Tweetovi

Blokirali ste korisnika/cu @helvioju

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @helvioju

  1. proslijedio/la je Tweet
    4. velj

    ==API TIPS== To welcome the new year, we published a daily tip on API Security & API Pentesting during the month of January 2020. Check out my new article and explore 31 tips + interesting insights about them.

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    x0rro — A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2 Often AVs rely on simple signatures to detect malicious software and I needed a tool in order to confirm this behavior and be able to produce a working bypass. That’s why I wrote x0rro.

    Poništi
  3. 1. velj

    I just released new features in my Shellcode Tester, where you can put your Shellcode, disassemble and test without compiling any file.

    Poništi
  4. proslijedio/la je Tweet
    1. velj

    I just got a fancy idea to create strings in without using dangerous characters 😃 Inspired by challenge from .

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Akamai WAF Bypass, worked on a recent program <x onauxclick=a=alert,a(domain)>click

    Poništi
  6. proslijedio/la je Tweet
    30. sij

    Some hunters made over €50.000 in bug bounties with this simple trick. 🤑 Thanks for the , !

    Prikaži ovu nit
    Poništi
  7. 25. sij

    Treinamento “Advanced Exploitation” 100% on-line com o conteúdo: introdução a linguagem assembly para criação de exploits, criação de shellcode, exploit zero day, egg hunting, e muito mais. Segue o link de inscrição:

    Poništi
  8. 24. sij

    Starting 2020 with new achievement be eMAPT, let’s go to the next one, OSWE...

    Poništi
  9. proslijedio/la je Tweet
    21. sij

    time: when you see a POST request made with JSON, convert this to XML and test for XXE. You can use "Content-type converter" extension on to do achieve this! RT and Follow, book coming!

    Poništi
  10. proslijedio/la je Tweet
    15. sij

    Take note guys, 2020 will take place on May 29th, starting at 13:37 (BRT).

    Poništi
  11. proslijedio/la je Tweet
    13. sij

    Update CVE-2019-19781 You can exploit the vulnerability without the file and only use the file ! You can inject your payload inside the name of the XML file and fire the command execution ! 🔥💪

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    13. sij

    Interesting payload with Win32_Process and Win32_ProcessStartup func: Pastebin:

    Poništi
  13. proslijedio/la je Tweet
    12. sij
    Poništi
  14. proslijedio/la je Tweet

    It would be great if we would all start using “wow64” instead of “x64“ when publishing x86 exploits that were written/tested against a x64 OS, but x86 (wow64) application. Makes finding 64bit exploits easier. Thank

    Poništi
  15. proslijedio/la je Tweet
    12. sij

    Published NEW BLOG on CRLF Injection Playbook. Learned Lot of new things during the Research. Hope for the same for you Guys.

    Poništi
  16. proslijedio/la je Tweet
    12. sij
    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    13. sij
    Poništi
  18. proslijedio/la je Tweet
    13. sij
    Poništi
  19. proslijedio/la je Tweet
    12. sij

    Accelerated Windows Malware Analysis with Memory Dumps [Training Course Transcript and WinDbg Practice Exercises, Second Edition] by on

    Poništi
  20. proslijedio/la je Tweet
    9. sij

    Heap exploitation in a university exam (~9h long CTF style practical exam). You heard it first here at . LOL.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·