youssef

@genieyou

all i know is i don't know anything | can do ping command ;)

Vrijeme pridruživanja: ožujak 2011.

Tweetovi

Blokirali ste korisnika/cu @genieyou

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @genieyou

  1. Prikvačeni tweet
    16. sij

    i just made a Better Gift For Users to keep updated with latest Bug Bounty Stuff with the greatest youtube channels Reviews And Feedback will be Helpful

    Poništi
  2. 2. velj
    Poništi
  3. proslijedio/la je Tweet
    2. velj

    There's a new repository for payload generators and helper scripts for ffuf. I wrote a HTTP basic authentication payload generator as an example. Contributions are more than welcome, it's show & tell time!

    Poništi
  4. 31. sij
    Poništi
  5. 30. sij

    ASNLookup, Github Dorks, Amass, ffuf, Dirsearch, Turbo Intruder. nice video

    Poništi
  6. 29. sij

    see which ports the website you're visiting has open shodan chrome extension ✌️

    Poništi
  7. 28. sij
    Poništi
  8. proslijedio/la je Tweet
    16. sij

    Is anyone interested in a tutorial where I cover how I set up my terminal for productivity (and style 💅)?

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    > Certificates with named elliptic curves, […], can be ruled benign. […] Certificates with explicitly-defined parameters […] which fully-match those of a standard curve can similarly be ruled benign. So it's a vulnerability in ECDSA verification of custom curves.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    10. sij

    Looked for the first time into last weekend :D Thx for the motivation <3 Love you all

    Poništi
  11. proslijedio/la je Tweet
    9. sij

    Responder 3.0.0.0 is out! Massive upgrade, support for both py3 and py2, many bug fix, enhancements and Q.A++ on all servers, poisoners and tools. Enjoy! ;)

    Poništi
  12. 9. sij
    Poništi
  13. proslijedio/la je Tweet
    6. sij

    Exploiting Wi-Fi protocol stack vulnerability on Tesla Model S 5. Successful execution of arbitrary code within the chip. ... ... ... 12. force Parrot to join AP hotspots established by attackers and modify iptables rules. 13. obtain Parrot's shell through Parrot's port 23.

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    29. stu 2019.

    HTTP Request Smuggling in one Screenshot. 🙂

    Poništi
  15. proslijedio/la je Tweet
    4. svi 2019.

    Here is how to protect your network ?

    Poništi
  16. proslijedio/la je Tweet
    19. stu 2019.
    Poništi
  17. proslijedio/la je Tweet
    19. stu 2019.

    Well, it works! Thanks ZDI for CVE-2019-1388

    Poništi
  18. proslijedio/la je Tweet
    17. stu 2019.

    Performing Race Condition tests w/ Burp Suite, coupon redeem example: 1. Use Null Payloads 2. Use same number of threads to requests (x15 here) & 0 throttle 3. Disable the baseline request (it's will be sent first w/ delay invalidating your coupon)

    Poništi
  19. proslijedio/la je Tweet
    14. stu 2019.

    Today we are happy and excited to announce , our cloud based solution for continuous recon and monitoring, please check out our announcement blog and video

    Poništi
  20. proslijedio/la je Tweet
    9. stu 2019.

    Guess coding is not for everyone

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·