haxshadow
4.22K subscribers
85 photos
1 video
27 files
139 links
ᴛʜɪs ᴄʜᴀɴɴᴇʟ ɪs ᴀʟʟ ᴀʙᴏᴜᴛ Bᴜɢ ʜᴜɴᴛɪɴɢ ﹠ Cʏʙᴇʀsᴇᴄ ﹠ Eᴛʜɪᴄᴀʟ Hᴀᴄᴋɪɴɢ ʀᴇʟᴀᴛᴇᴅ ᴄᴏɴᴛᴇɴᴛs.
any query msg me at @haxshadow_bot
Youtube:https://youtube.com/@haxshadow7
IF you want to support ;)
Download Telegram
113
𝗪𝗼𝗿𝗱𝗣𝗿𝗲𝘀𝘀 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗧𝗲𝘀𝘁𝗶𝗻𝗴

𝖨𝖿 𝗍𝗁𝖾 𝗍𝖺𝗋𝗀𝖾𝗍 𝗌𝗂𝗍𝖾 𝗋𝗎𝗇𝗌 𝗈𝗇 𝖶𝗈𝗋𝖽𝖯𝗋𝖾𝗌𝗌, 𝖾𝗇𝗎𝗆𝖾𝗋𝖺𝗍𝖾 𝗎𝗌𝖾𝗋𝗌, 𝗉𝗅𝗎𝗀𝗂𝗇𝗌, 𝗍𝗁𝖾𝗆𝖾𝗌 𝖺𝗇𝖽 𝗏𝖾𝗋𝗌𝗂𝗈𝗇 𝖽𝖾𝗍𝖺𝗂𝗅𝗌. 𝖳𝗁𝗂𝗌 𝗁𝖾𝗅𝗉𝗌 𝗂𝖽𝖾𝗇𝗍𝗂𝖿𝗒 𝗈𝗎𝗍𝖽𝖺𝗍𝖾𝖽 𝖼𝗈𝗆𝗉𝗈𝗇𝖾𝗇𝗍𝗌, 𝗆𝗂𝗌𝖼𝗈𝗇𝖿𝗂𝗀𝗎𝗋𝖺𝗍𝗂𝗈𝗇𝗌 𝖺𝗇𝖽 𝗉𝗈𝗍𝖾𝗇𝗍𝗂𝖺𝗅 𝖺𝗍𝗍𝖺𝖼𝗄 𝗏𝖾𝖼𝗍𝗈𝗋𝗌 𝗌𝗎𝖼𝗁 𝖺𝗌 𝗏𝗎𝗅𝗇𝖾𝗋𝖺𝖻𝗅𝖾 𝗉𝗅𝗎𝗀𝗂𝗇𝗌 𝗈𝗋 𝖾𝗑𝗉𝗈𝗌𝖾𝖽 𝖺𝖽𝗆𝗂𝗇 𝗉𝖺𝗇𝖾𝗅𝗌.

𝚠𝚙𝚜𝚌𝚊𝚗 --𝚞𝚛𝚕 𝚑𝚝𝚝𝚙𝚜://𝚜𝚒𝚝𝚎.𝚌𝚘𝚖 --𝚍𝚒𝚜𝚊𝚋𝚕𝚎-𝚝𝚕𝚜-𝚌𝚑𝚎𝚌𝚔𝚜 --𝚊𝚙𝚒-𝚝𝚘𝚔𝚎𝚗 <𝚑𝚎𝚛𝚎> -𝚎 𝚊𝚝 -𝚎 𝚊𝚙 -𝚎 𝚞 --𝚎𝚗𝚞𝚖𝚎𝚛𝚊𝚝𝚎 𝚊𝚙 --𝚙𝚕𝚞𝚐𝚒𝚗𝚜-𝚍𝚎𝚝𝚎𝚌𝚝𝚒𝚘𝚗 𝚊𝚐𝚐𝚛𝚎𝚜𝚜𝚒𝚟𝚎 --𝚏𝚘𝚛𝚌𝚎

-𝒆 𝒂𝒕: 𝑬𝒏𝒖𝒎𝒆𝒓𝒂𝒕𝒆 𝒂𝒍𝒍 𝒕𝒉𝒆𝒎𝒆𝒔
-𝒆 𝒂𝒑: 𝑬𝒏𝒖𝒎𝒆𝒓𝒂𝒕𝒆 𝒂𝒍𝒍 𝒑𝒍𝒖𝒈𝒊𝒏𝒔
-𝒆 𝒖: 𝑬𝒏𝒖𝒎𝒆𝒓𝒂𝒕𝒆 𝒖𝒔𝒆𝒓𝒔
-- 𝒑𝒍𝒖𝒈𝒊𝒏𝒔-𝒅𝒆𝒕𝒆𝒄𝒕𝒊𝒐𝒏 𝒂𝒈𝒈𝒓𝒆𝒔𝒔𝒊𝒗𝒆: 𝑨𝒈𝒈𝒓𝒆𝒔𝒔𝒊𝒗𝒆 𝒑𝒍𝒖𝒈𝒊𝒏 𝒅𝒆𝒕𝒆𝒄𝒕𝒊𝒐𝒏
-- 𝒇𝒐𝒓𝒄𝒆: 𝑭𝒐𝒓𝒄𝒆 𝒔𝒄𝒂𝒏 𝒆𝒗𝒆𝒏 𝒊𝒇 𝑾𝒐𝒓𝒅𝑷𝒓𝒆𝒔𝒔 𝒏𝒐𝒕 𝒅𝒆𝒕𝒆𝒄𝒕𝒆𝒅
114👍2
You can use dorking for information gathering. And by using this site you can find out different types of information gathering. Now it will be much easier so everyone can try this site at once.
try:https://shorturl.at/RmgDT
17🔥5
⚠️ 𝗔𝗽𝗽𝗹𝗲 𝗥𝘂𝘀𝗵𝗲𝘀 𝗣𝗮𝘁𝗰𝗵 𝗳𝗼𝗿 𝗖𝗿𝗶𝘁𝗶𝗰𝗮𝗹 𝟬-𝗗𝗮𝘆 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗶𝗹𝗶𝘁𝘆 𝗨𝗻𝗱𝗲𝗿 𝗔𝗰𝘁𝗶𝘃𝗲 𝗘𝘅𝗽𝗹𝗼𝗶𝘁𝗮𝘁𝗶𝗼𝗻

Apple has released an 𝗲𝗺𝗲𝗿𝗴𝗲𝗻𝗰𝘆 𝘂𝗽𝗱𝗮𝘁𝗲 (𝗶𝗢𝗦 𝟭𝟴.𝟲.𝟮 / 𝗶𝗣𝗮𝗱𝗢𝗦 𝟭𝟴.𝟲.𝟮) 𝘁𝗼 𝗳𝗶𝘅 𝗮 𝗰𝗿𝗶𝘁𝗶𝗰𝗮𝗹 𝗜𝗺𝗮𝗴𝗲𝗜𝗢 𝘃𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗶𝗹𝗶𝘁𝘆 (𝗖𝗩𝗘-𝟮𝟬𝟮𝟱-𝟰𝟯𝟯𝟬𝟬) that may have already been exploited in highly sophisticated targeted attacks.

📝 𝗔𝗯𝗼𝘂𝘁 𝘁𝗵𝗲 𝗳𝗹𝗮𝘄:
• Vulnerability: Out-of-bounds write in ImageIO → memory corruption risk
• Attack vector: Malicious image files can be weaponized to execute arbitrary code
• Impact: Full device compromise or unauthorized access to sensitive data
• Apple confirms the bug “may have been exploited in extremely sophisticated attacks against specific individuals.”

🔴 𝗔𝗳𝗳𝗲𝗰𝘁𝗲𝗱 𝗱𝗲𝘃𝗶𝗰𝗲𝘀:
• iPhone XS and later
• iPad Pro 13-inch / 12.9-inch (3rd gen+)
• iPad Pro 11-inch (1st gen+)
• iPad Air (3rd gen+)
• iPad 7th gen and later
• iPad mini (5th gen+)

⚠️ 𝗪𝗵𝗮𝘁 𝘆𝗼𝘂 𝘀𝗵𝗼𝘂𝗹𝗱 𝗱𝗼 𝗻𝗼𝘄:
• Install iOS 18.6.2 / iPadOS 18.6.2 immediately via 𝗦𝗲𝘁𝘁𝗶𝗻𝗴𝘀 → 𝗚𝗲𝗻𝗲𝗿𝗮𝗹 → 𝗦𝗼𝗳𝘁𝘄𝗮𝗿𝗲 𝗨𝗽𝗱𝗮𝘁𝗲
• The update takes around 15–30 minutes depending on device model and connection
• Delaying installation leaves your device open to active exploitation

#Apple #iOS #0Day #CVE202543300 #CyberSecurity #MSPDarkIntel
3
Live Bug Bounty: How to Find & Exploit CVEs Full Tutorial 2025.

In this video, I take you through a live bug bounty hacking session where I show:
How to find CVEs in real targets
Step-by-step exploit demonstration
Pro tips for bug bounty recon & exploitation
My live workflow used on real platforms

This isn’t just theory—it’s real-world bug bounty hacking, perfect for beginners and advanced hunters who want to learn CVE discovery and exploitation.
https://youtu.be/skdjzsl8Y5Q?si=iE8ZlNTvT9i8p9kd
310👍5
haxshadow
privit-templat.zip
Templeat
🔥4👍3🥰2
💡Don't miss this Fofa Dorks - PART 1

Here are some advanced FOFA dorks I use to uncover assets & exposures that others miss 👇

# ORG-WIDE / CERT PIVOTS
cert.subject="target.com" cert.subject="*.target.com"
cert.subject="
target.com" && protocol="https" && port="443"
domain="
target.com" cert.subject="target.com" header="target.com" # broad net

# DEV/STAGE/QA SURFACING (common env keywords)
domain="
target.com" && (host="dev.*" host="stg.*" host="qa.*" host="test.*")

# DIRECTORY LISTING / BACKUPS
domain="target.com" && title="Index of /" && body="Parent Directory"
domain="target.com" && (title="Index of /backup" title="Index of /backups" title="Index of /old")
domain="target.com" && (title="Index of /.git" body=".git/HEAD")
domain="
target.com" && (title="Index of /.svn" body="/.svn/entries")

# SECRETS/SPILLS IN TEXT/JS
domain="target.com" && header="Content-Type: application/javascript" && body="apiKey"
domain="target.com" && (body="AWS_ACCESS_KEY_ID" body="AKIA")
domain="
target.com" && body="APP_KEY=" # Laravel .env spill
domain="
target.com" && body="PRIVATE KEY-----" # PEM leaks
domain="
target.com" && body="eyJhbGciOi" # JWT in responses
domain="
target.com" && body="//# sourceMappingURL=" # JS source maps

# AUTH/SSO/OAUTH PIVOTS
domain="
target.com" && (body="/oauth/authorize" body="OpenID Connect" body="/.well-known/openid-configuration")

# CORS MISCONFIG (weak but good lead list)
domain="
target.com" && header="Access-Control-Allow-Origin: *" && header="Access-Control-Allow-Credentials: true"

# GRAPHQL / SWAGGER / API EXPLORERS
domain="
target.com" && (title="GraphQL Playground" title="GraphiQL" body="graphql?query=")
domain="
target.com" && (title="Swagger UI" body="swagger-ui" body="openapi")

# DEBUG / STACK TRACE FINGERPRINTS
domain="
target.com" && (title="Whitelabel Error Page" body="There was an unexpected error (type=)")
domain="target.com" && body="Traceback (most recent call last)"
domain="target.com" && (body="PHP Notice:" body="PHP Warning:" body="phpinfo()")

# CLOUD/EDGE FINGERPRINTS (useful for SSRF/CDN bypass trails)
domain="target.com" && header="X-Amzn-Trace-Id"
domain="target.com" && header="X-Envoy-Upstream-Service-Time"
domain="target.com" && header="Server: nginx" && header="Via: varnish"

# ELASTIC / LOGGING / METRICS / CI
domain="target.com" && (title="Kibana" || header="kbn-name")
domain="target.com" && title="Grafana" && body="Sign in"
domain="target.com" && title="Prometheus Time Series Collection and Processing Server"
domain="target.com" && title="Jenkins" && body="Login"
domain="target.com" && title="SonarQube"
👉 If you liked this workflow and want to do it all live inside Trainings :
123🥰2
failure-asp-xss.yaml
797 B
please support my chanal...
218
haxshadow
privit-templat.zip
Privit templat
6
We often do API key testing or API key hunting. But we don't know whether the API key is valid or not, you can use this tool. You can check whether the api key is active or not.
Testing Tool visits Now https://securitytoolkits.com/tools/api-key-tester
1🔥13👍53
Please open Telegram to view this post
VIEW IN TELEGRAM
7