xp101t Profile Banner
xp101t Profile
xp101t

@xp101t

Followers
22
Following
1
Media
1
Statuses
12

Joined March 2019
Don't wanna be here? Send us removal request.
@xp101t
xp101t
7 years
#GoldBrute is coming
0
2
0
Reason number #61234 of why you don't run random exploits from the interent: CVE-2019-0708 #Bluekeep
2
14
34
@0xba3ba4
0xba3ba4
7 years
One of very helpful and not very well known Shodan filter is “http.favicon.hash”. It calculates hash of favicon.ico image and search for exactly this same value, which returns websites running the same target software or service. #shodan #OSINT
7
195
567
@bad_packets
Bad Packets by Okta
7 years
⚠️ WARNING ⚠️ @Forbes Magazine subscription website ( https://t.co/VqCahQHj9X) is infected with #magecart malware. Exfil domain: fontsawesome[.]gq (🇧🇬) @urlscanio results: https://t.co/Su3ziLZd3w Deobfuscated code: https://t.co/jb0ULmq0Et
13
491
738
@xp101t
xp101t
7 years
Getting Started in #BugBounty Hunting https://t.co/FdNRxcFkV0
0
1
2
@xp101t
xp101t
7 years
#AEMDorks inurl:"/libs/granite/core/content/login" intitle:"AEM Sign In"
0
0
0
@hakluke
Luke Stephens (hakluke)
7 years
New blog post! 🙌 This is how I've been leveraging low-severity XSS bugs to bypass CSRF protections & perform full account takeovers. I've included canned JS payloads to gain administrative access on Wordpress and Drupal in my Github (link in article). https://t.co/kv1dHkWNl8
hakluke.medium.com
Some ways to effectively leverage XSS vulnerabilities to increase severity, and some canned payloads to hack popular frameworks!
4
131
322
@xp101t
xp101t
7 years
Attacking Private Networks from the Internet with DNS Rebinding https://t.co/hp7gHe7KqG
0
0
0
@xp101t
xp101t
7 years
Crack WPA/WPA2 Wi-Fi Routers with Aircrack-ng and Hashcat https://t.co/3kbYFoT3mn
0
0
0
@xp101t
xp101t
7 years
0
0
0