smnf

15 posts

smnf

smnf

@smnfbb

Poland Katılım Eylül 2011
145 Takip Edilen24 Takipçiler
smnf retweetledi
Doyensec
Doyensec@Doyensec·
Help make safeurl even better (and safer). If you're the kind of person who can't wait to try to break a new library - connect to http://164.92.85.153/ and attempt to catch the flag on this internal (and unauthorized) URL: http://164.92.85.153/flag! You might win a cool prize :)
Doyensec@Doyensec

Announcing the release of `safeurl` - a library to help #golang devs "Build with Security"! This module provides tested & versatile protection against Server Side Request Forgery (SSRF)! Hurry and check it out! #doyensec #AppSec blog.doyensec.com/2022/12/13/saf… github.com/doyensec/safeu…

English
1
10
21
0
bugcrowd
bugcrowd@Bugcrowd·
Best meme 👉 wins swag! Hacking memes only 🚨 Keep them original 🖌️ Drop 'em below ⤵️
English
157
18
176
0
smnf
smnf@smnfbb·
@gregxsunday Also in Burp you can right click on request -> Engagement tools -> generate CSRF PoC -> Options -> Cross-domain XHR -> Regenerate, and you should have JS code ready
English
0
3
23
0
Bug Bounty Reports Explained
Bug Bounty Reports Explained@gregxsunday·
Creating an XSS exploit? You don't need to google "how to make a request in JS?" for the thousandth time. Go to dev tools, right-click the request you want to reproduce and "Copy as fetch"
Bug Bounty Reports Explained tweet media
English
11
111
435
0
Bug Bounty Reports Explained
Bug Bounty Reports Explained@gregxsunday·
Anyone has an idea of what can an attacker do by controlling the src value of an img tag apart from exploiting GET-based CSRF?
English
15
8
100
0
Cthulhu ( ;,;)
Cthulhu ( ;,;)@Cthulhu_Answers·
Yeah it’s the parody account’s fault that my employment is affected. Not my bat shit crazy claims, threats and attacks on researchers. Why wouldn’t a company want their brand associated with me? Yes I am a shape shifter. If a fraud can keep changing his name why can’t I?
Cthulhu ( ;,;) tweet media
English
9
1
62
0
smnf
smnf@smnfbb·
@phwd_ Mind sharing a link? Also, did they sent the invites yet?
English
2
0
0
0
Philippe Harewood
Philippe Harewood@phwd_·
It would be nice if meta updated everyone about the date change for Spain. I had to find out it changed to April from searching on Twitter. Thanks 🙏🏽
English
2
0
7
0
smnf
smnf@smnfbb·
@phwd_ What TURN methods you've tried here?
English
1
0
0
0
Philippe Harewood
Philippe Harewood@phwd_·
Here is an old video when I was chasing a Facebook SSRF by reading a HackerOne report and RFCs.
English
5
16
155
0
smnf
smnf@smnfbb·
@phwd_ Still waiting
GIF
English
0
0
0
0
Philippe Harewood
Philippe Harewood@phwd_·
Also, did anyone receive an email from meta about Madrid yet?
English
2
0
6
0
smnf
smnf@smnfbb·
@cyb3rops Fun fact, there is already scripting feature in log4j config file. Time to report it to them and get a CVE😎 #Scripts" target="_blank" rel="nofollow noopener">logging.apache.org/log4j/2.x/manu…
English
0
0
5
0
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
Log4j 2.17 RCE CVE-2021-44832 in a nutshell
Florian Roth ⚡️ tweet media
English
21
284
1.4K
0
smnf
smnf@smnfbb·
@manisashankm @ADITYASHENDE17 and then you would check DNS logs to see which domain was actually accessed. That could also show you what domain was searched, but XSS payload did not fire, indicating place to take a look into (2/2)
English
0
0
1
0