ಟ್ವೀಟ್ಗಳು
- ಟ್ವೀಟ್ಗಳು
- ಟ್ವೀಟ್ಗಳು & ಪ್ರತಿಕ್ರಿಯೆಗಳು
- ಮಾಧ್ಯಮ
@albinowax ತಡೆಹಿಡಿಯಲಾಗಿದೆ
ನೀವು ಖಚಿತವಾಗಿಯೂ ಈ ಟ್ವೀಟ್ಗಳನ್ನು ನೋಡಲು ಬಯಸುವಿರಾ? ಟ್ವೀಟ್ಗಳನ್ನು ನೋಡುವುದು @albinowax ಅವರನ್ನು ತಡೆತೆರವುಗೊಳಿಸುವುದಿಲ್ಲ.
-
ಪಿನ್ ಮಾಡಿದ ಟ್ವೀಟ್
Backslash Powered Scanning: Hunting Unknown Vulnerability Classes http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html …
-
I hope calling every strict-dynamic/nonce bypass a 'CSP Bypass' doesn't make people under-estimate the effectiveness of 'default-src: self'
-
"This book reads you" https://s1gnalcha0s.github.io/epub/2017/01/25/This-book-reads-you.html … awesome work by
@craig_arendt exploiting epub parsers -
New blog post: Fighting XSS with
Isolated Scripts http://sirdarckcat.blogspot.com/2017/01/fighting-xss-with-isolated-scripts.html … -
burp-image-size ImageTragick test now supports collaborator, nice! https://github.com/silentsignal/burp-image-size …
@Burp_Suite -
Check out my interview with
@Hacker0x01 about the@Burp_Suite bug bounty program: https://hackerone.com/blog/Chat-With-Burp-Suite-About-Their-Bug-Bounty-Story … -
Here's a slightly different fuzzlist I found:https://github.com/minimaxir/big-list-of-naughty-strings/blob/master/blns.txt …
-
#backslash find cool mysql sqli injection :)@albinowax great plugin for burp.pic.twitter.com/CRvxJhFMMk
-
I have a hunch there might be a vulnerability in this extension https://chrome.google.com/webstore/detail/allow-control-allow-origi/nlfbmbojpeacfghkpbjhddihlkkiljbi/reviews?hl=en …
-
If hackxor2 had the checkbox "I am aware some websites within this game are untrustworthy and may attempt to compromise my computer" I would
-
How to bypass CSP nonces with DOM XSS
http://sirdarckcat.blogspot.com/2016/12/how-to-bypass-csp-nonces-with-dom-xss.html … -
Bypassing CSP script nonces via the browser cache: http://sebastian-lekies.de/csp/attacker.php …. Nonces are incompatible with most caching mechanisms.
#CSP -
I love the manual collaborator client, that 'poll now' button is like a fruit machine lever. I have no idea what I just found and that rocks
-
The X-Wap-Profile HTTP request header sounds incredible! http://www.developershome.com/wap/detection/detection.asp?page=profileHeader …
@Agarri_FR -
Hahah oh dear, I'd score my talk at least 4/10 https://opencfp.immunityinc.com/talks/134/ Lucky the research is happening regardless :)
-
CFP submission: "Backslash Powered Scanning: Implementing Human Intuition" by James Kettle
@albinowax https://opencfp.immunityinc.com/talks/134/ -
Burp Suite 1.7.14 released, with security fixes and other enhancements http://releases.portswigger.net/2016/12/1714.html …
-
MS Edge UXSS - Adventures in a Domainless World. Learn how to shake Edge to find Universal Cross Site Scriptings. https://brokenbrowser.com/uxss-edge-domainless-world …pic.twitter.com/zmYnAsu5my
-
A few thoughts on vulnerability pricing http://sirdarckcat.blogspot.com/2016/12/vulnerability-pricing.html …
-
@albinowax " Interesting input handling: SQLite injection" -slow clap-
ಲೋಡಿಂಗ್ ಸಮಯ ಸ್ವಲ್ಪ ತೆಗೆದುಕೊಳ್ಳುತ್ತಿರುವಂತೆನಿಸುತ್ತದೆ.
Twitter ಸಾಮರ್ಥ್ಯ ಮೀರಿರಬಹುದು ಅಥವಾ ಕ್ಷಣಿಕವಾದ ತೊಂದರೆಯನ್ನು ಅನುಭವಿಸುತ್ತಿರಬಹುದು. ಮತ್ತೆ ಪ್ರಯತ್ನಿಸಿ ಅಥವಾ ಹೆಚ್ಚಿನ ಮಾಹಿತಿಗೆ Twitter ಸ್ಥಿತಿಗೆ ಭೇಟಿ ನೀಡಿ.
James Kettle
Eduardo Vela
Ryan Dewhurst
e3xpl0it
Sebastian Lekies
Infiltrate
Burp Suite
Manuel Caballero
Justin Kennedy