yappare

@yappare

Skiddies. All tweets are my own opinion. None related to any organisation.

Joined November 2010

@yappare is blocked

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @yappare.

  1. Pinned Tweet
  2. Ahaha this thread where noobs talking about is the best "STOP HIDING UR IDENTITY, HACKERS"

  3. after 4 hours late joined the bounty, 15 minutes later, the program is closed. urghh..

  4. Foxit Reader ConvertToPDF TIFF SamplesPerPixel Parsing Heap Buffer Overflow Remote Code Execution Vulnerability

  5. New blogpost: "MS16-039 – “Windows 10” 64 bits Integer Overflow exploitation by using.." -->

  6. no UI vector, inspired by vector :D <div style=writing-mode:tb;overflow:scroll onscroll=alert(1)>

  7. g0tmi1k starred Matir/pwnableweb on Github

  8. WordPress Stream plugin stored XSS -> RCE demo. Uber rewarded $5k, disclosure pending.

  9. New blog post on the Symantec vulnerabilities we're releasing today, including wormable remote code execution bugs.

  10. SSRF bible updated a little. Redis tricks with SLAVEOF and MIGRATE added

  11. "Any pentesters wanna change things up, work from home with a fun rising company?" -> If so, ping for more details.

  12. This is a solid exampe of chaining bugs / pivoting on a webapp (stored XSS on a site with no user input):

  13. No UI vector Edge, MSIE10-11 <div style="-ms-scroll-limit:1px;overflow:scroll;width:1px" onscroll=alert('xss')>

  14. This amazing hack unlocks hundreds of secret 'Super Mario Bros.' levels hidden on the cartridge

  15. A new vuln related to JNDI, a Java API that allows clients to find data & objects by name. By at

  16. This is a BRILLIANT IDEA ... all you travellers, conference goers and IR Teams. Take a minute and do this

  17. Utilizing Multi-byte Characters To Nullify SQL Injection Sanitizing

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·