Rezultati pretraživanja
  1. 29. sij
  2. 30. sij

    Some hunters made over €50.000 in bug bounties with this simple trick. 🤑 Thanks for the , !

    Prikaži ovu nit
  3. 27. sij
  4. 30. sij

    I earned 2x$350 for my 2 submissions on . Both were stored XSS with a simple payload "><img src=x onerror=alert(1)>.

    Prikaži ovu nit
  5. 31. sij

    My day ends at midnight 03:00am Busy making my tool after coming from the office Finally, it's done Just give a list of url's and this tool will do some enum. -Content-Lenght -Status_code -Dom-XXS -Forms -Title DAY ENDS :) 👇

    Prikaži ovu nit
  6. 31. sij

    Akamai WAF Bypass, worked on a recent program <x onauxclick=a=alert,a(domain)>click

  7. 2. velj

    WooT! There is always a way. New short write up! Chain the bugs till you get what you want. Some steps were not mentionned. RT, Like and Comments are appreciated. For any pentest work DM me:) 🎉🎉

    Prikaži ovu nit
  8. prije 2 sata

    Learn to test the embedded or IoT devices, firmware analysis, fuzzing and much more in this hands-on training by Kaustubh Register here:

  9. 26. sij

    Data extraction bug in Facebook. Sorry, no write-up for this one for the current time!

  10. A source code analyzer built for surfacing features Burp Bounty(a quick and simple way, to improve the active and passive scanner) Sublert is a security and reconnaissance tool ,

  11. 31. sij

    Just released a quick tool, wordlistgen, I put together for taking a list of URLs/paths from stdin and parsing components (subdomains, paths, query strings & values) to easily/quickly make contextual content discovery wordlists for

    Prikaži ovu nit
  12. 25. sij

    Facebook rewarded me with a bounty of $30000 for SSRF on prod server (Internal Access 😎).

  13. 20. sij

    Directory Listings --> JS files --> Hidden Endpoints --> Endpoints contains hidden parameters --> Playing with, got Server Errors --> Found Apache Solr version 6.0.0 --> Found Vulnerable --> Public POC --> Got RCE :)

  14. prije 4 sata

    We are going public with our some of the products in our program . ~10 services will go from private -> public. This will be done gradually over the next two months. The program is now online at Happy hacking!

    Prikaži ovu nit
  15. prije 5 sati

    Today, we are launching , a series of interviews with hunters. In our first edition, we are discussing logic flaws and with ! 🐸 Who would you like to see interviewed next? Leave a comment! 👇

  16. prije 8 sati

    In Jan, program on : - Received 2 valid reports compared to 5 in Dec - Awarded $5,300 worth of bounties compared to $1,950 in Dec - 48 hackers participated, compared to 56 in Dec - Had 3 hrs avg first response time

  17. prije 12 sati

    Have you guys checked our brand new website “”? I think it’s super cool :-) Thanks to and for their hard work :-)

  18. Do you have a big file w/ URLs w/ many of them being default pages, wildcards etc? Use 's get-title hack to grep out common titles: cat urls.txt | get-title -c 300 > titles.txt cat titles.txt | grep -v "PATTERN" | awk -F '[()]' '{print $2}'

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.