top | item 37843711

(no title)

davidshepherd7 | 2 years ago

Yeah I think this is correct with the edit.

I guess this is mostly relevant for software that runs on shared infra, sends requests to a url provided by an attacker (e.g. webhooks), and uses a SOCKS5 proxy?

discuss

order

No comments yet.