0xr3dhunt 🇪🇬 (@0xr3dhunt) 's Twitter Profile
0xr3dhunt 🇪🇬

@0xr3dhunt

Penetration Tester @ CyberAR | Bug Bounty Hunter | eWAPTxv2
___
字符编码绕waf 不需要javascript字符串 应该能绕很多
___

ID: 1484503739918602241

linkhttp://hackerone.com/0xr3dhunt calendar_today21-01-2022 12:31:50

172 Tweet

263 Takipçi

463 Takip Edilen

𝕏 Bug Bounty Writeups 𝕏 (@bountywriteups) 's Twitter Profile Photo

BB01 - Advanced Recon: Taking Your Subdomain Discovery to the Next Level r4gh4v.medium.com/bb01-advanced-… #bugbounty #bugbountytips #bugbountytip

KNOXSS (@kn0x55) 's Twitter Profile Photo

This classic script vector they use to teach you about XSS doesn't work for DOM-based Reflected vulnerabilities! You can check that in our modern XSS lab. x55.is/brutelogic/gym… knoxss.pro Stay with the best or miss like the rest. #WebAppSec #BugBounty #PenTesting

This classic script vector they use to teach you about XSS doesn't work for DOM-based Reflected vulnerabilities!

You can check that in our modern XSS lab.
x55.is/brutelogic/gym…

knoxss.pro
Stay with the best or miss like the rest.
#WebAppSec #BugBounty #PenTesting
cinesthetic. (@thecinesthetic) 's Twitter Profile Photo

The lunch tray catch in Spider-Man (2002) wasn’t CGI. Tobey Maguire actually pulled it off after 156 takes and a full 16-hour shoot day.

0xr3dhunt 🇪🇬 (@0xr3dhunt) 's Twitter Profile Photo

Wow! I have just got my new certificate in Android Frida Labs - Free Course. See it for yourself! mycourse.app/WxVYcQiOnUU8Ov… mycourse.app/uKWxynfdQjZ3VR…