Jack Rendor

61 Followers
126 Following
228 Posts

Idk who I am yet, but I like #Memes, #Cats, automation and #CyberSecurity. I suffer from #PTSD. I have #ADD and #Autism, so plenty of fun! Neurodivergent also, in case my posts are not a good giveaway.

In my free time I play #VideoGames and I’m a #PenTester Security Researcher and a #Developer
I need people to follow to bright up my day. #fedi22

tootfinder

PronounsHe/Him
Websitehttps://jackrendor.dev
Bloghttps://blog.jackrendor.dev
GitHubhttps://github.com/jackrendor
Direct Contacthttps://signal.me/#eu/hrgcleR_PGp3RJox3Msf5i7vEkm3BLhvs9TVH6u-HF2hFxMVNrRF5KszvcJi1oYP

Today I sat down on my way to go grocery shopping and I saw those two beautiful pigeons.

Sadly, in Germany, you are not allowed to feed them. Just can’t feed pigeons, everything else is fine. That’s sad :c

Just to add to the thread, this is the path that gets excluded. So it’s under the user who runs the installer.

Apparently, by default, the installer for Heroku CLI adds the path "%LOCALAPPDATA%/heroku" to the "Windows Defender exclusion".

So it might be that the path won't be scanned for threats and malware.

#redteam #penetrationtest #malware

I really can't believe it but I'm not surprised at all. This is also the reason why I wanna build my own stuff and self-host everything.

So I did: https://github.com/jackrendor/xsscane

It's not much, but I find it cool.

I just have to specify the usage.

If the payload above succeeds, you get Cookies, DOM, URL of the website that the victim is on.

GitHub - jackrendor/xsscane

Contribute to jackrendor/xsscane development by creating an account on GitHub.

GitHub