Jerry @unitedconindia

@lordjerry0x01

Call me whatever you may, a hacker, a superhero or just another guy.

Vrijeme pridruživanja: listopad 2017.
Rođen/a 08. kolovoza

Tweetovi

Blokirali ste korisnika/cu @lordjerry0x01

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @lordjerry0x01

  1. Prikvačeni tweet

    My 2020 Goals? Complete goals of 2015,16,17,18,19

    Poništi
  2. proslijedio/la je Tweet

    Errors are red. Kernel panics are blue. This crash dump is a sign, That I’m vulnerable to you ;)

    Poništi
  3. proslijedio/la je Tweet
    prije 14 sati
    Poništi
  4. proslijedio/la je Tweet

    Yogi wondering why are we not using tanks

    Poništi
  5. proslijedio/la je Tweet
    prije 23 sata

    Bug Hunting Tip: Every time you find the word "PROXY" in a URL, ask it for fun stuff.

    Poništi
  6. Stop hitting my bxss payload 😡

    Poništi
  7. proslijedio/la je Tweet

    The day that crores of Indians waited for decades has finally arrived ! PM has announced the formation of the "Sri Ram Janmabhoomi Teertha Kshetra" Trust. This Trust will develop the magnificent at Ayodhya. 🙏 🙏 🙏

    Poništi
  8. proslijedio/la je Tweet

    Today we take a historic step ahead towards building a grand Ram Temple in Ayodhya! It was my honour to address the Lok Sabha on this subject, which is special to many. I also applauded the remarkable spirit of the people of India. This is what I said...

    Poništi
  9. proslijedio/la je Tweet
    prije 22 sata
    Poništi
  10. proslijedio/la je Tweet

    NordVPN disclosed a bug submitted by dakitu: - Bounty: $1,000

    Poništi
  11. proslijedio/la je Tweet
    4. velj

    by $12,500 USD Read From The File System Access (potencial RCE) on Whatsapp Desktop (electron)

    Poništi
  12. proslijedio/la je Tweet
    4. velj

    When your P1/critic is rewarded with 100x bonus :

    Poništi
  13. proslijedio/la je Tweet
    4. velj

    Hackers from Indore and nearby location, there is an IBH regional meet coming up. Organizers: - Appsec & bug bounty hunter - Penetration tester and bug bounty hunter & Signup -

    Poništi
  14. proslijedio/la je Tweet
    4. velj

    I just published a blog post "Responsible Disclosure: Breaking out of a Sandboxed Editor to perform RCE"

    Poništi
  15. proslijedio/la je Tweet
    3. velj

    XSS filter bypass using stripped </p> tag to obfuscate. P2 Stored XSS $1500 on a private bug bounty program. XSS Payload: <</p>iframe src=javascript:alert()//

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    1. stu 2019.

    XSS filter bypass using stripped </div> tags to obfuscate. Multiple P2 Stored XSS on a private bug bounty program. XSS Payload: <</div>script</div>>alert()<</div>/script</div>>

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    4. velj

    When testing for SSRF using a black list, take internal IP addresses and when encoding them, dont encode entire IP. Encode 1 octet of the IP address, or 2 or 3. For Instance: AWS Metadata - 0251.254.169.254 (this got the $160,000 payout in Oct 2018)

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    3. velj

    What an fantastic writeup. Kudos to the author

    Poništi
  19. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  20. 3. velj
    Poništi
  21. proslijedio/la je Tweet

    Glad to announce our Keynote Speaker - 𝗖𝗼𝗹. 𝗩𝗶𝗸𝗿𝗮𝗺 𝗡𝗮𝗿𝗲𝘀𝗵 (𝗥𝗲𝘁𝗱.), Cyber Security Professional will be speaking on 𝗖𝘆𝗯𝗲𝗿 𝗧𝗵𝗿𝗲𝗮𝘁 𝗟𝗮𝗻𝗱𝘀𝗰𝗮𝗽𝗲 at UNITED CON on February 28 & 29, 2020 at DTU. 🇮🇳 🇷🇺 🇮🇱 🇺🇸 🇳🇱 🇱🇰

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·