terjanq

@terjanq

Security enthusiast that loves playing CTFs and hunting for bugs in the wild. Vice-captain of team.

Vrijeme pridruživanja: siječanj 2019.

Tweetovi

Blokirali ste korisnika/cu @terjanq

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @terjanq

  1. Prikvačeni tweet
    30. sij

    What a year! 2019 was the year of my growth and success. 2121 of you clicked the follow button on my avatar🤪unbelievable. No words can describe the feeling of becoming an inspiration to you guys! As for a small update, In march I'm joining infosec😁

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    prije 7 sati
    Poništi
  3. 1. velj
    Prikaži ovu nit
    Poništi
  4. 1. velj

    I just got a fancy idea to create strings in without using dangerous characters 😃 Inspired by challenge from .

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    31. sij

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    Poništi
  6. 30. sij

    - my first big tweet - I reported the vulnerability to Twitter in 7 days after creating my Twitter account 🤣 - my ctf team managed to finish at 25th position on It was indeed a hell of a year!

    Prikaži ovu nit
    Poništi
  7. 30. sij

    Summarizing my first year on - I posted 25 tweets with the reach over 10k each - I reached out to 1.5M people in total! - it included writeups and articles I wrote - my most popular tweet with the reach over 80k:

    Prikaži ovu nit
    Poništi
  8. 30. sij

    I wouldn't be where I am (yet) if it wasn't for Luan() who introduced me to Twitter and BugBounty, Eduardo() who introduced me to our secret society😝 and who is one of my first followers and who with no doubt helped me grow. Thank you

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    26. sij

    As I have no cool new findings, lets start the year with an old IE bug - bypassing Content-Disposition: attachment with mhtml:

    Poništi
  10. 23. sij

    The writeup for the Ugly Website is still missing. Also, we will be releasing sources of all challenges shortly - and with that intended solutions (at least payloads). Stay tuned :) You can still try most of the challenges here .

    Prikaži ovu nit
    Poništi
  11. 23. sij

    I started writing solutions to my challenges on quite a time ago but haven't had enough time to finish it. I decided to publish these very chaotic writeups to Dominoes, Scam Generator and p&q service.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    19. sij

    What a start of the year. We have finished at 5th position in Teaser 2020! 😻🦈

    Poništi
  13. 14. sij

    𝘟𝘚𝘚-𝘈𝘶𝘥𝘪𝘵𝘰𝘳 — 𝘵𝘩𝘦 𝘱𝘳𝘰𝘵𝘦𝘤𝘵𝘰𝘳 𝘰𝘧 𝘶𝘯𝘱𝘳𝘰𝘵𝘦𝘤𝘵𝘦𝘥 𝘢𝘯𝘥 𝘵𝘩𝘦 𝘥𝘦𝘤𝘦𝘪𝘷𝘦𝘳 𝘰𝘧 𝘱𝘳𝘰𝘵𝘦𝘤𝘵𝘦𝘥 was nominated to TOP10 hacking techniques of 2019! Others are under 𝘊𝘳𝘰𝘴𝘴-𝘚𝘪𝘵𝘦 𝘓𝘦𝘢𝘬𝘴 group. Check them out if you haven't already! 😅

    Poništi
  14. proslijedio/la je Tweet
    11. sij

    Hah, this reminds me when I wanted to use this little trick (RGBA image, RGB with data, Alpha=0) on a CTF to hide a JavaScript inside a PNG. I've written a rather long script to do it, only to realize that JS's canvas functions are not able to access the RGB data if Alpha=0 🙃😆

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    10. sij

    Yo hackers! I've built a small website that has some challenges. 🔗 The main challenge for the week is `WW3` All upcoming challenges will be hosted there, so stay tuned :) Would love to know what you guys think. Have fun!

    Poništi
  16. proslijedio/la je Tweet
    10. sij

    [NEW] Challenge DM me if you solved it :) Have fun! * Solutions, 1 week from now.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    8. sij
    Prikaži ovu nit
    Poništi
  18. 8. sij

    Turns out that my solution was pretty unintended. I updated the article with the intended solution and also linked a write-up to another unintended one. You may want to check the updated version as well ;)

    Prikaži ovu nit
    Poništi
  19. 7. sij

    How do I get removed that tweet? I can't believe that a tweet without a content went viral! Are people literally do not read what is inside before retweeting? 🤔

    Poništi
  20. proslijedio/la je Tweet
    7. sij

    SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust: G Leurent, T Peyrin

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·