Is your open URL redirect payload getting blocked? π§
Try one of these payloads to bypass it! π€
https://www.intigriti.com/researchers/blog/hacking-tools/open-url-redirects-a-complete-guide-to-exploiting-open-url-redirect-vulnerabilities
Try one of these payloads to bypass it! π€
https://www.intigriti.com/researchers/blog/hacking-tools/open-url-redirects-a-complete-guide-to-exploiting-open-url-redirect-vulnerabilities
β€7π3π₯2
Crazy Aliyun WAF Bypass:
cat /etc/hosts - triggers WAF
tac /etc/hosts - π§ββοΈ
Credit: @galnagli
#bugbountytips #bugbounty
cat /etc/hosts - triggers WAF
tac /etc/hosts - π§ββοΈ
Credit: @galnagli
#bugbountytips #bugbounty
π₯5π€¨3β€2π2πΏ2
Some will find their first bug in a week, while others might take months. Some will excel in recon, others in web exploitation. Itβs not about how fast you get thereβitβs about persistence, learning, and adapting. Every failed attempt is a step forward, every mistake a lesson.
So, donβt compare your journey to others. Focus on your progress. Keep hacking, keep improving, and most importantly, keep walking your own path. Success will follow.
Please open Telegram to view this post
VIEW IN TELEGRAM
β€25π5
Brut Security pinned Β«π Everyoneβs journey in bug bounty is unique. What worked for one hacker may not work for you, and thatβs okay. Your growth isnβt defined by someone elseβs timeline. You have your own challenges to face, your own lessons to learn, and your own way of masteringβ¦Β»
β‘Linkook - An OSINT tool for discovering linked social accounts and associated emails across multiple platforms using a single username.
β https://github.com/JackJuly/linkook
β https://github.com/JackJuly/linkook
π13π«‘3β€2
CVE-2024-47051: RCE in Mautic, 9.1 rating π₯
The vulnerability allows an attacker to conduct RCE through asset loading, as well as manipulate the file deletion process to delete arbitrary files.
Search at Netlas.io:
π Link: https://nt.ls/odIOX
π Dork: http.favicon.hash_sha256:67a5904d731636c114513a7df90d4d6bff7a3f690f305ef3487ac84844a5874e
Vendor's advisory: https://github.com/mautic/mautic/security/advisories/GHSA-73gx-x7r9-77x2
The vulnerability allows an attacker to conduct RCE through asset loading, as well as manipulate the file deletion process to delete arbitrary files.
Search at Netlas.io:
π Link: https://nt.ls/odIOX
π Dork: http.favicon.hash_sha256:67a5904d731636c114513a7df90d4d6bff7a3f690f305ef3487ac84844a5874e
Vendor's advisory: https://github.com/mautic/mautic/security/advisories/GHSA-73gx-x7r9-77x2
π7π±3
Please open Telegram to view this post
VIEW IN TELEGRAM
π15π₯5
When you test a Django, Rails, or NodeJs web app try the following payloads in the "Accept:" header.
Please open Telegram to view this post
VIEW IN TELEGRAM
π27β€18
A Huge Collection of Cybersecurity Tools and Resources!π‘οΈ
πinventory.raw.pm/resources.html
πinventory.raw.pm/resources.html
πΏ10π4π’1
Please open Telegram to view this post
VIEW IN TELEGRAM
π₯16π3π3
This media is not supported in your browser
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
π₯18π±12β€7π6
HUNTER : https://product.name="ManageEngine ADSelfService Plus"
FOFA : product="ManageEngine-ADSelfService-Plus"
SHODAN : title:"ADSelfService Plus"
https://manageengine.com/products/self-service-password/advisory/CVE-2025-1723.html
#hunterhow #infosec #infosecurity #OSINT #Vulnerability
Please open Telegram to view this post
VIEW IN TELEGRAM
π12π₯10β€2π³1
dON'T fORGET tO gIVE rEACTIONSπ π
Please open Telegram to view this post
VIEW IN TELEGRAM
π₯32β€12π€3
π¨ CVE-2025-25012 (CVSS 9.9): Critical Code Execution Vulnerability Patched in Elastic Kibana
πDorks:
HUNTER : https://product.name="Elastic Kibana"
FOFA : product="Kibana"
π°Refer:https://securityonline.info/cve-2025-25012-cvss-9-9-critical-code-execution-vulnerability-patched-in-elastic-kibana/
#Kibana#hunterhow #infosec #infosecurity #OSINT #Vulnerability
πDorks:
HUNTER : https://product.name="Elastic Kibana"
FOFA : product="Kibana"
π°Refer:https://securityonline.info/cve-2025-25012-cvss-9-9-critical-code-execution-vulnerability-patched-in-elastic-kibana/
#Kibana#hunterhow #infosec #infosecurity #OSINT #Vulnerability
π₯5β€3π±3