Rezultati pretraživanja
  1. 2. velj
  2. prije 29 minuta

    "How do I get started and what are some good resources?" check out these github repo for Beginner Bug Bounty Hunters -

  3. prije 5 minuta

    . Evaluates Top Priorities in Transformation for Global Companies. Key findings include: (41% of companies) remains the greatest security threat, followed by misconfiguration and . Read more:

  4. Create Your Own Programming Language! ()

  5. prije 35 minuta

    Microsoft Announces Xbox Bounty Program Offering Up To $20K Rewards

  6. 1. velj
  7. prije 13 sati

    Just got my Black Hat Go book. Looking good, excited to get started!

  8. 2. velj

    WooT! There is always a way. New short write up! Chain the bugs till you get what you want. Some steps were not mentionned. RT, Like and Comments are appreciated. For any pentest work DM me:) 🎉🎉

    Prikaži ovu nit
  9. 1. velj

    Findomain 0.1.3 is out! Now you can use it as a subdomain resolver, just put subdomains in a file and lets Findomain resolve it! Demo: Also an update checker have been added!

  10. Four years after hackers dumped the intimate details of 32 million Ashley Madison subscribers, they have revived an extortion scheme that targets people who used the dating website to cheat on their partners.

  11. A has discovered more than 60 across 20 physical security products, including that can be remotely to take complete control of a device ()

  12. 29. sij

    Findomain 1.2.0 is out! The last benchmark resulted in Findomain being able to resolve 33668 subdomains for google[.]com in 580 seconds (3480 subdomains resolved per minute) using --threads 100.

  13. prije 52 minute

    From network security to business value, how does security testing improve your website's digital performance and what can you do to improve your website testing methods?

  14. prije 43 minute

    Proxy = 35.221.221.14:8080 | country: United States | city: Ashburn

  15. prije 6 sati
    Odgovor korisnicima

    time to make a subdomain / sub-catgeory !

  16. prije 1 sat

    Big shout out to ! She just posted some amazing content about bash - Linux command line! If you really want to be a hacker, you can't avoid mastering the Linux command line.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.