Tweetovi

Blokirali ste korisnika/cu @w1r3sh65rk

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @w1r3sh65rk

  1. proslijedio/la je Tweet
    2. velj

    I added a script to generate the PDF & archive for my Exam Report Template in Markdown, as I saw a lot of people where creating their own scripts.

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Some hunters made over €50.000 in bug bounties with this simple trick. 🤑 Thanks for the , !

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    27. sij

    Unfurl : It takes a URL and expands ("unfurls") it into a directed graph, extracting every bit of information from the URL and exposing the obscured : cc

    Poništi
  4. proslijedio/la je Tweet
    27. sij

    Detecting tags/events on XSS exploitation, useful article (and tool) by

    Poništi
  5. proslijedio/la je Tweet
    27. sij

    When you're brute forcing for endpoints, don't forget to add extensions. You can also use this method to discover backup files. Here's a command I use frequently: dirsearch -e php,asp,aspx,jsp,py,txt,conf,config,bak,backup,swp,old,db,sql -u <target>

    Poništi
  6. proslijedio/la je Tweet
    26. sij

    GET /example?param=test .. nothing interesting happened, not vuln to XSS. (<> " was filtered) but if I change it to POST it's reflected as value=\"test\" POST /example#xss param=test+onfocus='alert(0)'id='xss' ..and I can haz XSS bypassing their 'filter'

    Poništi
  7. proslijedio/la je Tweet
    26. sij
    Poništi
  8. proslijedio/la je Tweet
    31. pro 2019.

    Microsoft Edge (And Internet Explorer) is the only browser that allows running JavaScript from a <script> without the end tag <script async src=data:,alert(1)>

    Poništi
  9. proslijedio/la je Tweet
    25. sij

    Wrapping Up OWASP Mumbai's January Meetup with , Amol Podtar and . Thanks to our Chapter leaders , and host for providing the Network Intelligence India premises! See you all at the next meet!

    Poništi
  10. proslijedio/la je Tweet
    17. sij
    Poništi
  11. Poništi
  12. proslijedio/la je Tweet
    13. sij

    I found a really interesting Authorization bug on . Bug:If user tries to access unauthorized endpoint, then he will get 403 error. but if he removes his cookies and access the endpoint with just CSRF_TOKEN header,he will get access to unauthorized info.

    Poništi
  13. proslijedio/la je Tweet
    13. sij
    Poništi
  14. proslijedio/la je Tweet

    Google Dorks to Find Public Cameras inurl:currenttime inurl:top.htm inurl:/view.shtml inurl:"lvappl.htm" inurl:”CgiStart?page=” inurl:/view.shtml intitle:”Live View/ — AXIS” inurl:iview/view.shtml inurl:ViewerFrame?M0de= inurl:ViewerFrame?M0de=Refresh inurl:axis-cgi/jpg

    Poništi
  15. proslijedio/la je Tweet
    13. sij

    When using as part of your arsenal, make sure to add --data-length=50 {or any number in 20~60, the TCP packet header size). Otherwise, Nmap will in many cases return False Positives (i.e. too many open ports, or ports that are not actually open).

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    13. sij
    Poništi
  17. proslijedio/la je Tweet
    13. sij
    Poništi
  18. Poništi
  19. proslijedio/la je Tweet
    11. sij

    My courses are going back to GitHub and off of my website. It was really annoying running them on my website. The reverse engineering course is getting a revamp soon and a basic exploit dev course is being worked on.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    9. sij

    Responder 3.0.0.0 is out! Massive upgrade, support for both py3 and py2, many bug fix, enhancements and Q.A++ on all servers, poisoners and tools. Enjoy! ;)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·