Se7en

@inactivebit

Those who don't believe in magic will never find it.🃏

/dev/null
Vrijeme pridruživanja: listopad 2010.

Tweetovi

Blokirali ste korisnika/cu @inactivebit

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @inactivebit

  1. proslijedio/la je Tweet
    4. velj

    i've written a working exploit for sudo vulnerability CVE-2019-18634. if you have "Defaults pwfeedback" (apparently the default in Linux Mint and derivatives), any user can become root without any password, even if they're not in /etc/sudoers

    Prikaži ovu nit
    Poništi
  2. 2. velj
    Poništi
  3. 16. sij

    Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application: 💀

    Poništi
  4. proslijedio/la je Tweet
    2. sij

    Awesome Burp Suite Resources. 400+ open source Burp plugins, 500+ posts and videos.

    Poništi
  5. 13. sij

    Cross Site Scripting (XSS) Vulnerability Payload List: 💀

    Poništi
  6. 13. sij

    Bypassing-Web-Application-Firewalls-And-XSS-Filters: 💀

    Poništi
  7. 12. sij

    ezXSS - Easy way to test (blind) Cross Site Scripting: 💀

    Poništi
  8. proslijedio/la je Tweet
    12. sij
    Odgovor korisniku/ci

    Anyone struggling to find Citrix ADC/Netscaler appliances/check if they are vulnerable - OWASP Nettacker now has a module to detect CVE-2019-19781: “Detecting Citrix CVE-2019-19781 with OWASP Nettacker” by Sam Stepanyan

    Poništi
  9. 9. sij

    HackBar plugin for Burpsuite: 💀

    Poništi
  10. 9. sij

    Bypass Windows Defender by renaming executable to msiexec.exe : 💀

    Poništi
  11. 1. sij

    Account takeover via leaked session cookie: 💀

    Poništi
  12. 1. sij

    Blazy - A modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF: 💀

    Poništi
  13. proslijedio/la je Tweet
    29. pro 2019.

    Open source RAT collection, and malicious RAT analysis reports.

    Poništi
  14. proslijedio/la je Tweet
    30. pro 2019.

    GitHub - cseagle/blc: Integrate Ghidra's decompiler as an Ida plugin

    Poništi
  15. proslijedio/la je Tweet
    23. pro 2019.
    Poništi
  16. proslijedio/la je Tweet
    25. pro 2019.

    y0 we did it! We've updated all packages from [0-9a-zA-Z] in our repository! We are now preparing for the new ISO and OVA releases. Release ETA = 2nd/3rd Jan.

    Poništi
  17. proslijedio/la je Tweet
    25. pro 2019.

    It's Christmas, so teach all your family members the importance of not reusing passwords, enabling 2FA, and not building infrastructure that enables the powerful to oppress the powerless

    Poništi
  18. 23. pro 2019.

    XML External Entity (XXE) Injection Payload List: 💀💀

    Poništi
  19. proslijedio/la je Tweet
    22. pro 2019.

    Chinese hacker group caught bypassing 2FA * Report details new APT20 activity * Attacks discovered in 10 countries * Primary victims include govt entities and MSPs

    Prikaži ovu nit
    Poništi
  20. 23. pro 2019.

    Ddoor - Cross Platform Backdoor Using Dns Txt Records: 💀

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·