INTIGRITI

@intigriti

Connecting companies with ethical hackers. Making the world a safer place, one bug at a time. #1 European Vulnerability Disclosure & Platform.

#HackWithIntigriti
Vrijeme pridruživanja: svibanj 2016.

Tweetovi

Blokirali ste korisnika/cu @intigriti

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @intigriti

  1. prije 17 sati

    Today, we are launching , a series of interviews with hunters. In our first edition, we are discussing logic flaws and with ! 🐸 Who would you like to see interviewed next? Leave a comment! 👇

    Poništi
  2. 31. sij

    Do you think code obfuscation improves overall security? Why (not)?

    Poništi
  3. 30. sij

    Do you want to make money by applying tricks like these? It's easy! Join our platform and score your first bounty today: 👉 👈

    Prikaži ovu nit
    Poništi
  4. 30. sij

    Some hunters made over €50.000 in bug bounties with this simple trick. 🤑 Thanks for the , !

    Prikaži ovu nit
    Poništi
  5. 29. sij

    Let's play a game: how fast is your incident response? 🕐😈

    Poništi
  6. 28. sij

    Do you know what 2nd order IDORs are? 🙋 Wondering how does recon or how breaks the web? Read everything in this week's ! ⬇️

    Poništi
  7. 27. sij
    Poništi
  8. 24. sij

    Need a program to hack on? Check out ! Excellent team and bounties up to €1,500! 💪

    Poništi
  9. 23. sij

    What is the last vulnerability you've discovered?

    Poništi
  10. 22. sij

    What is the best way to scare off black hat hackers? 🎩😱

    Poništi
  11. 21. sij

    Wondering what snakes 🐍 and SSTIs have in common? What the best Linux 🐧distro is or how to find bugs in API's 🦧? The latest edition of our provides all the answers -- and more! 👇👇👇

    Poništi
  12. 20. sij

    Would you describe a (D)DoS attack as "hacking"?

    Poništi
  13. 17. sij

    "Fuzzer meets writer", unknown artist, 2020

    Poništi
  14. 16. sij

    So you believe UUID's are a sufficient protection against IDOR's? Think again! 🤦 Thanks for the ,

    Poništi
  15. 15. sij

    Don't be this guy 😅

    Poništi
  16. 14. sij

    How to exploiting a SSRF in WeasyPrint? The Bug That Exposed Your Password and 12 tricks for Repeater! All of this and more is available in the latest edition of our ! 👇👇👇

    Poništi
  17. 13. sij

    What impact assessment system do you prefer for bug bounties?

    Poništi
  18. 10. sij

    What is the most secure hashing algorithm to hash passwords? 🤔🔑

    Poništi
  19. 9. sij

    This also works for other embedded services (vimeo, dailymotion, twitter, facebook...)! Thanks for the , @̶L̶i̶v̶e̶O̶v̶e̶r̶f̶l̶o̶w̶ !

    Poništi
  20. 8. sij

    Pro tip: do not conduct automated testing on contact forms, as this may end up being annoying for the people on the other side. 😅

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·