wh0am1

Tuesday, October 1, 2019

How i bypassed Messenger.com chatbox & sent malicious .svg which contains js

Greetz :)
Posted by Cho Ko at 5:43 PM No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: PenTest
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Popular Posts

  • Myanmar (Pyidaungsu) Font in Flutter
    Flutter app in testing myanmar fonts like Pyidaungsu font.
  • Our
    .:: ! Fucked #Junta ! ::. ...
  • Hello World
    Hello .. Buddy :) this is ak speaking -_-
  • The hacker can host on the malicious code at the #Github server hosting via shell.svg
    The hacker can host on the malicious code at the github server hosting via shell.svg file contains PHP codes  &  Exploited from g...
  • How i bypassed Messenger.com chatbox & sent malicious .svg which contains js
    Greetz :)
  • Testing on mongodb cloud with node api local
    With postman
  • List.generate in Flutter
    Row ( mainAxisAlignment : MainAxisAlignment . center , children : List . generate ( ...
  • Error Fix of SQLite datatables Not shown in SQLite DB Browser - 2019 aug 17
    Hello guys !! Today Im gonna show u how to check and see our datas in SQLite database .  2k19 Method. :) Lets chec...
  • Dell Inspiron 5447 Series with Core i7 Laptop TouchScreen Error Fixed
     Last 2 days... I upgraded my Ubuntu 21.04 to 21.10. Upgrading with internet with cool. But after installing process finished. I got shocked...
  • Minna no nihon n5

Labels

  • Flutter Myanmar
  • PenTest
  • Servers

Facebook

Blog Archive

  • ►  2021 (8)
    • ►  November (1)
    • ►  October (1)
    • ►  September (4)
    • ►  August (2)
  • ▼  2019 (5)
    • ▼  October (1)
      • How i bypassed Messenger.com chatbox & sent malici...
    • ►  September (2)
    • ►  August (2)
  • ►  2018 (2)
    • ►  November (1)
    • ►  June (1)

Contact Form

Name

Email *

Message *

Picture Window theme. Powered by Blogger.