Tweetovi

Blokirali ste korisnika/cu @shafigullin

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @shafigullin

  1. Prikvačeni tweet
    9. lip 2015.
    Poništi
  2. proslijedio/la je Tweet
    31. sij

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    Poništi
  3. proslijedio/la je Tweet
    28. sij
    Poništi
  4. proslijedio/la je Tweet
    24. sij

    Microsoft's open-sourced Playwright, a new Node library for automating Chromium, Firefox, and WebKit browsers. Essentially, it's the next generation of Puppeteer, built by the same people. This project looks super promising, I'd love to see it succeed!

    Poništi
  5. proslijedio/la je Tweet
    24. sij

    Cross-Site Websocket Hijacking bug in Facebook that leads to account takeover

    Poništi
  6. proslijedio/la je Tweet
    2. sij

    Interesting proposal for Unicode: QID Emoji Tag Sequences define what characters mean via Wikidata QID numbers.

    Poništi
  7. proslijedio/la je Tweet
    2. sij

    Regular expressions in JavaScript: The rules for /g and /y are surprisingly complicated. I discovered several gotchas while researching my latest blog post. Summary of my findings:

    Poništi
  8. proslijedio/la je Tweet
    29. pro 2019.

    I never thought of adding the X-HTTP-Method-Override: PUT header to achieve RCE. I'm surprised this isn't built into burp's scanner.

    Poništi
  9. proslijedio/la je Tweet
    27. pro 2019.

    My "simple" XSS challenge is over! Once again congratz to and for solving it! But also to everyone else that tried their best. Have you found all 11 vulnerabilities? 💪

    Poništi
  10. proslijedio/la je Tweet
    24. pro 2019.

    Writeup on how I made $40,000 breaking the new Chromium Edge using essentially two XSS flaws.

    Poništi
  11. proslijedio/la je Tweet
    22. pro 2019.
    Poništi
  12. proslijedio/la je Tweet
    21. pro 2019.

    New writeup, one of my favorite bugs 🤠 - Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty Featuring...

    Poništi
  13. proslijedio/la je Tweet
    18. pro 2019.
    Poništi
  14. proslijedio/la je Tweet
    13. pro 2019.

    Hi, If you want to know how SSRF Vulnerability was exist in Vimeo, you should read: Reported through ;)

    Poništi
  15. proslijedio/la je Tweet
    12. pro 2019.
    Poništi
  16. proslijedio/la je Tweet
    11. pro 2019.
    Poništi
  17. proslijedio/la je Tweet

    Ever wondered how to break on Array.prototype.sort, but only if every element in the array is a hiragana character?

    Poništi
  18. proslijedio/la je Tweet
    25. stu 2019.

    XSS is cool and all, but this is next level. You should all watch this to face the bugs that will plague us for the next few years at least.

    Poništi
  19. proslijedio/la je Tweet
    19. stu 2019.

    We just released the challenges of this year's finals together with a short write up of the intended solutions: If anything is not clear, feel free to DM me and I can share more details about the challenges.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet

    Want to challenge your vulnerability hunting skills? Try our latest Capture The Flag and discover XSS-unsafe jQuery plugins:

    Poništi
  21. proslijedio/la je Tweet
    18. stu 2019.

    Here’s probably my favorite XSS of this year :) This is why we love legacy browser features like DOM Clobbering ;)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·