RogueSMG
@RogueSMG
Hacker Wannabe๐จโ๐ป | YouTube: https://t.co/HukfUSF3jA | Null Ahmedabad Chapter Lead | SRT | Psychology
ID:845869111
http://TheHackrSpace.com 25-09-2012 16:54:54
4,4K Tweets
7,6K Followers
1,0K Following
๐๐๐ผ๐ ๐ ๐๐๐ฒ๐ฑ ๐ฌ๐ผ๐๐ง๐๐ฏ๐ฒ ๐๐ผ ๐ณ๐ถ๐ป๐ฑ ๐ฎ ๐๐ฎ๐ฟ๐ด๐ฒ๐ ๐๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐น๐ฒ ๐๐ผ ๐ฆ๐ค๐ ๐ถ๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป
๐/๐
The company offered a paid service accessible through web and mobile apps. But accessing it was a challenge - no direct URL or app link was available.
Hi @m0uka_dz,
Unfortunately, this was submitted previously by another researcher, but we appreciate your work and look forward to additional reports from you.
#bugbounty #ethicalhacking #CyberSec
๐จURGENT๐จAllegedly, a Zero-day exploit for iOS iMessage is up for sale. There is no sample or PoC at time of this post.
#DarkWeb Informer #DarkWeb #Cybersecurity #Cyberattack #Cybercrime #Infosec #CTI #0Day #ZeroDay #iOS #iMessage #Exploit
Details:
- Attack Type: 0Click
-โฆ
The team at @Sysdig wrote a great article on how they fuzzed and bypassed the AWS WAF!
buff.ly/4d69fbK
<strong><button popovertarget=x>click me</button><test onbeforetoggle=alert(document.domain) popover id=x>aaa</aaa></strong>
#bugbounty #bugbounty tips #hackers #xss
Want to strengthen you Burp Suite kung fu? check out the below to practice session management and macros!
github.com/Hipapheralkus/โฆ
Video to help:
youtube.com/watch?v=mM3LR9โฆ
By Andrej ล imko