Vitor Almeida
banner
cyberphantom.bsky.social
Vitor Almeida
@cyberphantom.bsky.social
I'm always hacking, hacking, hacking, eating, dating, and more hacking...
Okay, as a friend just check it by your own, coinmarketcap.com/dexscan/pt-b... #cripto #tardis #TRDS #coinmarketcap
March 18, 2024 at 7:57 PM
March 18, 2024 at 7:03 PM
Hey guys, I've heard of a new promising token called Tardis (TRDS), there are 20 millions TRDS available, you can start the liquidity of this token and buy after. The token address to you search for in pancakeswap is this: 0xC6797a208b60762717C4F4fDeED035Bb63704aE2 -> bscscan.com/token/0xC679...
March 15, 2024 at 4:58 PM
It's shameful, to say the least, right? After all, if someone with malicious intent has access to the server, a lot of people will be fired, the company will lose price in assets, reputation, etc etc etc
February 6, 2024 at 8:58 PM
The reason may be lack of aptitude of the cyber security staff, lack of organization of the company in the remediation of the bug, Lack of knowledge to fix the bug and only want to give an opinion when they have a basic idea about the fixing, or all of the above.
February 6, 2024 at 8:53 PM
Not all companies act this way, I've had experience with few but I've had it, and it doesn't make any sense for a company to create a bug bounty program when they can't afford even simple feedback on a critical vulnerability.
February 6, 2024 at 8:47 PM
It's wrong but sometimes I think: I'm going to do vulnerability disclosure on some discord server or even on github, the company that takes responsibility for being immature when all their server infrastructure is in my hands.
February 6, 2024 at 8:44 PM
I mean, the entire server of the company is in my hands and they behave like it's nothing?
February 6, 2024 at 8:38 PM
Of course it's not right but sometimes I come across situations like: Dude I just got a shell via sqli and the company takes 4 days to get back to me? If it fell into the wrong hands, it would wipe out the entire company's server.
February 6, 2024 at 8:37 PM
And there are also companies with very specific segments, which almost no one knows about, or are only active in a certain country that have an exemplary conduct on platforms such as hackerone, for example.
February 6, 2024 at 8:33 PM
It's natural to be inclined by the size of the company when choosing a bug bounty program. But there are companies that consider large companies that in the matter of bug bounty feedback look like start-ups with 3 days of existence.
February 6, 2024 at 8:32 PM
Unfortunately, there is no direct correlation between a big tech company and its feedback rate on bug bounty platforms.
February 6, 2024 at 8:30 PM
It's like condemning fire as a negative technology just because there can be fires.
January 12, 2024 at 4:01 PM
Ok, in many cases "mixing" is done for negative purposes like money laundering. But, in this case, the tech is neutral. So it's not very cool for a government to condemn such an approach as something illegal.
January 12, 2024 at 4:00 PM
And i don't why this is illegal considering my freedom.
January 12, 2024 at 3:58 PM
I mean i buy 100 phisical wallets and decide put 1 cent in each one, after that, lets suppose i create a clone of my self, i take 100 cents and divide this coin in my 100 phisical wallets. In the end each wallet will have 2 cents, from my own and from my clone. This is a mixed transaction.
January 12, 2024 at 3:57 PM
If i create a pool mirroring myself with 100 nodes, all the nodes are my self and i decide to mixing my transactions, Why many govs consider this illegal?
January 12, 2024 at 3:55 PM
If you transfer your cripto tokens to your many wallets, and after again again again, but it's your wallets and you have right to do this, is this wrong? Ok cripto "mixers" mix different user's transactions to make difficult the tracking, but if all the users in the mixing is you?
January 12, 2024 at 3:53 PM
Thanks
January 9, 2024 at 1:27 PM
Considerations for creators and contributors 🫶 - github.com/tomnomnom/wa...
github.com/lc/gau
January 9, 2024 at 1:27 PM
However, for simpler scopes I still use WayBackURLs and it has never let me down.
January 9, 2024 at 1:25 PM
Therefore, nowadays I use gau (lc) more than WayBackURLs (tomnomnom).
January 9, 2024 at 1:25 PM
It's like setting a sniper environment in a "generalist" scope where there is much more predominance of specific content than simply working with "random" URLs
January 9, 2024 at 1:24 PM
Combining gau with other tools and using these additional sets the range of obtaining "quality URLs" increases dramatically.
January 9, 2024 at 1:22 PM
So, continuing, gau has many more additional settings integrated, running the command gau -h you will see: --blacklist, --fc strings, --fp, --from string, --ft, -- json, --mc strings, --mt strings, --o string, --providers, --proxy, --retries, --subs, --threads, -timeout, --verbose and --version
January 9, 2024 at 1:21 PM