Tweetovi

Blokirali ste korisnika/cu @dheeraj_rn

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dheeraj_rn

  1. proslijedio/la je Tweet
    prije 9 sati

    Visma Bug Bounty Program started using today: , pays: 50$ min.

    Poništi
  2. proslijedio/la je Tweet

    Budget 2020 : Anti Sleep Techniques

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    Strong opinions, weakly held

    Poništi
  4. proslijedio/la je Tweet
    2. velj

    Made really good progress on the CircuitPython "ExpoVert" badge during the stream today! Looking forward to displaying my social battery.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    2. velj

    VSCode x * VSCode based GUI * Interactive terminal * Remote file browser (Yes!) * Open source Not on market yet. But you can built it from the source:

    Prikaži ovu nit
    Poništi
  6. Poništi
  7. proslijedio/la je Tweet
    1. velj
    Poništi
  8. proslijedio/la je Tweet
    28. sij
    Poništi
  9. proslijedio/la je Tweet
    27. sij

    . recently decommissioned their Adversary Tactics: course, and rather than let it collect dust, they offered it up to the community for free in the spirit of their commitment to transparency.

    Poništi
  10. proslijedio/la je Tweet
    10. sij

    Yo hackers! I've built a small website that has some challenges. 🔗 The main challenge for the week is `WW3` All upcoming challenges will be hosted there, so stay tuned :) Would love to know what you guys think. Have fun!

    Poništi
  11. proslijedio/la je Tweet

    Been doing my egg sandwiches all wrong 🍳 🥪🤷🏻‍♂️😁✌🏼

    Poništi
  12. proslijedio/la je Tweet
    14. sij

    Attention users, GitHub Mobile is now accepting beta testers. Sign up today!

    Poništi
  13. proslijedio/la je Tweet
    12. sij
    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    13. sij

    CVE-2019-19781 post-exploitation notes: If you are seeing attackers reading your /flash/nsconfig/ns.conf file then you need to change all passwords. The SHA512 passwords are easily crackable with hashcat.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    13. sij

    ▬▬▬.◙.▬▬▬ ═▂▄▄▓▄▄▂ ◢◤ █▀▀████▄▄▄▄◢◤ █▄ █ █▄ ███▀▀▀▀▀▀▀╬ ◥█████◤ ══╩══╩═ ╬═╬ ╬═╬ ╬═╬ ╬═╬ ╬═╬ Windows 7 extended support ╬═╬ ends tomorrow ╬═╬⛑/ ╬═╬/▌ ╬═╬/ \

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    13. sij

    Want Free💰? Jump on the Citrix wagon! Pick a program on git clone cd check-cve-2019-19781 pip3 install -r requirements.txt cat hosts.txt | while read url ; do cve-2019-19781 ;done > loot.txt 2>&1 cat loot.txt | grep appear

    Poništi
  17. proslijedio/la je Tweet
    13. sij
    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet

    Uploaded my CVE-2019-19781 (Citrix ADC) Honeypot. It's capable of detecting and logging both scan and exploitation attempts.

    Poništi
  19. proslijedio/la je Tweet
    10. sij

    I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64.

    Poništi
  20. proslijedio/la je Tweet
    10. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·