Twitter
信息源 时间
Twitter
Nicolas Krassas
dinosn 原文
RT Jason Haddix: Another crypto hack due to "access" to systems. Sounds like web 2.0 to me ¯\_(ツ)_/¯ Crypto companies: invest heavily in web 2 secu...
Twitter
Nicolas Krassas
Dinosn 原文
The PoC for the spring boot core RCE as it was published before,
Twitter
Rasta Mouse
_RastaMouse 原文
Re @digininja The thought of 5-year old being alone in London is simply terrifying.
Weibo
page phithon别跟路人甲BB
phithon别跟路人甲BB 原文
低情商:封城 高情商:全域静态管理
Twitter
Project Zero Bugs
ProjectZeroBugs 原文
Chrome: heap-use-after-free in safe_browsing::ThreatDetails::OnReceivedThreatDOMDetails
Twitter
سعود العنزي
dmaral3noz 原文
Re @Matrix0700 كفوك يالاسطورة الفال لك بالافضل والاعلى من هذي 💪🏻
Twitter
سعود العنزي
dmaral3noz 原文
Re @MH_alrashidi ياهلا بمحمد الفال لك ياصاحبي 👍🏻
Twitter
سعود العنزي
dmaral3noz 原文
Re @AbdulslamAlonzi ياهلا بالهيكس كله منور 💪🏻
Twitter
سعود العنزي
dmaral3noz 原文
Re @slv0d يابعد راسي يامشاري والابداع منك وفيك 👍🏻 ( الشانزليليه ) 😂
Twitter
سعود العنزي
dmaral3noz 原文
Re @xcode0x الفال لك يالشيخ بالاعلى والافضل منها 👍🏻
Twitter
سعود العنزي
dmaral3noz 原文
Re @mayhab511 ياهلا بالوافي الي ماتغيره السنين ، الفال لك يابو عتب بالافضل منها 👍🏻
Twitter
vx-underground
vxunderground 原文
Re @imn000f what
Twitter
vx-underground
vxunderground 原文
A Java Springcore RCE 0day exploit has been leaked. It was leaked by a Chinese security researcher who, since sharing and/or leaking it, has deleted t...
Twitter
vx-underground
vxunderground 原文
ContiLeaks did an interview with CNN.
Twitter
👑 OFJAAAH 👑
ofjaaah 原文
Re @rodoassis @brutelogic sempre meu querido! Agradeço demais o seu tempo e dividir um pouco de conhecimento! Forte abraço mermão.
Twitter
👑 OFJAAAH 👑
ofjaaah 原文
Re @twitsecuriter before moving to qsreplace you need to find what you want to pass. echo
Twitter
👑 OFJAAAH 👑
ofjaaah 原文
Rapaaaziada!!! Sexta-feria estarei com @brutelogic @rodoassis falando sobre XSS e entre outros assuntos, para os alunos do introdução ao Recon as 19...
Twitter
Bank Security
Bank_Security 原文
RT Daily Dark Web: Central Bank of #Tunisia hacked by Conti (1560 devices encrypted) #dailydarkweb #DarkWeb #darkwebmonitoring #DataBreaches
Twitter
Elon Musk
elonmusk 原文
Re @JohnnaCrider1 Ok
Twitter
Elon Musk
elonmusk 原文
Re @harsimranbansal Canada requires charging by the minute vs kWh. We’re working to get that changed.
Twitter
☣ KitPloit - Hacker Tools
KitPloit 原文
Nimcrypt2 - .NET, PE, And Raw Shellcode Packer/Loader Writte...
Twitter
☣ KitPloit - Hacker Tools
KitPloit 原文
Casper-Fs - A Custom Hidden Linux Kernel Module Generator. Each Module Works In The File System To Protect And Hide Secret Files
Twitter
Brute Logic
brutelogic 原文
RT KNOXSS: #DidYouKnow #KNOXSS tests: - All URL or POST params (source/DOM) - URL fragment # - URL path /a/b/c - SQL error, XML, double enc & B64 It a...
Twitter
Brute Logic
brutelogic 原文
RT 👑 OFJAAAH 👑: Rapaaaziada!!! Sexta-feria estarei com @brutelogic @rodoassis falando sobre XSS e entre outros assuntos, para os alunos do intro...
Twitter
Brute Logic
brutelogic 原文
Re @xhzeem Thanks for mentioning this one and congratulations for finding that if it was you who crafted it.
Twitter
Brute Logic
brutelogic 原文
Re @xhzeem Yeah, I've also used that trick against Akamai before your tweet as well as several other guys. But it doesn't work there anymore while the...
Twitter
Rodolfo Assis
rodoassis 原文
Re @ofjaaah @brutelogic Sempre um prazer, meu amigo! 😉
Twitter
Rodolfo Assis
rodoassis 原文
Re @ofjaaah @brutelogic Tamo junto! 😀
Twitter
Rodolfo Assis
rodoassis 原文
Today we are celebrating the birthday of our beloved sons!!! 🥳🎉 NICOLAS (left) completed 2 years couple days ago while CÉSAR (right) completes ...
Twitter
CVE
CVEnew 原文
CVE-2022-1155 Old sessions are not blocked by the login enable function. in GitHub repository snipe/snipe-it prior to 5.3.10.
Twitter
CVE
CVEnew 原文
CVE-2022-1154 Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.
Twitter
CVE
CVEnew 原文
CVE-2022-24131 DouPHP v1.6 Release 20220121 is affected by Cross Site Scripting (XSS) through /admin/login.php in the background, which will lead to J...
Twitter
CVE
CVEnew 原文
CVE-2022-1179 Non-Privilege User Can Created New Rule and Lead to Stored Cross Site Scripting in GitHub repository openemr/openemr prior to 6.0.0.4.
Twitter
CVE
CVEnew 原文
CVE-2022-1181 Stored Cross Site Scripting in GitHub repository openemr/openemr prior to 6.0.0.2.
Twitter
CVE
CVEnew 原文
CVE-2022-1178 Stored Cross Site Scripting in GitHub repository openemr/openemr prior to 6.0.0.4.
Twitter
CVE
CVEnew 原文
CVE-2022-1180 Reflected Cross Site Scripting in GitHub repository openemr/openemr prior to 6.0.0.4.
Twitter
CVE
CVEnew 原文
CVE-2022-1177 Accounting User Can Download Patient Reports in openemr in GitHub repository openemr/openemr prior to 6.1.0.
Twitter
CVE
CVEnew 原文
CVE-2022-23869 In RuoYi v4.7.2 through the WebUI, user test1 does not have permission to reset the password of user test3, but the password of user te...
Twitter
CVE
CVEnew 原文
CVE-2022-23868 RuoYi v4.7.2 contains a CSV injection vulnerability through ruoyi-admin when a victim opens .xlsx log file.
Twitter
Black Hat
BlackHatEvents 原文
#BHASIA Arsenal "Kubesploit: A Post-Exploitation Framework, Focused on Containerized Environments" dives into Kubesploit, a post-exploitation HTTP/2 C...
Twitter
Rasta Mouse
_RastaMouse 原文
Re @_xpn_ I can stop any time I want
Twitter
Rasta Mouse
_RastaMouse 原文
Re @_xpn_ When you work from home, every hour is after hours.
Twitter
Rasta Mouse
_RastaMouse 原文
Re @_xpn_ The ASMR category is where the action is really at...
Twitter
Rasta Mouse
_RastaMouse 原文
ffs Twitter
Twitter
Rasta Mouse
_RastaMouse 原文
Re @imn000f ThinkPad X1
Twitter
Rasta Mouse
_RastaMouse 原文
Re Gotta say, a 15” 2-in-1 laptop makes for a pretty baller eReader.
Twitter
Rasta Mouse
_RastaMouse 原文
Re @dontkerBROastme @zodiacon Yeah, I'm pretty fucked lol.
Twitter
Rasta Mouse
_RastaMouse 原文
Let's gooooooo @zodiacon
Twitter
Burp Suite
Burp_Suite 原文
Re @boy_child_ Thanks!
Twitter
Burp Suite
Burp_Suite 原文
Re @boy_child_ If you click and drag the resize function, do the request and response return to the window? Could you send us (support@portswigger.net...