SecList for CyberStudents
241 subscribers
598 photos
24 videos
211 files
909 links
Think outside the box
Download Telegram
Find hidden GET parameters in javascript files

assetfinder https://example.com | gau | egrep -v '(.css|.png|.jpeg|.jpg|.svg|.gif|.wolf)' | while read url; do vars=$(curl -s $url | grep -Eo "var [a-zA-Z0-9]+" | sed -e 's,'var','"$url"?',g' -e 's/ //g' | grep -v '.js' | sed 's/.*/&=xss/g'); echo -e "\e[1;33m$url\n\e[1;32m$vars"; done


#BugBountytip
👍1
Forwarded from Cat Seclist
[ Scopify - the "Netify" Reconnaissance Tool ]

Scopify is a Python command-line tool designed for penetration testers and bug bounty hunters to quickly gather and analyze infrastructure information (CDN, Hosting, SaaS) for a target company by scraping netify.

It optionally leverages OpenAI's API to provide AI-driven analysis of the gathered infrastructure, highlighting potential areas of interest and suggesting reconnaissance methodologies.


By Jason Haddix.

🔗Tool: https://github.com/Arcanum-Sec/Scopify
Forwarded from Whitehat Lab
⚙️ CVE-2025-34028 - Commvault Pre-Authenticated RCE

Path traversal уязвимость приводящая к выполнению произвольного кода (RCE) без аутентификации

▪️Отправляется HTTP-запрос на /commandcenter/deloyWebpackage.do, в результате чего Commvault получит ZIP-файл с внешнего сервера
▪️Содержимое архива разгружается во временный каталог
▪️Параметр ServicePack для path traversal в предварительно аутентифицированный каталог на сервере, например ../../Reports/MetricsUpload/shell
▪️SSRF через /commandcenter/deployWebpackage.do
▪️RCE через /reports/MetricsUpload/shell/.tmp/dist-cc/dist-cc/shell.jsp

Рейтинг CVSS - 9.0

Уязвимость устранена в версии 11.38

➡️ Research
➡️ Vendor
💻 PoC

#cve #rce #poc

✈️ Whitehat Lab
Please open Telegram to view this post
VIEW IN TELEGRAM
3.1 Shadow OSINT.pdf
5.3 MB
Information Leaks Users

#OSINT
Library of Leaks

Search by keyword (full name, email, company) in leaked documents, emails, tables, images and other files.

#OSINT