Timothy

@yinvi77

Hacking My Way Through Life /:

Vrijeme pridruživanja: srpanj 2019.

Tweetovi

Blokirali ste korisnika/cu @yinvi77

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @yinvi77

  1. Poništi
  2. proslijedio/la je Tweet
    5. sij

    الحمد لله My 2020 Start with SSRF on Here is an Amazing thing i wish to share to Noobs like me.

    Poništi
  3. proslijedio/la je Tweet
    10. sij

    I just published "Hunting Good Bugs with only <HTML>" I hope you enjoy this post!

    Poništi
  4. proslijedio/la je Tweet
    9. sij

    I've just published my research on the Two Factor Authentication security subject . I had fun and enjoyed writing this one, hope you'll enjoy reading! Have a good read! 🙂

    Prikaži ovu nit
    Poništi
  5. Poništi
  6. proslijedio/la je Tweet
    31. pro 2019.

    If you start reading this at 11:58PM tonight, you should be starting the next decade reading an a-ma-zing article about Out-Of-Bound attacks 🕛. This, and much more, in our last newsletter of the year! 🎉👇

    Poništi
  7. proslijedio/la je Tweet
    30. pro 2019.

    It has been quite a while since I've shared with Y'all, here's a quick one that might be useful on your next pentest: Password Spraying Dell SonicWALL Virtual Office

    Poništi
  8. proslijedio/la je Tweet

    Just posted Low-Hanging Apples: Hunting Credentials and Secrets in iOS Apps

    Poništi
  9. proslijedio/la je Tweet
    21. pro 2019.

    New writeup, one of my favorite bugs 🤠 - Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty Featuring...

    Poništi
  10. proslijedio/la je Tweet
    17. pro 2019.

    I've received some great feedback after published a video about one of my Google Cloud Shell bugs. That's why i've decided to publish a series of posts on my blog: . Thanks to for a year filled with fun!

    Poništi
  11. proslijedio/la je Tweet
    18. pro 2019.

    If you look into the right place, even Google can make some easy mistakes 👀👀 Check it out

    Poništi
  12. proslijedio/la je Tweet
    16. pro 2019.

    Finally got the approval, Here are multiple Linode's access token stealing/account takeover bugs, I like the second one. Retweet if you like it.

    Poništi
  13. proslijedio/la je Tweet
    24. kol 2019.

    Just Published article of [iOS Application Security] Jailbreak 12.4 and SSL pinning bypass | How to set up your iOS Testing Lab Thanks, and

    Poništi
  14. proslijedio/la je Tweet

    Just posted From checkra1n to Frida: iOS App Pentesting Quickstart on iOS 13 - to be followed up with a second writeup on bug I've found with these tools.

    Poništi
  15. proslijedio/la je Tweet
    13. pro 2019.

    Hi, If you want to know how SSRF Vulnerability was exist in Vimeo, you should read: Reported through ;)

    Poništi
  16. proslijedio/la je Tweet
    Odgovor korisniku/ci

    It is no difference from normal web app but you can find some tips related to API

    Poništi
  17. proslijedio/la je Tweet
    7. pro 2019.

    I just published An Android Hacking Primer

    Poništi
  18. Poništi
  19. proslijedio/la je Tweet
    3. pro 2019.
    Odgovor korisniku/ci
    Poništi
  20. proslijedio/la je Tweet
    Odgovor korisnicima i sljedećem broju korisnika:

    What is the meaning of path... Other paths: content, counturl, dest_url, document, domain, download, file, http,https, image, image_src, imageurl, include, media, Page, pageurl, page_url, picture, referrer, req, request, source, src, uri, url

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·