Tweetovi

Blokirali ste korisnika/cu @security_prince

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @security_prince

  1. proslijedio/la je Tweet
    prije 9 sati

    We open sourced riskquant last week. It's a library for quantifying risk and helps teams dig deeper into areas like loss scenarios and risk tolerance.

    Poništi
  2. proslijedio/la je Tweet
    prije 9 sati

    kubectl-fields is a kubectl resources hierarchy parsing tool. This blog by bandit - , focuses on kubectl plugin which saves time for developers & users while writing or editing object configuration files.

    Poništi
  3. proslijedio/la je Tweet
    2. velj
    Poništi
  4. proslijedio/la je Tweet
    prije 10 sati
    Poništi
  5. proslijedio/la je Tweet
    prije 6 sati

    Hey bug hunters! Want a look at some of the top vulnerabilities ever found on ? They just released the last blog post I wrote before leaving. Enjoy!

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    prije 13 sati
    Poništi
  7. proslijedio/la je Tweet
    prije 12 sati

    CVE-2020-7471: SQLI in Django: django.contrib.postgres.aggregates.StringAgg aggregation function was subject to SQL injection, using a suitably crafted delimiter. FIX:

    Poništi
  8. proslijedio/la je Tweet
    prije 12 sati

    Today, we are launching , a series of interviews with hunters. In our first edition, we are discussing logic flaws and with ! 🐸 Who would you like to see interviewed next? Leave a comment! 👇

    Poništi
  9. proslijedio/la je Tweet
    1. velj

    Here is my writeup for Facebook's BountyCon 2020 CTF. Was not able to give much time but enjoyed solving a couple of challenges.🧑‍💻

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    17. stu 2019.

    By default, Spring Security OAuth2 uses deserialization in an unsafe way. Let's discuss how to mitigate vulnerabilities if an application uses the library

    Poništi
  11. proslijedio/la je Tweet
    20. sij

    CVE-2020-2655: TLS/DTLS client authentication bypass in Java 11 & 13 (JSSE) Details & PoC

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    15. sij

    Ever wondered how to a tool from scratch? In this post, we explain how to develop your own based on examples from real and the best open-source tools -

    Poništi
  13. proslijedio/la je Tweet
    2. velj
    Poništi
  14. Poništi
  15. proslijedio/la je Tweet
    2. velj

    I’ve just published my exploit for the LPE and RCE in OpenBSD’s OpenSMTPD recently disclosed by You can find it here:

    Poništi
  16. proslijedio/la je Tweet
    1. velj

    I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)

    Poništi
  17. proslijedio/la je Tweet
    2. velj

    WooT! There is always a way. New short write up! Chain the bugs till you get what you want. Some steps were not mentionned. RT, Like and Comments are appreciated. For any pentest work DM me:) 🎉🎉

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    2. velj

    SQL Injection Payload List by Password Cracking Is Easy: Here’s How to Do It by in API Security Testing(Part 1) by Saumya Prakash Rana

    Poništi
  19. proslijedio/la je Tweet
    2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  20. proslijedio/la je Tweet
    1. velj

    Hey ! After sleepless nights and everything coming to the wire, huntr is ! Now it's as simple as visiting , signing in with GitHub, taking on a bounty, and getting rewarded! Happy hunting!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·