Cl4zt

@cl4zt

Hacking - CTFs - Gaming - Chess - n00b Just learning.

Argentina
Vrijeme pridruživanja: kolovoz 2018.

Tweetovi

Blokirali ste korisnika/cu @cl4zt

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @cl4zt

  1. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    Adding a Backdoor to AD in 400 Milliseconds

    Poništi
  3. proslijedio/la je Tweet

    Here it is- I Flew Katie Hopkins to Prague to win a Fake Award.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    29. sij

    AD Privilege Escalation Exploit: The Overlooked ACL

    Poništi
  5. proslijedio/la je Tweet
    23. sij
    Poništi
  6. proslijedio/la je Tweet
    22. sij

    Revisiting RDP lateral movement and releasing a project that will be part of a bigger tool coming next week

    Poništi
  7. proslijedio/la je Tweet
    22. sij

    🔥🔥 Trending topic at the office today. Fanny pack, yes or no? Riñonera, si o no? Discusión acalorada en la offi. 🔥🔥

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    18. sij

    Watching people work on CVE-2020-0601 PoCs and thinking "this is fine!"

    Poništi
  9. proslijedio/la je Tweet
    2. sij

    Alcohol VS Weed 🥃🚬.

    Poništi
  10. proslijedio/la je Tweet
    7. sij
    Odgovor korisniku/ci

    Here is a list of osint resources for those starting out

    Poništi
  11. proslijedio/la je Tweet
    4. sij

    docker run -ti -v "/":"/tmp/mount" ubuntu chroot /tmp/mount bash Ya root. (Need to be in the docker group).

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    2. sij

    Awesome Burp Suite Resources. 400+ open source Burp plugins, 500+ posts and videos.

    Poništi
  13. proslijedio/la je Tweet
    28. pro 2019.

    New article about "Pass the hash" This technique is used in a lot of engagements, and yet it is not always fully understood. This is a little review of one of the most popular lateral movement techniques 🙃

    Poništi
  14. proslijedio/la je Tweet
    16. pro 2019.

    Monitor hundreds of telegram groups with this mass surveillance bot! It saves regex triggered alerts to G-Sheets, SQL db and TG. I haven't tried it yet but it seems promising. CC:

    Poništi
  15. proslijedio/la je Tweet
    7. pro 2019.
    Poništi
  16. proslijedio/la je Tweet
    7. pro 2019.

    I recently exploited an XXE with a very cool trick and wrote a blog post tl;dr; Exploiting XXE to read files when HTTP OOB is not allowed but errors are enabled :D

    Poništi
  17. proslijedio/la je Tweet
    29. stu 2019.

    HTTP Request Smuggling in one Screenshot. 🙂

    Poništi
  18. Poništi
  19. proslijedio/la je Tweet
    14. stu 2019.
    http://rhubarbes.tumblr.com/post/171174280731
    Poništi
  20. proslijedio/la je Tweet

    Poor bastard on the left. Enjoy your descent into madness 🤡

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·