Al1ex

1.5K posts

Al1ex banner
Al1ex

Al1ex

@Al1ex4

Cyber Security Expert. Bug bounty hunter. Heptagram™ team member.

Katılım Temmuz 2018
244 Takip Edilen257 Takipçiler
Sabitlenmiş Tweet
Al1ex
Al1ex@Al1ex4·
UPDATE my github profile "readme.md" ~ github.com/Al1ex ID: Al1ex Team: Heptagram Official account:Heptagram Lab Research direction: Web Penetration,Mobile Security, Code Audit,Emergency Response, Intranet Penetration, Blockchain Security
English
2
1
1
0
Al1ex retweetledi
HackGit
HackGit@hack_git·
TakeMyRDP 2.0 A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing it to record keystrokes in certain contexts... github.com/nocerainfosec/… #infosec #pentesting #redteam
English
1
66
221
22.7K
Al1ex retweetledi
张惠倩
张惠倩@momika233·
http://xxxx/__clockwork/latest
张惠倩 tweet media
ZXX
2
26
175
35.7K
Al1ex retweetledi
Guangzheng Li
Guangzheng Li@iguangzhengli·
#工具分享 如果你想将本地 localhost 的网络暴露到互联网中,可以试试 tabserve.dev 这个工具。 它使用 Cloudflare Worker 和 Web Worker 来创建互联网到本地主机的反向代理,无需在本地安装 CLI 等工具,没有安全隐患,还可以用 Chrome 来调试,非常不错👍
Guangzheng Li tweet media
中文
31
176
702
151.4K
Al1ex retweetledi
Viking
Viking@vikingmute·
今天才发现 Google 居然有一个免费的无代码建站工具。 Google Sites sites.google.com 试用了一下: * 模版种类挺多,很不错,现代好看。 * 交互也还可以。 * 响应式支持。 * 发布的时候支持绑定自定义域名。 如果你要快速做一个静态站点的话,可以考虑一下,不过按照 Google 经常关闭服务的德行,使用的时候还是要注意一点。
中文
7
127
436
86.9K
Al1ex retweetledi
Un9nPlayer
Un9nPlayer@Un9nPlayer·
I found a SQL on one URL but properly secured. But found @LiveOverflow new video "HTML Sanitizer Bypass Investigation". I give it a try and I was able to bypass Cloudflare which leads to XSS. payload: '<00 foo="<a%20href="javascript:alert('XSS-Bypass')">XSS-CLick</00>--%20/
Un9nPlayer tweet mediaUn9nPlayer tweet mediaUn9nPlayer tweet media
English
10
151
628
66.3K
Al1ex retweetledi
Aydin Naserifard
Aydin Naserifard@NaserifardA·
How did I test the IDOR vulnerability that leads to all user Data leakage? 1:Change the /me endpoint to /users. 2.Change the GET method to the POST method. 3.Add the Content-Type: application/json header. 4.Add this payload to the HTTP request body. {"ids":["1"]} #bugbountytips
English
14
174
494
41.3K