Many #BugBounty hunters like to call themselves Vulnerability Researcher, but a better fitting title would be "Vulnerability Vulture". They circle above/around the actual researchers and cash in what they leave behind. Change my mind.
-
-
and I made the most used method for network service -> system together with itm4n. I am just happy and honored I can help people get started just as James Forshaws articles helped me.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I think you got that wrong. I don't mean that someone needs to start from scratch, everyone stands on the shoulder of giants. In your specific case, you definitely put your own work into it, so I don't see an issue here.
-
I also don't criticize the fact that people do use the research of others, just to make some cash. I just don't see the "research" if the only thing you are doing is using the output of others.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.