Offensive Twitter
19.1K subscribers
888 photos
47 videos
21 files
2.05K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
😈 [ NandanLohitaksh, Lohitaksh Nandan ]

Best ever Tools 🔧 for Bug Bounty Hunters...

→Amass
→Sublister
→Gauplus
→HTTPX
→Gf tool
→Kxss
→Sqlmap
→Commix
→Tplmap
→HYDRA
→John the ripper
→Burpsuite
→Arjun
→Paramspider
→NoSQLmap
→NMAP
→Nikto
→FFUF
→403-Bypass
→Gobuster

#bugbounty #cybersecurity

🐥 [ tweet ]
👍2
😈 [ clintgibler, Clint Gibler ]

🗒️ Awesome RCE Techniques

A list of techniques to achieve Remote Code Execution on various apps

Including:

CMS - Joomla, Wordpress

LMS - Moodle

Frameworks - JBoss, Tomcat

Other - GiTea, Jenkins

By @podalirius_

#bugbounty #bugbountytips

https://t.co/9kOdw4ammT

🔗 https://github.com/p0dalirius/Awesome-RCE-techniques

🐥 [ tweet ]
🔥2
😈 [ podalirius_, Podalirius ]

I published a tool to #bruteforce the key of @CodeIgniter's session #cookies, in order to sign arbitrary attacker-controlled cookies🍪

I wrote this tool for a use case encountered in #bugbounty recently, but we can find this in #pentest too.

https://t.co/7JIiYQskoG

🔗 https://github.com/p0dalirius/CodeIgniter-session-unsign

🐥 [ tweet ]
😈 [ ReconOne_, ReconOne ]

Shodan Dork in Manual mode - Part 1

Now that you all have Shodan membership it's time to try Shodan Dorks 👀👇

Credits: @securitytrails

#recon #Shodan #attacksurface #bugbountytips #BugBounty #cybersecurity

🐥 [ tweet ]
😈 [ ReconOne_, ReconOne ]

Have you ever looked for Open Redirects? Try this 👇 💣

#recontips #AttackSurface #bugbountytips #bugbounty #openredirect #recon #httpx

🐥 [ tweet ]
😈 [ HackerGautam, Frooti ]

Not only crawling but you can do Subdomain Enumeration using Wayback.

⬇️
curl --insecure --silent "https://web.archive.org/cdx/search/cdx" | sed -e 's_https*://__' -e "s/\/.*//" -e 's/:.*//' -e 's/^www\.//' | sed "/@/d" | sed -e 's/\.$//' | sort -u

#bugbounty #hacking #infosec

🐥 [ tweet ]
😈 [ 0x0SojalSec, Md Ismail Šojal ]

The shortest payload for a tiny php reverse shell written in 19 bytes using only non-alphanumeric characters. Hex values inside ⛶ indicate raw bytes.
This will help to bypass WAF and execute PHP reverse shell for RCE.
get more detail about this👇

🔗 https://gist.github.com/0xSojalSec/5bee09c7035985ddc13fddb16f191075

#bugbountyTips #bugbounty

🐥 [ tweet ]
😈 [ hetmehtaa, Het Mehta ]

Firefox Add-ons For Penetration Testers 🦊

#Infosec #Firefox #Bugbounty #TheSecureEdge

🐥 [ tweet ]
🔥1
😈 [ 0x0SojalSec, Md Ismail Šojal ]

just scan for subdomain without downloding the tools:

curl -s -L https://github.com/cihanmehmet/sub.sh/raw/master/sub.sh | bash -s webscantest.com

#infosec #bugbounty #cybersec

🐥 [ tweet ]
😈 [ securekomodo, Bryan Smith ]

Here is my python-based scanner to find #Citrix RCE. Leverages several fingerprinting techniques to accurately identify a remote Citrix servers version and detect if vulnerable to CVE-2023-3467. This is not an exploit PoC. Happy #bugbounty hunting :)

🔗 https://github.com/securekomodo/citrixInspector/

🐥 [ tweet ]
👍4