AI Assistant

@crakun

RCE, Danglin Ptr, UAF, Dbl Free, Buff Over/ Underflow, Off-By-1, Int Overflow/ Castin, Type Confuson, OOB, Race Cond, Inject, Logic Bug, Sym Link, Side Chanel

Internet
Vrijeme pridruživanja: ožujak 2012.

Tweetovi

Blokirali ste korisnika/cu @crakun

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @crakun

  1. proslijedio/la je Tweet
    1. velj

    I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)

    Poništi
  2. proslijedio/la je Tweet
    3. velj

    GitHub - mufeedvh/CVE-2019-8449: CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4 -

    Poništi
  3. proslijedio/la je Tweet
    25. stu 2019.

    Performance vs Trust in Teams. Like this lots.

    Poništi
  4. proslijedio/la je Tweet
    28. sij

    New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZure

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    Poništi
  6. proslijedio/la je Tweet
    18. sij
    Poništi
  7. proslijedio/la je Tweet
    16. sij

    Shellcode: In-Memory Execution of JavaScript, VBScript, JScript and XSL

    Poništi
  8. proslijedio/la je Tweet
    15. sij

    A cheatsheet with commands that can be used to perform kerberos attacks

    Poništi
  9. proslijedio/la je Tweet
    13. sij

    Backdooring an IoT camera by creating a malicious firmware upgrade

    Poništi
  10. 12. sij
    Poništi
  11. proslijedio/la je Tweet
    10. sij

    Is fuzzing dead? Find 0days using next-gen tools 🙌 , kick off in Feb. Then take an advanced fuzzing training with at in August. Get your Early Bird ticket 👏

    Poništi
  12. proslijedio/la je Tweet
    9. sij
    Poništi
  13. proslijedio/la je Tweet
    10. sij
    Poništi
  14. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    9. ruj 2019.

    Finding Hidden API Keys & How to use them 1. Algolia API KEYS 2. AWS Access Key ID & Secret 3. Slack API token 4. Facebook Access Token 5. Github client id and client secret 6. Twilio Account_sid and Auth token 7. Twitter API Secret ...

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    26. pro 2019.

    Pentester's Mindset! - "Get out of the limited OWASP TOP-10/SANS TOP-25/Bug Bounty mindset" : cc

    Poništi
  17. proslijedio/la je Tweet
    28. pro 2019.

    SigintOS : A Wireless Pentest Distro Review : (incl. HackRF, BladeRF, USRP, RTL-SDR and others + SigintOS-Tool, GnuRadio, YateBTS, srsLTE, IMSI Catcher and others*) More* : cc

    Poništi
  18. proslijedio/la je Tweet
    28. pro 2019.

    my-arsenal-of-aws-security-tools : List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc : cc

    Poništi
  19. proslijedio/la je Tweet
    28. pro 2019.

    Amlogic S905 SoC : bypassing the (not so) Secure Boot to dump the BootROM :

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·