DinDinDin
83 posts


On SPA apps (React/Vue/Angular), use Burp Match & Replace to swap all "false" to "true" in JSON responses.
The result ? Hidden admin panels, debug modes, and restricted UI features can appear. 🔓
Don't just test the API, explore the UI! 🛡️
#Infosec #WebSecurity #BurpSuite #BugBounty #Pentest
English
DinDinDin أُعيد تغريده

How to bypass WAF on HTML tag with attributes. Another great scheme by @hackerscrolls. #infosec #CyberSecurity #bugbountytip #ethicalhacking

English

🔥 XSS Tip: Raw HTML response vs Browser DOM
When a XSS payload is reflected and filtered in a HTML response, always verify it in the DOM as well.
Why? In the raw HTML response, your payload might look safely filtered or encoded. However, once it reaches the DOM, it can still execute due to JavaScript processing (client-side rendering).
Don't just trust the raw bytes in Burp — trust the DOM 🔍!
#BugBounty #XSS #Pentest #Infosec #WebSecurity #BurpSuite
English

🔥 XSS Tip: Unicode Normalization
Don't give up if <, >, " or ' are filtered ! Many apps normalize Unicode after the WAF/security layer.
Some bypass variants (URL-encoded):
🔹 < ➔ %EF%BC%9C
🔹 > ➔ %EF%BC%9E
🔹 " ➔ %EF%BC%A2
🔹 ' ➔ %EF%BC%87
🔹 ` ➔ %EF%BD%80
For example, inject %EF%BC%9Cscript%EF%BC%9E and check if it reflects as
