𝔸𝕤𝕙𝕒𝕣 𝕁𝕒𝕧𝕖𝕕

@soaj1664ashar

𝓦𝓮𝓫 𝓐𝓹𝓹𝓵𝓲𝓬𝓪𝓽𝓲𝓸𝓷 𝓢𝓮𝓬𝓾𝓻𝓲𝓽𝔂 𝓡𝓮𝓼𝓮𝓪𝓻𝓬𝓱𝓮𝓻 & 𝓒𝓸𝓷𝓼𝓾𝓵𝓽𝓪𝓷𝓽. 𝓢𝓹𝓮𝓪𝓴𝓮𝓻@𝓑𝓵𝓪𝓬𝓴𝓗𝓪𝓽, 𝓗𝓘𝓣𝓑 & 𝓓𝓮𝓮𝓹𝓢𝓮𝓬 𝓮𝓽𝓬. : 𝒯𝒽ℯ ℱℴ𝓇𝒸ℯ 𝒜𝓌𝒶𝓀ℯ𝓃𝓈 "ℐ𝓉’𝓈 𝓉𝓇𝓊ℯ. 𝒜𝓁𝓁 ℴ𝒻 𝒾𝓉. 𝒯𝒽ℯ 𝒟𝒶𝓇𝓀 𝒮𝒾𝒹ℯ"

#𝟙 𝕚𝕟 𝕄𝕚𝕔𝕣𝕠𝕤𝕠𝕗𝕥’𝕤 𝕋𝕠𝕡 𝟙𝟘𝟘 𝕊𝕖𝕔𝕦𝕣𝕚𝕥𝕪 ℝ𝕖𝕤𝕖𝕒𝕣𝕔𝕙𝕖𝕣 𝕃𝕚𝕤𝕥 - 𝟚𝟘𝟙𝟠
Vrijeme pridruživanja: travanj 2011.

Tweetovi

Blokirali ste korisnika/cu @soaj1664ashar

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @soaj1664ashar

  1. Prikvačeni tweet

    #1 in Microsoft's Security Response Center () Top 100 Security Researchers List of 2018. Thanks to hundreds of in () umbrella applications. The goal has been achieved successfully.

    Poništi
  2. Want to get on our annual MSRC Most Valuable Researcher list? Check out our blog to learn more about who will get recognized as the top researchers for 2020:

    Poništi
  3. : We don't need cheat sheets ... We need a methodology. For success, follow or make a methodology instead of blindly using the cheat sheets out there ...

    Poništi
  4. : We don't need cheat sheets ... We need a methodology. For success, follow or make a methodology instead of blindly using the cheat sheets out there ...

    Poništi
  5. What are you aiming for by keeping in mind where you're at the moment? Or may be already have it or doing it ... please be honest in your reply.

    Poništi
  6. : There must be a Recon as a Service (). I mean The service offering are Recon plan for beginners Recon plan for hunters / pentesters etc Recon plan for companies

    Poništi
  7. What are you aiming for by keeping in mind where you're at the moment? Or may be already have it or doing it ... please be honest in your reply.

    Poništi
  8. : Now a days there are so many ways or styles of recon and in order to figure or find them out, one needs a recon itself... :D

    Poništi
  9. : There must be a Recon as a Service (). I mean The service offering are Recon plan for beginners Recon plan for hunters / pentesters etc Recon plan for companies

    Poništi
  10. : Now a days there are so many ways or styles of recon and in order to figure or find them out, one needs a recon itself... :D

    Poništi
  11. : Is there any program or platform where there are NO BUG TRIAGERS? You as a bug submitter or reporter is directly talking to the product group ... Imagine a world like that. Do you think this model is even possible?

    Poništi
  12. : Is there any program or platform where there are NO BUG TRIAGERS? You as a bug submitter or reporter is directly talking to the product group ... Imagine a world like that. Do you think this model is even possible?

    Poništi
  13. Must Read `Page Not Found` 404 😀

    Poništi
  14. What is your go to tools for testing AWS infrastructure?

    Poništi
  15. What is your go to tools for testing AWS infrastructure?

    Poništi
  16. Poništi
  17. "Out of 0 Production licenses, you have -2 that are unused."

    Poništi
  18. So far No. 1 as far as POINTS are concerned in the TWO Quarters (Q3 & Q4) of MSRC Security Researcher Leader-board ( )

    Poništi
  19. So far No. 1 as far as POINTS are concerned in the TWO Quarters (Q3 & Q4) of MSRC Security Researcher Leader-board ( )

    Poništi
  20. Congratulations to everyone listed on our Security Researcher Leaderboard for the last quarter, especially top three researchers Zhiniang Peng, Yang Kang, and Ashar Javed! See our blog for the full list of top researchers for the previous quarter:

    Prikaži ovu nit
    Poništi
  21. A bounty hunter definition on :) Further "Bug Bounty Program" term has also been added ..

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·