Twitter | Pretraživanje | |
Avasdream
CS student, self-proclaimed human, programmer, infosec. Loves challenges like Vulnhub, Hackthebox, .Check out
1.102
Tweetovi
490
Pratim
151
Osobe koje vas prate
Tweetovi
Avasdream proslijedio/la je tweet
pry0cc 22 h
Why do I never get any pentests with cookie-cutter vulnerabilities? I have literally never done a pentest when I've found an RCE, exploited with Metasploit, and gotten a shell that way. Literally NEVER happened to me.
Reply Retweet Označi sa "sviđa mi se"
Avasdream 6 h
Breaking News: The NSA got an exploit where they can hotmic any phone if the user unlocks it. Downside: Does not work remotely
Reply Retweet Označi sa "sviđa mi se"
Avasdream proslijedio/la je tweet
Jin Wook Kim 9 h
CVE-2019-1388 Microsoft Windows UAC Privilege Escalation Exploit Tool : HHUPD.exe () Ref :
Reply Retweet Označi sa "sviđa mi se"
Avasdream proslijedio/la je tweet
Stephen "😭” Woods 4. velj
I've worked professionally in software for 18 years and I can say with certainty that you should not use software for anything
Reply Retweet Označi sa "sviđa mi se"
Avasdream proslijedio/la je tweet
Saleem Rashid 4. velj
i've written a working exploit for sudo vulnerability CVE-2019-18634. if you have "Defaults pwfeedback" (apparently the default in Linux Mint and derivatives), any user can become root without any password, even if they're not in /etc/sudoers
Reply Retweet Označi sa "sviđa mi se"
Avasdream 4. velj
Hi could you pls dm me a security contact. You got a pretty big security flaw in your website. I tried to reach out to you via email but you did not even respond. And maybe for the future implementing a security.txt would be awesome.
Reply Retweet Označi sa "sviđa mi se"
Avasdream proslijedio/la je tweet
Yonathan Klijnsma 3. velj
To the person who figured out my honeypot is a honeypot could you please stop putting the picture of Pooh bear with a jar of honey on it? Its like this person's life mission, I've blocked him on: - Client - IPs (now on Tor ffs) - The image (he just edits 1 pixel every time...)
Reply Retweet Označi sa "sviđa mi se"
Avasdream proslijedio/la je tweet
shubs 2. velj
This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.
Reply Retweet Označi sa "sviđa mi se"
Avasdream proslijedio/la je tweet
Abby Fuller 30. sij
Reply Retweet Označi sa "sviđa mi se"
Avasdream proslijedio/la je tweet
Extremely Online Kat Cosgrove 30. sij
The CEO of a startup that claims to "change the way you meet people" is trying to cyberbully me but he's not very good at it. Going for the old "you're ugly" strategy. Gg bro, PS your beta signup is broken due to your lack of SSL.
Reply Retweet Označi sa "sviđa mi se"
Avasdream 31. sij
Terrafrom, because: "All infrastructure as Code is equal, but some infrastructure as Code is more equal than others."
Reply Retweet Označi sa "sviđa mi se"
Avasdream proslijedio/la je tweet
Chetan Puttagunta 31. sij
Amazon AWS: $40B revenue run-rate Grew 34% annually 67% of Amazon's operating income Microsoft Azure: Est. $20B revenue run-rate Grew 62% annually & accelerating Tracking to be Microsoft's largest business soon Remarkable. Two $1T companies are driven by cloud infrastructure.
Reply Retweet Označi sa "sviđa mi se"
Avasdream proslijedio/la je tweet
Ronen Shustin 30. sij
In the past year, I was researching Azure Stack, which is an on-premise version of Azure Cloud. In the following blog posts, we present information on what is Azure Stack and its architecture and disclose a vulnerability in Azure App Service that allowed a sandbox escape.
Reply Retweet Označi sa "sviđa mi se"
Avasdream proslijedio/la je tweet
Joona 29. sij
Odgovor korisniku/ci @codingo_ @Ice3man543 @PortSwigger
We all love Burp suite by , right? Want to send over all the ffuf job matches to Burp? Easy with -replay-proxy ffuf -u -w wordlist.txt -replay-proxy http://127.0.0.1:8080 If you ffuf on remote box, this totally works through ssh tunnels too!
Reply Retweet Označi sa "sviđa mi se"
Avasdream proslijedio/la je tweet
Jin Wook Kim 29. sij
SQL Injection WAF bypass techniques 1.Nullbyte: %00' UNION SELECT password FROM Users WHERE username-'tom'-- 2. SQL Comments: '/**/UN/**/ION/**/SEL/**/ECT/**/password/**/FR/OM/**/Users/**/WHE/**/RE/**/usersame/**/LIKE/**/'tom'--
Reply Retweet Označi sa "sviđa mi se"
Avasdream proslijedio/la je tweet
Web Security Academy 28. sij
Check out our new page on escaping the AngularJS sandbox, including new vulnerability labs.
Reply Retweet Označi sa "sviđa mi se"
Avasdream proslijedio/la je tweet
Jan Schaumann 28. sij
How I think containers work.
Reply Retweet Označi sa "sviđa mi se"
Avasdream proslijedio/la je tweet
Igal Tabachnik 28. sij
Reply Retweet Označi sa "sviđa mi se"
Avasdream proslijedio/la je tweet
daniel@tindall:~# 28. sij
Great article on attacking Kerberos from Linux
Reply Retweet Označi sa "sviđa mi se"
Avasdream proslijedio/la je tweet
Shodan 27. sij
A map of Citrix devices that are vulnerable to CVE-2019-19781
Reply Retweet Označi sa "sviđa mi se"