Vishwaraj

@vishwaraj101

Infosec enthusiast loves to build and break stuff also on both the sides, tweets are my own!

Vrijeme pridruživanja: siječanj 2013.

Tweetovi

Blokirali ste korisnika/cu @vishwaraj101

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @vishwaraj101

  1. Prikvačeni tweet
    8. ruj 2018.
    Poništi
  2. proslijedio/la je Tweet
    3. velj

    Hey bug hunters! Want a look at some of the top vulnerabilities ever found on ? They just released the last blog post I wrote before leaving. Enjoy!

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  4. proslijedio/la je Tweet
    31. sij

    Wow! "Resources for Beginner Bug Bounty Hunters" has over 1000 stars on GitHub now and we just pushed a new update! Check it out:

    Poništi
  5. proslijedio/la je Tweet
    30. sij

    Some hunters made over €50.000 in bug bounties with this simple trick. 🤑 Thanks for the , !

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    29. sij

    After two years of not using Facebook - I logged in today to check out this new tool that shows what Facebook has been tracking. Despite this, they have seen my every move on the Internet - this is creepier than I had imagined.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    26. sij

    An excellent talk by : clear methodology, novel bugs and interesting links 💯

    Poništi
  8. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    27. sij

    Take a few minutes today to write down what really matters to you.

    Poništi
  10. proslijedio/la je Tweet
    22. sij

    Hello hunters ! last year i published my recon map, this year i share with you my checklist ! Feel free to ask questions and make comment to improve it ! and hope you enjoy ;)

    Poništi
  11. proslijedio/la je Tweet
    11. sij

    My courses are going back to GitHub and off of my website. It was really annoying running them on my website. The reverse engineering course is getting a revamp soon and a basic exploit dev course is being worked on.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    16. sij

    CVE-2020-0601 - PoC for code signing PE files using a Certificate Authority using ECC

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  14. proslijedio/la je Tweet
    10. sij

    I just published "Hunting Good Bugs with only <HTML>" I hope you enjoy this post!

    Poništi
  15. proslijedio/la je Tweet
    8. sij

    New Writing Bypass SameSite Cookies Default to Lax and get CSRF Looking at a new Chrome feature and the 2 minute quirk which make it possible to bypass it, also solution to my CSRF challenge.

    Poništi
  16. proslijedio/la je Tweet
    9. sij
    Poništi
  17. proslijedio/la je Tweet
    8. sij
    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    7. sij

    So my guest blog post for about my recon techniques is finally out. Check it out here-

    Poništi
  19. proslijedio/la je Tweet
    7. sij

    We are born as bright lights but then we grow up. We start believing what others tell us who we are. And, we no longer see the opportunities here and now. Don’t let anyone define who you are. Only person who knows your enormous potential is you.

    Poništi
  20. proslijedio/la je Tweet
    11. ožu 2018.

    The lost art of LINKED target discovery w/ Burp Suite: 1) Turn off passive scanning 2) Set forms auto to submit 3) Set scope to advanced control and use string of target name (not a normal FQDN) 4) Walk+browse, then spider all hosts recursively! 5) Profit (more targets)!

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    2. sij

    CVE-2019-10758 post-auth Remote Code Execution in mongo-express < 0.54.0 via endpoints that uses the `toBSON` method however there are lots of no-auth mongo-express ... shodan: poc:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·