@devviyah Profile picture

dev devi

@devviyah

Beauty And A Beat

Joined January 2020
Similar User
INA PROXY WAREHOUSE • JASTIP HANDCARRY MALAYSIA photo

@_ninecookies

Dira Wirawan photo

@wirawan_dira

fani photo

@0xfanii

Nasionalis Cyber Indonesia photo

@NCI4RI_

Ejaz Ali photo

@IqbalMartua

anak baik photo

@patnernyabatman

O_heneBa_🤴🇬🇭 photo

@O_heneBa_

receh hunting - Tabi 🟧 photo

@sepdwianr

Sugar Daddy ☢️ photo

@adhistya_p

dev devi Reposted

Web RCE - CobaltStrike loader and executed - part 1 sokarepo.github.io/redteam/2024/0…">sokarepo.github.io/redteam/2024/0… sokarepo.github.io/redteam/2024/0…">sokarepo.github.io/redteam/2024/0…

Tweet Image 1
Tweet Image 2

dev devi Reposted

Breaking Down Multipart Parsers: File upload validation bypass Author: Andrea Menin Source 👇🏻 blog.sicuranext.com/breaking-down-…

Tweet Image 1
Tweet Image 2

dev devi Reposted

🚨EDR Telemetry website is live! 🥳 I hope this makes it even easier for folks to compare the telemetry of EDR vendors and visualize their visibility gaps 🙂 ‣ Website🔗edr-telemetry.com ‣ GitHub 🔗github.com/tsale/edr-tele… **Telemetry results reflect the most recent…

Tweet Image 1

I created the first draft of a website for the EDR telemetry project to help people quickly compare vendor telemetry visibility. What do you think about it? Are there any specific features you want to see for the website? Built with ChatGPT 4o with canvas (wanted to test it…



dev devi Reposted

📚 Access Admin panel by tampering with URI ➡️ Here’s a super easy tip to access an admin panel by tampering with the URI in the following way: •target.com/admin/ –> HTTP 302 (redirect to login page) •target.com/admin..;/ –> HTTP 200 OK ➡️ Try also the following…


dev devi Reposted

GitLab Authentication Bypass (CVE-2024-45409) : blog.projectdiscovery.io/ruby-saml-gitl… credits @rootxharsh @iamnoooob


dev devi Reposted

CVE-2024-38816: Path traversal vulnerability in Spring Frameworks PoC github.com/masa42/CVE-202…

Tweet Image 1

dev devi Reposted

CVE-2024-45519: Checks vulnerabilities in an SMTP server, Zimbra Remote Command Execution. PoC github.com/p33d/CVE-2024-…

Tweet Image 1

dev devi Reposted

🔰 403 Bypass Payloads 🔰 Base-Url: 127.0.0.1 Client-IP: 127.0.0.1 Http-Url: 127.0.0.1 Proxy-Host: 127.0.0.1 Proxy-Url: 127.0.0.1 Real-Ip: 127.0.0.1 Redirect: 127.0.0.1 Referer: 127.0.0.1 Referrer: 127.0.0.1 Refferer: 127.0.0.1 Request-Uri: 127.0.0.1 Uri: 127.0.0.1 Url:…


dev devi Reposted

Remote Code Execution Severity : Critical Shodan Query : http.html:"check point ssl network" Fofa Query : body="check point ssl network" Command : aCSHELL/../../../../../../../etc/passwd Poc Video Link : youtu.be/o5Yk7eamOgA?si… #LiveBugBounty #BugBountyLive #LiveHacking

Tweet Image 1

dev devi Reposted

Intresing observation with the help of just single string i am able to collect 300+ sample of #lummac and #Stealc #Stealer String: "C:\Windowsterminatedowner" IOC's: pastebin.com/raw/QMbiTacZ @RussianPanda9xx @malwrhunterteam @James_inthe_box

Tweet Image 1

dev devi Reposted

Great article on XSS WAF Bypass One payload for all onetest.fr/posts/xss-waf-…

Tweet Image 1

dev devi Reposted

Remote DoS Exploit in Mirai Botnet : pastebin.com/raw/6tqHnCva Details / Writeup : jacobmasse.medium.com/remote-dos-exp… Mirai-Source-Code : Leaked Mirai Source Code for Research/IoC Development Purposes : github.com/jgamblin/Mirai… PoC :


dev devi Reposted

Active c2 panels of Meduza Stealer. 103[.]161[.]224.131 193[.]33[.]153[.]62 109[.]237[.]99[.]23 5[.]42[.]101[.]189 5[.]42[.]106[.]42 77[.]105[.]146[.]121 5[.]42[.]103[.]11 109[.]107[.]181[.]83 77[.]105[.]147[.]243 79[.]137[.]205[.]182 5[.]42[.]73[.]251 46[.]226[.]166[.]245…

Tweet Image 1

dev devi Reposted

We have identified a new active c2 panel for 1312 STEALER. 45[.]137[.]70[.]18 #1312STEALER #malware #stealer #ThreatIntelligence #CTI

Tweet Image 1

dev devi Reposted

Wordpress Endpoints to look - Part 2 check this if you have these plugin. /wp-content/plugins/./simple-image-manipulator/controller/download.php?filepath=/etc/passwd…


dev devi Reposted

Forging a Path to Account Takeover: Copy Password Reset Link Vulnerability worth $$. medium.com/@bilalresearch#bugbounty #bugbountytips #bugbountytip


dev devi Reposted

𝐓𝐎𝐏 50 𝐬𝐞𝐚𝐫𝐜𝐡 𝐞𝐧𝐠𝐢𝐧𝐞𝐬 𝐟𝐨𝐫 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐑𝐞𝐬𝐞𝐚𝐫𝐜𝐡𝐞𝐫𝐬📃

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.