oopsunix's profile picture.

OopsUnix

@oopsunix

OopsUnix 님이 재게시함

🚨 POC for CVE-2025-55182 that works on Next.js 16.0.6 Here are the exact, battle-tested queries you need — Censys, Shodan, FOFA, ZoomEye, Quake, BinaryEdge, Hunter.how, and Nuclei matchers — all tuned specifically to find Next.js RSC / React Server Components…


OopsUnix 님이 재게시함

I've developed a professional and technical tool for Next.js (CVE-2025-55182) 🥳 I'm offering this tool, which allows you to perform both bulk and individual scans, as well as testing on live subdomains. github; github.com/ynsmroztas/Nex… #DevTools #python #bugbountytip

ynsmroztas's tweet image. I've developed a professional and technical tool for Next.js (CVE-2025-55182) 🥳

I'm offering this tool, which allows you to perform both bulk and individual scans, as well as testing on live subdomains.

github;

github.com/ynsmroztas/Nex…

#DevTools #python #bugbountytip…

#EdgeOneFreePlan @TencentCloudEO 腾讯云EdgeOne,真的太好用了!它提供一站式安全与加速解决方案,集安全、灵活、高效、敏捷于一身。全球2800+边缘节点,储备带宽超160T,让访问速度飙升,延迟大幅降低。 edgeone.ai/redemption?fro…


OopsUnix 님이 재게시함

🚀 Just dropped v0.5 of my Chrome App-Bound Encryption Decryption tool! Full user-mode (no admin), all path-validation bypasses, full cookie extraction (JSON 🍪) and stealth DLL injection. Chrome’s ABE is officially broken, works on Chrome, Edge & Brave. Anything else to tackle…

xaitax's tweet image. 🚀 Just dropped v0.5 of my Chrome App-Bound Encryption Decryption tool! Full user-mode (no admin), all path-validation bypasses, full cookie extraction (JSON 🍪) and stealth DLL injection. Chrome’s ABE is officially broken, works on Chrome, Edge & Brave. Anything else to tackle…

OopsUnix 님이 재게시함

Another day another bug 🔥 Just got a webshell uploaded with the Exiftool trick of injecting the payload into a real JPEG file! #BugBounty #bugbountytips #Hacking

chux13786509's tweet image. Another day another bug 🔥
Just got a webshell uploaded with the Exiftool trick of injecting the payload into a real JPEG file!
#BugBounty #bugbountytips #Hacking
chux13786509's tweet image. Another day another bug 🔥
Just got a webshell uploaded with the Exiftool trick of injecting the payload into a real JPEG file!
#BugBounty #bugbountytips #Hacking

I want this

THIS IS NOT A CONCEPT. I REPEAT. THIS IS NOT A CONCEPT. #NeoOne #iPhone16Pro

spigen's tweet image. THIS IS NOT A CONCEPT.

I REPEAT. THIS IS NOT A CONCEPT. 

#NeoOne #iPhone16Pro


很好,想要,可是没 3D 打印机

making an iPhone Standby Mode Dock with Overwerk full video + project files: bit.ly/ow-syj-dock



感谢@DIYgod的Follow激活码,即刻体验了一下,日常使用已经可以替换掉在用的Fluent Reader了,还有很多功能还不怎么会用,后面再分享。 已经把的我的订阅源迁移到Follow上,都是安全相关的RSS 这是我的 Follow 关注列表: app.follow.is/profile/561493…

oopsunix's tweet image. 感谢@DIYgod的Follow激活码,即刻体验了一下,日常使用已经可以替换掉在用的Fluent Reader了,还有很多功能还不怎么会用,后面再分享。
已经把的我的订阅源迁移到Follow上,都是安全相关的RSS

这是我的 Follow 关注列表:
app.follow.is/profile/561493…

PHP type juggling

What vulns are in this and how would you exploit them?

Bugcrowd's tweet image. What vulns are in this and how would you exploit them?


OopsUnix 님이 재게시함

In our latest blog post we show how changes in Java 17 prevents the out of the box usage of ysoserial gadgets and how you might get RCE through JDBC connections: mogwailabs.de/en/blog/2023/0…


United States 트렌드

Loading...

Something went wrong.


Something went wrong.