r0hack

@r0hack

DeteAct hacked by r0hack.`

DAGESTAN
Vrijeme pridruživanja: svibanj 2018.

Tweetovi

Blokirali ste korisnika/cu @r0hack

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @r0hack

  1. proslijedio/la je Tweet

    Chrome:<iframe name=windowplz> </iframe> <script> windowplz.alert(1) </script> Based on 's DOM Clobbering research.

    Poništi
  2. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  3. 1. velj

    In January, I submitted 36 vulnerabilities to 7 programs on .

    Poništi
  4. proslijedio/la je Tweet
    28. sij
    Poništi
  5. 22. sij

    Mmm. 2 critical IDORs a weekend in private program

    Poništi
  6. 21. sij

    Mmmmm! I like to TakeOver accounts ))

    Poništi
  7. proslijedio/la je Tweet
    4. ruj 2019.

    I bypassed an interesting xss protection with : %3c<aa+ONLOAD+href=javasONLOADcript:promptONLOAD(1)%3e

    Poništi
  8. 12. sij

    In December, I submitted 13 vulnerabilities to 3 programs on .

    Poništi
  9. proslijedio/la je Tweet
    8. sij
    Poništi
  10. 4. sij
    Poništi
  11. 4. sij
    Poništi
  12. proslijedio/la je Tweet

    ┏━━┓┏━━┓┏━━┓┏━━┓ ┗━┓┃┃┏┓┃┗━┓┃┃┏┓┃ ┏━┛┃┃┃┃┃┏━┛┃┃┃┃┃ ———HACK THE PLANET———- ┃┏━┛┃┃┃┃┃┏━┛┃┃┃┃ ┃┗━┓┃┗┛┃┃┗━┓┃┗┛┃ ┗━━┛┗━━┛┗━━┛┗━━

    Poništi
  13. proslijedio/la je Tweet
    26. pro 2019.

    SSRF Break Points [1/2] - Anything that accepts a URL - File upload option? Change type="file" to type="url" and submit a URL. - Image upload? Submit a svg containing "image" element with the payload in xlink:href attribute. Try ImageMagick exploits.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    22. pro 2019.

    Based on community feedback, popularity, and the opinions of , we've compiled this list of the top 10 extensions for pen testers.

    Poništi
  15. proslijedio/la je Tweet
    20. pro 2019.
    Poništi
  16. proslijedio/la je Tweet
    20. pro 2019.

    Победа команды Codeby: Сегодня я к Вам с очень клевой новостью. Совсем недавно проходила 14…

    Poništi
  17. 20. pro 2019.

    Типичные ошибки реализации SMS-аутентификации // Common Flaws OF SMS - auth.

    Poništi
  18. proslijedio/la je Tweet
    8. stu 2019.

    Web Village: Ramazan "r0hack" Ramazanov "Operation of injections in ORM libraries" 2019

    Poništi
  19. 18. pro 2019.

    And again Account TakeOver. That's the fourth time. And the second one on the same site. ЫЫ

    Poništi
  20. 13. pro 2019.

    BruteForce as an underestimated type of attack (Account TakeOver)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·