Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @das7h3x
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @das7h3x
-
Prikvačeni tweet
[+] NASA pentested by Das7 (me) and White Sec (
@whitesecurity_). {-} For Bug Bounty. {-} We will report soon. {-} URL HackerOne: https://hackerone.com/nasa ~We are White Hat's and Brazillian hackers. ~We are 14 years old.@NASA@gabrielpato@felipepayaopic.twitter.com/eJPLFMVuhR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
d4s7 proslijedio/la je Tweet
Belo vídeo mostrando Albert Einstein explicando a sua famosa equação: E=mc²pic.twitter.com/M65YWt2kpt
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
d4s7 proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
d4s7 proslijedio/la je Tweet
245 DAYS TO GO. THIS TRAIN DOESN’T STOP.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
d4s7 proslijedio/la je Tweet
pwndrop - The new fast & fun way to set up an HTTP/WebDAV server for your payloads is coming! python -m SimpleHTTPServer may soon be retiring. Stay tuned! Here is a quick sneak peek:pic.twitter.com/bzVV6E9oyT
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
d4s7 proslijedio/la je Tweet
Parkour de Taubaté Com Guaraná.mp4
#CoisaNossa solta o play.pic.twitter.com/008CIGNT4xHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
d4s7 proslijedio/la je Tweet
Deleting your digital footprint: https://twitter.com/somenerdliam/status/1183916568771792897?s=20 … https://www.zdnet.com/article/how-to-erase-your-digital-footprint-and-make-google-forget-you/ … https://www.wikihow.com/Delete-Yourself-from-the-Internet … Consumer Reporting https://www.consumerfinance.gov/consumer-tools/credit-reports-and-scores/consumer-reporting-companies/ … Requesting Consumer Scoring data from companies like Sift (who collects/uses millions of datapoints) https://www.nytimes.com/2019/11/04/business/secret-consumer-score-access.html …pic.twitter.com/xCqxwoshtt
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
d4s7 proslijedio/la je Tweet
SettingSyncHost.exe as a LolBin http://www.hexacorn.com/blog/2020/02/02/settingsynchost-exe-as-a-lolbin/ …
#LOLBIN cd %TEMP% & c:\windows\system32\SettingSyncHost.exe -LoadAndRunDiagScript foopic.twitter.com/dOM4EHq4ZuHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
d4s7 proslijedio/la je Tweet
Github Recon & Sensetive Data Exposures video for
@Bugcrowd university is up https://youtu.be/l0YsEk_59fQ Hope it will be helpful for new BB hunters and adding more value for current ones, This is for the bug bounty community :)#ittakesacrowd#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
d4s7 proslijedio/la je Tweet
Remote Code Execution with EL injection
#bugbounty#RCE https://www.betterhacker.com/2018/12/rce-in-hubspot-with-el-injection-in-hubl.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
d4s7 proslijedio/la je Tweet
#BugBountyTip time: when you see a POST request made with JSON, convert this to XML and test for XXE. You can use "Content-type converter" extension on@Burp_Suite to do achieve this!#bugbountytips#infosec#hacking#pentest#pentesting#bugbounty RT and Follow, book coming!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
d4s7 proslijedio/la je Tweet
Update CVE-2019-19781 You can exploit the vulnerability without the file http://newbm.pl and only use the file http://rmbm.pl ! You can inject your payload inside the name of the XML file and fire the command execution !

#shitrix#citrixpic.twitter.com/g2P1GAJo1R
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
d4s7 proslijedio/la je Tweet
Microsoft "Local Administrator Password Solution" (LAPS) to prevent local admin lateral movementhttps://technet.microsoft.com/en-us/mt227395.aspx …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
d4s7 proslijedio/la je Tweet
Abusing Token Privileges For Windows Local Privilege Escalation by
@dronesec and@breenmachinehttps://foxglovesecurity.com/2017/08/25/abusing-token-privileges-for-windows-local-privilege-escalation/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
d4s7 proslijedio/la je Tweet
Exploiting Vir.IT eXplorer Anti-Virus Arbitrary Write Vulnerability http://www.greyhathacker.net/?p=990 pic.twitter.com/AMO51icFNv
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
d4s7 proslijedio/la je Tweet
Turning CVE-2017-14961 (IKARUS anti.virus local kernel exploit) into full arbitrary read / write with PALETTE objects https://theevilbit.blogspot.co.uk/2017/11/turning-cve-2017-14961-ikarus-antivirus.html … /cc
@ParvezGHHHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
d4s7 proslijedio/la je Tweet
Exploiting System Shield AntiVirus Arbitrary Write Vulnerability using SeTakeOwnershipPrivilege http://www.greyhathacker.net/?p=1006
#0daypic.twitter.com/oukhJxsRYV
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
d4s7 proslijedio/la je Tweet
Exploiting STOPzilla AntiMalware Arbitrary Write Vulnerability using SeCreateTokenPrivilege http://www.greyhathacker.net/?p=1025
#0daypic.twitter.com/evQyDYqQXA
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
d4s7 proslijedio/la je Tweet
VU#741315: A Dokan file driver contains a stack-based buffer overflowhttp://bit.ly/2R8yjaP
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
d4s7 proslijedio/la je Tweet
Dokany/Google Drive File Stream Kernel Stack-based Buffer Overflow Vulnerability http://www.greyhathacker.net/?p=1041 pic.twitter.com/FzlQEkxn8P
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
d4s7 proslijedio/la je Tweet
Today we released a community-developed exploit module PR for
#BlueKeep (CVE-2019-0708). We expect to continue refining the exploit over time in collaboration with contributors. Some important notes on exploitation and detection from@busterbcook: https://blog.rapid7.com/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/ …pic.twitter.com/lDToXIw92YPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.