Taha Ibrahim Draïdia

@ibrahimdraidia

Hacker at interested in reverse engineering, binary exploitation, exploit development and web application security.

EIP
Vrijeme pridruživanja: kolovoz 2011.

Medijski sadržaj

  1. Odgovor korisniku/ci
  2. is an awesome resource to learn web penetration testing. I highly recommend it.

  3. Breaking down the injection POC. The value was reflected inside JS code. eval, atob ... and HTTP scheme where filtered, if detected HTTP 500 is returned. By double URL encoding and using JQuery to fetch remote JS file, I was able to bypass their defenses.

  4. Microsoft hall of fame again.

  5. Ça fait toujours plaisir d'avoir ce genre de feedback.

  6. Hi guys ! How're you all doing ? It seems that the bug (1506463301845) has been fixed ! that's great.

  7. Acknowledgement from for reporting an on one of their online services.

  8. Push sleep; Pop eax; Call eax; ; can't sleep

  9. My Windows development environment is broken !!! The error message helped me a lot 😂😂😂

  10. Playing around with here is the command line I typed: open -a safari

  11. Compiling for almost 1h, still waiting to finish.

  12. I know what I've to do, I've to buy a long cable.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·