Jump to content

mildata

Active Members
  • Posts

    4
  • Joined

  • Last visited

Status Updates posted by mildata

  1. @cybraryIT with an affiliate link, nice money making attempt from the writer.

  2. @Doc_Rphil @AIVD Een waarheidsbevinding doen is toch het hele idee?

  3. @evilsocket 1..2..3 aaaand it's gone (my own experience, luckily not 400gb)

  4. @i0n1c @_FireFart_ 156k followers, somebody is probably going to do it ?

  5. @JusticeRage @evilsocket Or somebody is trying to frame Lucas Gomes pam pam paaaam

  6. @m0rb @Viss How do I delete a tweet :(

  7. @slekies @datenkeller Haha fair enough, thanks for the effort! I will look at the link then.

  8. @sloaiza86 The website of $tky? I don't know about $tky I rather wait a bit to see how that goes.

  9. @swept @_ruby @smiegles I can remember that smiegles is the only that can ask for a begbounty :3

  10. @x1m_martijn You really needed a new one! Looking good now.

  11. Almost home from the awesome @Hacker0x01 meetup in Groningen. It was awesome meeting you all and special shout-out… https://t.co/36J6d3wevf

  12. https://t.co/9YXGrCp5mk

  13. RT @_MG_: I call this the "Break & Enter dropbox" and it pairs well with my Amazon Key (smartlock & smartcam combo). It's all current sof…

  14. RT @0xdea: The exploit is here, by the way: https://t.co/KgRyUujWIe https://t.co/k9zAEr9OV9

  15. RT @0XDEDBEEF: Chinese surveillance system. Holy fucking shit https://t.co/0h9oxU1ezH

  16. RT @0xTony: Lots of people talk about how to break sites with XSS, but few team about how to properly mitigate XSS attacks. A post on how t…

  17. RT @albinowax: Safari allows special characters in the domain?! This is insane, they should patch that ASAP: https://t.co/qR2vtRROiI

  18. RT @anseljh: @sambowne Pretty clever. Article doesn't say much, but here's the thesis: https://t.co/Mk0Ixd4AHw https://t.co/UavmkXYglO

  19. RT @archillect: https://t.co/YUwnxLLrlt

  20. RT @binitamshah: Build your own VR headset for $100 : https://t.co/PVloop0tFW #DIY https://t.co/bKUaSXI6cq

  21. RT @binitamshah: PHP SSRF Techniques : How to bypass filter_var(), preg_match() and parse_url() : https://t.co/0SIjSBad4H cc @Menin_TheMidd…

  22. RT @Bob: "Security" https://t.co/AecabmFpNo

  23. RT @brokep: The record companies know that I have not had any part of TPB for ages, still suing. Bullying is the new black. https://t.co/P3…

  24. RT @byt3bl33d3r: Working on a new project ? i think this might be a game changer for red teams. It's the best of both worlds and more. Ever…

  25. RT @dan1t0: https://t.co/MCbcnWmAKJ

×
×
  • Create New...