Explore tweets tagged as #codeinjection
@ptracesecurity
Ptrace Security GmbH
5 years
1
34
75
@jssodhi
Prof (Dr) JSSodhi
5 years
0
1
3
@ptracesecurity
Ptrace Security GmbH
5 years
Userland API Monitoring and Code Injection Detection https://t.co/NyMFjU8yA2 #Pentesting #API #CodeInjection #CyberSecurity #Infosec
0
32
79
@johnk3r
Johnk3r
5 years
I admire several security companies, @TrendMicro one of them. Happy to help with the safety of your products. #bugbounty #codeinjection
0
2
2
@ptracesecurity
Ptrace Security GmbH
8 years
Userland API Monitoring and Code Injection Detection https://t.co/U2N0gEhZdm #CodeInjection #ExploitDev #Infosec
0
7
13
@freeprogrammers
Mr.programmer
2 years
#موقت #آموزشی #udemy بچه ها این دوره خوبیه تا برداشته نشده به اکانت یودمی تون اضافه کنید موضوع : XSS Survival Guide Coupon : 6BB8720306F8274B42EC Link : https://t.co/Eaxw8ZJ0Uv #XSS #Security #WebDevelopment #Cybersecurity #CodeInjection #OWASP #WebSecurity
1
4
25
@bl4ckh0l3z
💥 𝕭𝖑4𝖈𝖐𝖍0𝖑3𝖟 👾
6 years
1
6
7
@parrot_ctfs
Parrot CTFs
3 years
2
2
1
@ptracesecurity
Ptrace Security GmbH
5 years
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection. https://t.co/qS78mcjsM1 #Malware #CodeInjection #Debugging #CyberSecurity #Infosec
0
10
29
@_SaxX_
SaxX ¯\_(ツ)_/¯
6 years
Focusing these days on some #Websecurity only (re)-learning #javascript Found in the wild a very inspiring ressources here https://t.co/Kt13e9CkxZ It covers in-depth videos & slides on Session Attacks, #CSRF, #XSS, #Fingerprinting, #CodeInjection, #SecureCoding & more. 🤯🤯
0
4
9
@nav1n0x
N$
1 year
Found another PHP Code Injection/RCE bug in the same program, but on a different domain. Luckily, the program didn't say "shared code". Payload: GET /?some_parameter='.print(`id`).'&_language=english&**another_parameter=1 HTTP/1.1 #BugBounty #PHP #RCE #CodeInjection
@nav1n0x
N$
1 year
This is the quickest RCE I've ever gotten. The app has a popup for multi-selection fields. I intercepted the request, expecting XSS or SQLi, but found that the parameter **_session_name= can be exploited to get an #RCE as a surprise. Payload: `&**='.print((`id`)).'` #BugBounty
5
72
434
@spotheplanet
spotheplanet
7 years
New notes on code injection via process hollowing and image Windows PE image relocations https://t.co/4XZIORFoyM #processhollowing #codeinjection #evasion
0
45
56
@overflow_meme
Meme Overflow
5 years
Email tracing script appearing in all pages opened in Google Chrome https://t.co/ImRBCA8Tdc #googlechrome #codeinjection #javascript
0
3
1