Ayush Pathak  

@ehayushpathak

$ ./ayu.sh | Learner | Geek | DECODING LIFE🙂 |

India
Vrijeme pridruživanja: lipanj 2017.
Rođen/a 29. srpnja

Tweetovi

Blokirali ste korisnika/cu @ehayushpathak

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ehayushpathak

  1. Prikvačeni tweet

    I wrote this for 's OSCP voucher giveaway challenge. Not something great tho but i learned something new and that's good.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    26. sij

    Happy 71st from सारे जहॉं से अच्छा! 🇮🇳

    Poništi
  3. proslijedio/la je Tweet
    26. sij
    Poništi
  4. proslijedio/la je Tweet
    25. sij
    Poništi
  5. 25. sij
    Poništi
  6. proslijedio/la je Tweet
    31. pro 2019.

    New year gift 🎉 Set up a free server to exploit blind vulnerabilities! 1. 2. sudo apt-get install apache2 pagekite 3. add "ServerName localhost" to /etc/apache2/apache2.conf 4. 80->8080 in /etc/apache2/ports.conf 5. pagekite 8080

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    27. stu 2019.

    Check if a server is running any vulnerable services wget https://raw.githubusercontent(.)com/vulnersCom/nmap-vulners/master/vulners.nse -O /usr/share/nmap/scripts/vulners.nse && nmap --script-updatedb All done, now you can do a scan with nmap -sV --script vulners <target>

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    24. stu 2019.

    I just made my "Corsy" public ❤️ It scans for all known misconfigurations in CORS implementations (currently 10+ checks). Github:

    Poništi
  9. Poništi
  10. Girl are you fb hacking, coz boys are attracted towards you.

    Poništi
  11. Girl are you 404. Because i can't find you.

    Poništi
  12. proslijedio/la je Tweet
    12. stu 2019.

    There are no shortcuts in . I've spent thousands of hours and still consider myself a skid most of the time. Whoever is impatient in their eagerness for success will have a tough time reaching it, if ever.

    Poništi
  13. proslijedio/la je Tweet
    10. stu 2019.

    Sometimes we have to do the impossible. SQL'Injection Attempt from Remote Site With this method: XSS, SQL'i, CSRF attacks can be done. Failure to filter the data from the remote source leaves open doors for such attacks.

    Poništi
  14. proslijedio/la je Tweet
    5. stu 2019.

    I get asked how I manage a full time job, content, steam, hacking on top of my personal life. I’m going to answer this once and only once: if you have time to waste on YouTube/Reddit you have time to learn how to hack. I go to bed an hour later and wake up an hour earlier

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    8. lis 2019.

    I have written an article on Recon,taken inputs from more than 30 other resources,collected all of their important points together.Thanks to , , Long article,but I tried to give all instructions

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    Odgovor korisniku/ci
    Poništi
  17. I just achieved my first rank up on codewars! I'm now 7 kyū!

    Poništi
  18. proslijedio/la je Tweet
    4. lis 2019.
    Poništi
  19. I just completed 's Serialize Badge!!! Finally!!!! <3

    Poništi
  20. proslijedio/la je Tweet
    3. lis 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·