Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @bbakbbak22
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @bbakbbak22
-
bbakbbak2 proslijedio/la je Tweet
#writeup by@WeizmanGal $12,500 USD Read From The File System Access (potencial RCE) on Whatsapp Desktop (electron)#BugBounty#infosechttps://www.perimeterx.com/tech-blog/2020/whatsapp-fs-read-vuln-disclosure …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bbakbbak2 proslijedio/la je Tweet
Very useful tool if you are studying Drivers. https://github.com/zodiacon/DriverMon … Also really enjoyed the book: Windows Kernel Programming https://leanpub.com/windowskernelprogramming …
@zodiaconHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bbakbbak2 proslijedio/la je Tweet
Hunting For Bugs With AFL 101 - A PRIMER
#infosec#pentest#exploitDev#bugbountyhttps://research.aurainfosec.io/hunting-for-bugs-101/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bbakbbak2 proslijedio/la je Tweet
Exploiting Insecure Firebase Database! https://blog.securitybreached.org/2020/02/04/exploiting-insecure-firebase-database-bugbounty/ …pic.twitter.com/EXmrMSv9tg
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bbakbbak2 proslijedio/la je Tweet
Takeover story of repo 1.A site having github logo 2. Example: Click on logo it'll show you git repo(http://github.com/site/ ) 3. In my case , It was 404 Main part 4. Created git account with name of company , So it was like http://github.com/site/ Successful takeover
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bbakbbak2 proslijedio/la je Tweet
[PoC] Heap Overflow in F-Secure Internet Gatekeeper POST /submit HTTP/1.1 Host: 192.168.0.24:9012 Content-Length: 21487483844 AAAAAAAAAAAAAAAAAAAAAAAAAAA https://blog.doyensec.com/2020/02/03/heap-exploit.html?fbclid=IwAR3bVbf9gDTsDtJAhe7g3m_LHMi2TOFV6AtIoKoHUonKWqpq8qqmgLzgxPU …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bbakbbak2 proslijedio/la je Tweet
BurpSuite 2020.01 Release Review, Change HTTP Message Editor! https://ift.tt/2RTbiIp New post by
#hahwul#Burp_Suite,#Hacking,#SecurityHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bbakbbak2 proslijedio/la je Tweet
Chapter 6 has been published!https://leanpub.com/windows10systemprogramming …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bbakbbak2 proslijedio/la je Tweet
Exploiting Format Strings in Windowshttps://medium.com/bugbountywriteup/exploiting-format-strings-in-windows-5f96c9b29dea?source=rss----7b722bfd1b8d---4 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bbakbbak2 proslijedio/la je Tweet
Here is my massive lib db (for ctfs/wargames/blind pwns etc.). It consists of thousands of libs across over a dozen Linux distributions and architectures spanning the last 20 years. It indexes symbols & gadgets (including one gadgets AKA magic gadgets). https://github.com/0xb0bb/karkinos pic.twitter.com/T76K3lkQ3r
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bbakbbak2 proslijedio/la je Tweet
Today's study session

- Studying x86 Assembly(It has been a bit tedious not gonna lie)
Sometimes I feel stupid lol
- Reading more about Reverse Engineering. It's a topic I always liked but was scared to get more into.
Does anyone have any Binary Exploitation exercises?Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bbakbbak2 proslijedio/la je Tweet
7-Zip: From Uninitialized Memory to Remote Code Execution
#infosec#pentest#bugbounty#exploitDevhttps://landave.io/2018/05/7-zip-from-uninitialized-memory-to-remote-code-execution/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bbakbbak2 proslijedio/la je Tweet
[subdomain recon] for filtering wildcards: - https://github.com/theblackturtle/wildcheck … - https://github.com/fuzzerk/gwdomains …
#BugBountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bbakbbak2 proslijedio/la je Tweet
Cloudflare XSS Bypass <a"/onmouseover=(confirm)('clodflare-bypass-doskey_history')>clickpic.twitter.com/To2pfdsTUj
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bbakbbak2 proslijedio/la je Tweet
Here's another nice one: onerror=eval;throw'=alert\x28document\x2edomain\x29'; :)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bbakbbak2 proslijedio/la je Tweet
I was wondering why this guy shine
so much?
"beautiful people don't come out of nowhere"
Totally recommended this interview, specially if you are struggling with mental/emotional issues
This is amazing @stokfredrik

Thank you!
https://anchor.fm/bugbountypodcast/episodes/Episode-1-ft--STK-e84lj9 … #bugbounty#infosecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bbakbbak2 proslijedio/la je Tweet
I published another blog today. This is a story about an interesting SQL Injection I found. “A Not-So-Blind RCE with SQL Injection” by Prashant Kumarhttps://link.medium.com/sC7JJUxgG3
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bbakbbak2 proslijedio/la je Tweet
A simple tool to detect wildcards domain based on Amass's wildcards detector. https://github.com/theblackturtle/wildcheck … P/s:
@jeff_foley Thanks for created an awesome tool!#bugbounty#golang#bugbountytip#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bbakbbak2 proslijedio/la je Tweet
S3Enum - Fast Amazon S3 Bucket Enumeration Tool For Pentestershttp://www.kitploit.com/2020/01/s3enum-fast-amazon-s3-bucket.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bbakbbak2 proslijedio/la je Tweet
@ngalongc,@EdOverflow, and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover. https://blog.reconless.com/samesite-by-default/ …pic.twitter.com/5R23YmpksT
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.