/la je Tweet
    1. velj

    AttackSurfaceMapper v2.0 encompasses multiple tools for performing reconnaissance and extracting intel. New features have been added, including Active Port Scanning and “SuperFast” mode. See & demo it at

    Poništi
  18. proslijedio/la je Tweet
    1. velj
    Poništi
  19. proslijedio/la je Tweet
    1. velj
    Poništi
  20. proslijedio/la je Tweet
    1. velj
    Poništi
  21. proslijedio/la je Tweet
    31. sij

    Check out the new Microsoft.PowerShell.RemotingTools module preview release: . It contains a single cmdlet `Enable-SSHRemoting` that configures sshd_config for PowerShell remoting. Report issues to PowerShell repo, for now.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·