MHD

1.7K posts

MHD banner
MHD

MHD

@MhdAsfan

Security Researcher | Web Dev | CTF Player #web3 الحمد لله

WEB Katılım Mart 2021
716 Takip Edilen247 Takipçiler
MHD retweetledi
Vivek | Cybersecurity
Vivek | Cybersecurity@VivekIntel·
Top 60 Hacker Search Engines 💀🔥 1.🌐Shodan 2.📡Censys 3.🔍Onyphe 4.👁️ZoomEye 5.⚙️GreyNoise 6.🛰️Natlas 7.🌍Netlas 8.🧭FOFA 9.📚NIST NVD 10.🧪osv.dev 11.🔓opencve 12.🧠VulnIQ 13.📊Vulmon 14.🗂️VulDB 15.💥Sploitus 16.📰Oday .today 17.⚒️LOLBAS 18.🧰GTFOBins 19.🎯FullHunt 20.💻grep .app 21.🔎SearchCode 22.🤓NerdyData 23.📧Hunter.io 24.🔗SynapsInt 25.☁️skymem 26.🧑ThatsThem 27.🌎Omnisint 28.🧩Riddler 29.🌐RobTex 30.🏗️BuiltWith 31.🔗URLScan 32.🌪️Chaos 33.📡DNSdb 34.📈DNSviz 35.🧾C99.nl 36.🔐crt .sh 37.📶Wigle 38.📍wifimap 39.📡wifispc 40.🌐mylnikov 41.🔑Dehashed 42.🗄️Snusbase 43.🔨HashKiller 44.🕶️AHMIA 45.🧅tor.link 46.🌏Google 47.🇷🇺Yandex 48.🔎Bing 49.🎥Insecam 50.🧠ORKL 51.🧫tria .ge 52.💧leakix 53.📁filesec 54.⚠️malapi 55.📞TellowS 56.🔄sync.me 57.☎️SpyDialer 58.💣ExploitDB 59.🚀Rapid7 DB 60.🖼️TinEye #OSINT #CyberSecurity #Recon #InfoSec
English
2
175
822
27.2K
MHD retweetledi
VIEH Group
VIEH Group@viehgroup·
GraphQL Introspection Misconfiguration to Sensitive Data Exposure POC → 1. While testing a GraphQL endpoint, noticed introspection queries were enabled in production 2. Sent an introspection query to map the full schema 3. Discovered hidden queries related to internal user and admin data 4. Modified the query to fetch user email, roles, and internal metadata 5. Server returned sensitive data without proper authorization checks 6.This allowed attackers to enumerate users and access restricted information Learning → - GraphQL introspection should be disabled in production environments - Always enforce authorization on every resolver - Hidden schema endpoints often expose internal business logic #infosec #hacking #hacker #bugbounty #bugbountytips
VIEH Group tweet mediaVIEH Group tweet mediaVIEH Group tweet media
English
0
7
77
3.7K
MHD retweetledi
Burp Suite
Burp Suite@Burp_Suite·
🔍 Testing an application with a GraphQL API? Learn about common GraphQL vulnerabilities over at the Web Security Academy, and then scan your app with Burp Suite Professional or Burp Suite Enterprise Edition to find GraphQL bugs automatically. #graphql portswigger.net/web-security/g…
English
0
8
44
9.5K
MHD retweetledi
bugcrowd
bugcrowd@Bugcrowd·
SecLists is a security tester’s best companion. From usernames and passwords to URLs, payloads, web shells, and sensitive data patterns, it covers almost every recon need. Use SecLists in your workflow to automate more and find more bugs. 🐞
bugcrowd tweet media
English
0
5
71
4K
MHD retweetledi
Intigriti
Intigriti@intigriti·
| ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄| every successful hacker had to start somewhere |______________| \ (•◡•) / \ / —— | | |_ |_
English
22
53
457
13.6K
MHD retweetledi
obscaries ❘ AppSec
obscaries ❘ AppSec@obscaries·
Bug bounty tip 🔥 Most people stop at subdomain enum… real hunters go further ↓ Take your subs → generate permutations → resolve → profit 💰 Tools you should be using: • Altdns: github.com/infosec-au/alt… • dnsgen: github.com/AlephNullSK/dn… • gotator: github.com/Josue87/gotator • shuffledns: github.com/projectdiscove… Pro move 🧠 Use target-specific words (from JS, GitHub, Wayback) instead of generic lists → this is where hidden assets live Enumeration finds surface. Permutations find gold. 🔥 #BugBounty #BugBountyHunter #InfoSec #CyberSecurity #Recon
obscaries ❘ AppSec tweet media
English
4
57
277
10.5K
MHD retweetledi
Illex
Illex@pcuco92·
The Spring Boot Actuators can expose some sensitive informations like env vars, heap dumps, configs, and internal metrics And sometimes, with simple bypass tricks we can find them: actuator/env;.. ;/actuator/env actuator;/env actuator/env%00 actuator/env; ..;/actuator/env static../actuator/env actuator/health/..;/env #bugbounty #bugbountytips #cybersecurity
English
2
38
190
9.9K
MHD retweetledi
Tib3rius
Tib3rius@0xTib3rius·
I saw this on LinkedIn. The AWASP Top Ten, a "vibe-researched and vibe-coded" alternative to the OWASP Top Ten. awasp.org It's...interesting to say the least. 😅 Credit: linkedin.com/posts/chris-wa…
English
7
42
225
19.3K
MHD retweetledi
bugcrowd
bugcrowd@Bugcrowd·
Next up: Hacking OAuth (Open Authorization) 🔓 You see "Log in with Google/GitHub" everywhere. To a user, it’s convenience. To a hacker, it’s a direct path to Account Takeover (ATO). If you understand the flow, you can steal the tokens to the kingdom without ever touching a password. Let's get into it. 🧵👇
bugcrowd tweet media
English
3
43
276
11.7K
MHD retweetledi
obscaries ❘ AppSec
obscaries ❘ AppSec@obscaries·
Modern front-end frameworks escape HTML by default 🛡️ — but the moment you bypass that protection, the risk becomes yours ⚠️ This SonarSource research shows how a sanitization bypass combined with a client-side path traversal flaw led to a real XSS in a finance application 💥 A great reminder that impactful exploits often come from chaining multiple small issues together. 🔗 sonarsource.com/blog/front-end… #AppSec #BugBounty #XSS #WebSecurity
obscaries ❘ AppSec tweet media
English
1
4
14
637
MHD retweetledi
Omar Abdelsalam
Omar Abdelsalam@lex_is1·
🐞List of localhost addresses for SSRF bypass http://localhost http://127.1 [http://127.0.0.0](http://127.0.0.0/) http://2130706433 http://0177.1 http://0x7f.1 http://127.000.000.1 http://localtest .me http://[::1] http://[::] #bugbountytips
English
0
15
97
3K
MHD retweetledi
Behi
Behi@Behi_Sec·
Recon is boring. Reading the API docs is boring. Testing every single edge-case you know is boring. If you want to find bugs, do boring.
English
9
32
265
8.6K