Sanjeev Jha

@chikkuaa

Security Researcher | Eternal Noob

India/Mumbai
Vrijeme pridruživanja: siječanj 2010.

Tweetovi

Blokirali ste korisnika/cu @chikkuaa

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @chikkuaa

  1. proslijedio/la je Tweet
    20. sij
    Poništi
  2. proslijedio/la je Tweet
    17. sij
    Poništi
  3. proslijedio/la je Tweet
    14. sij
    Poništi
  4. proslijedio/la je Tweet
    14. sij

    JSON Hijacking, SOP Bypass Technic with Cache-Control : cc

    Poništi
  5. proslijedio/la je Tweet
    12. sij

    Lesser Known Web Attack Lab - train your advances web security skills 😎

    Poništi
  6. proslijedio/la je Tweet
    9. sij

    If anyone interested in modifying an Android app (.apk) and recompiling it again, check out my write up about a CTF style challenge I solved recently:

    Poništi
  7. proslijedio/la je Tweet
    8. sij
    Poništi
  8. proslijedio/la je Tweet
    5. sij

    Awesome mobile security - one place to find all android and ios security related stuffs like labs, talks, papers, courses, and tools : cc

    Poništi
  9. proslijedio/la je Tweet
    5. sij

    SSH Pentesting Guide - A Comprehensive Guide to Breaking SSH :

    Poništi
  10. proslijedio/la je Tweet
    6. sij

    Building Your Own Web Application Firewall as a Service And Forgetting about False Positives.

    Poništi
  11. 30. pro 2019.

    we need CAA ✌️

    Poništi
  12. proslijedio/la je Tweet
    22. pro 2019.

    Just uploaded "Advanced PHP Deserialization - PHAR Files", It's pretty much just me walking through the PHP Deserialization exploit presented at last year.

    Poništi
  13. proslijedio/la je Tweet
    21. pro 2019.

    I've been super busy and haven't gotten time to record Smasher2, but I did record a video I've wanted to do for a while... Introduction into PHP Deserialization, hopefully it helps people understand other deserialization attacks too

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    14. pro 2019.

    I am exploring fuzzing, started with this

    Poništi
  15. proslijedio/la je Tweet
    Poništi
  16. proslijedio/la je Tweet
    5. pro 2019.

    🌟v2 of my free Intro to Android App Reverse Engineering workshop is here! 🌟 I've added 3 new exercises, walk-through videos for all 7 exercises, a new module on obfuscation, & exercises on vuln hunting rather than just malware. I hope it helps!

    Screenshot of the table of contents at maddiestone.github.io/AndroidAppRE
    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    25. stu 2019.

    Privilege Escalation: Leveraging misconfigured systemctl permissions by Samuel Whang

    Poništi
  18. proslijedio/la je Tweet
    24. stu 2019.

    I just made my "Corsy" public ❤️ It scans for all known misconfigurations in CORS implementations (currently 10+ checks). Github:

    Poništi
  19. proslijedio/la je Tweet
    25. stu 2019.
    Poništi
  20. proslijedio/la je Tweet
    23. stu 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·