d4s7

@das7h3x

14y | White Hat | BSec Founder ()

Distrito Federal
Vrijeme pridruživanja: prosinac 2017.

Tweetovi

Blokirali ste korisnika/cu @das7h3x

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @das7h3x

  1. Prikvačeni tweet
    15. ruj 2019.

    [+] NASA pentested by Das7 (me) and White Sec (). {-} For Bug Bounty. {-} We will report soon. {-} URL HackerOne: ~We are White Hat's and Brazillian hackers. ~We are 14 years old.

    Poništi
  2. proslijedio/la je Tweet
    12. sij

    Belo vídeo mostrando Albert Einstein explicando a sua famosa equação: E=mc²

    Poništi
  3. proslijedio/la je Tweet
    15. sij

    Corre porque o bandido ficou revoltado

    Poništi
  4. proslijedio/la je Tweet

    245 DAYS TO GO. THIS TRAIN DOESN’T STOP.

    Poništi
  5. proslijedio/la je Tweet
    27. sij

    pwndrop - The new fast & fun way to set up an HTTP/WebDAV server for your payloads is coming! python -m SimpleHTTPServer may soon be retiring. Stay tuned! Here is a quick sneak peek:

    Poništi
  6. proslijedio/la je Tweet

    Parkour de Taubaté Com Guaraná.mp4 solta o play.

    Poništi
  7. proslijedio/la je Tweet
    1. velj
    Poništi
  8. proslijedio/la je Tweet
    2. velj

    SettingSyncHost.exe as a LolBin cd %TEMP% & c:\windows\system32\SettingSyncHost.exe -LoadAndRunDiagScript foo

    Poništi
  9. proslijedio/la je Tweet
    8. kol 2019.

    Github Recon & Sensetive Data Exposures video for university is up Hope it will be helpful for new BB hunters and adding more value for current ones, This is for the bug bounty community :)

    Poništi
  10. proslijedio/la je Tweet
    6. pro 2018.
    Poništi
  11. proslijedio/la je Tweet
    21. sij

    time: when you see a POST request made with JSON, convert this to XML and test for XXE. You can use "Content-type converter" extension on to do achieve this! RT and Follow, book coming!

    Poništi
  12. proslijedio/la je Tweet
    13. sij

    Update CVE-2019-19781 You can exploit the vulnerability without the file and only use the file ! You can inject your payload inside the name of the XML file and fire the command execution ! 🔥💪

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    28. lip 2017.

    Microsoft "Local Administrator Password Solution" (LAPS) to prevent local admin lateral movement

    Poništi
  14. proslijedio/la je Tweet
    30. kol 2017.
    Poništi
  15. proslijedio/la je Tweet
    2. stu 2017.

    Exploiting Vir.IT eXplorer Anti-Virus Arbitrary Write Vulnerability

    Poništi
  16. proslijedio/la je Tweet
    15. stu 2017.

    Turning CVE-2017-14961 (IKARUS anti.virus local kernel exploit) into full arbitrary read / write with PALETTE objects /cc

    Poništi
  17. proslijedio/la je Tweet
    29. sij 2018.

    Exploiting System Shield AntiVirus Arbitrary Write Vulnerability using SeTakeOwnershipPrivilege

    Poništi
  18. proslijedio/la je Tweet
    13. ruj 2018.

    Exploiting STOPzilla AntiMalware Arbitrary Write Vulnerability using SeCreateTokenPrivilege

    Poništi
  19. proslijedio/la je Tweet
    20. pro 2018.

    VU#741315: A Dokan file driver contains a stack-based buffer overflow

    Poništi
  20. proslijedio/la je Tweet
    14. sij 2019.

    Dokany/Google Drive File Stream Kernel Stack-based Buffer Overflow Vulnerability

    Poništi
  21. proslijedio/la je Tweet
    6. ruj 2019.

    Today we released a community-developed exploit module PR for (CVE-2019-0708). We expect to continue refining the exploit over time in collaboration with contributors. Some important notes on exploitation and detection from :

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·