loopspell

@loopspell

Script Kiddie

Quantum Realm
Vrijeme pridruživanja: studeni 2017.

Tweetovi

Blokirali ste korisnika/cu @loopspell

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @loopspell

  1. Prikvačeni tweet
    4. sij

    OSCP Review, Resources, and Tips Hy Guys, I have got lots DMs relates review and preparation. So now I'll try to cover important points in this short OSCP review. P.S: I'm noob and this review is based on my experience and methodology in OSCP. (1/18)

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    prije 23 sata

    Almost 1 month left for the event. They got amazing speakers and some great sessions planned ranging from WEB, MOBILE, IoT, etc. Join us! CC:

    Poništi
  3. proslijedio/la je Tweet
    prije 24 sata

    New blog post: Simple Remote Code Execution Vulnerability Examples for Beginners

    Poništi
  4. proslijedio/la je Tweet
    4. velj

    Hackers from Indore and nearby location, there is an IBH regional meet coming up. Organizers: - Appsec & bug bounty hunter - Penetration tester and bug bounty hunter & Signup -

    Poništi
  5. proslijedio/la je Tweet
    4. velj

    When testing for SSRF using a black list, take internal IP addresses and when encoding them, dont encode entire IP. Encode 1 octet of the IP address, or 2 or 3. For Instance: AWS Metadata - 0251.254.169.254 (this got the $160,000 payout in Oct 2018)

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    3. velj

    Hey bug hunters! Want a look at some of the top vulnerabilities ever found on ? They just released the last blog post I wrote before leaving. Enjoy!

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    3. velj

    Today, we are launching , a series of interviews with hunters. In our first edition, we are discussing logic flaws and with ! 🐸 Who would you like to see interviewed next? Leave a comment! 👇

    Poništi
  8. proslijedio/la je Tweet
    2. velj

    WooT! There is always a way. New short write up! Chain the bugs till you get what you want. Some steps were not mentionned. RT, Like and Comments are appreciated. For any pentest work DM me:) 🎉🎉

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    16. ruj 2019.

    [Tip] Create many accounts with one email :D A lot of web apps treat example@gmail.com and e.xam.ple@gmail.com as different emails but actually the emails sent to e.xam.ple@gmail.com will be received by example@gmail.com because gmail considers them the same email address.

    Poništi
  10. proslijedio/la je Tweet
    2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  11. proslijedio/la je Tweet
    1. velj

    RE just retired from . As the creator of the box, I tried to bring phishing/macro obfuscation concepts to the initial access. The intended privescs were the WinRar ACE file exploit, and XXE in Ghidra. I'll show two unintended privescs too.

    Poništi
  12. proslijedio/la je Tweet
    1. velj

    Lee people *** when they were having all the flag of boxes given in CTF of owasp seasides 😂

    Poništi
  13. proslijedio/la je Tweet
    1. velj

    All about today's CTF Destroyed in second 😑

    Poništi
  14. proslijedio/la je Tweet
    1. velj

    Story of every CTF Seaside player

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    1. velj
    Poništi
  16. 1. velj
    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    1. velj

    just one point the users who are previously active on will have the write-ups also as they already spent weeks on that, so it is not fair to compare them with all other peoples who only had one day

    Prikaži ovu nit
    Poništi
  18. 1. velj

    Its Seems like and trolled us😂😂 In CTF of , all the challenges are the same as Active/retired of main platform.. Although flags are also same😂😂 Those who are active in HTB can Solve all the Challenges in few minutes😂

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    31. sij

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    Poništi
  20. proslijedio/la je Tweet
    31. sij
    Odgovor korisnicima i sljedećem broju korisnika:

    Got adviced by a friend email=victim@email.com&email=attacker@email.com email=victim@email.com,attacker@email.com email[0]=victim@email.com&email[1]=attacker@email.com

    Poništi
  21. proslijedio/la je Tweet
    30. sij

    Some hunters made over €50.000 in bug bounties with this simple trick. 🤑 Thanks for the , !

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·