./Mr-Dark

261 posts

./Mr-Dark banner
./Mr-Dark

./Mr-Dark

@Mr_Dark55

Bug Bounty | Pentester | Ethical Hacking | 孤独が私の中に染み込んでほしい。🖤

Katılım Nisan 2024
57 Takip Edilen5.3K Takipçiler
Sabitlenmiş Tweet
./Mr-Dark
./Mr-Dark@Mr_Dark55·
Bypassing WAF through a large number of characters is a successful method
English
16
162
876
60.5K
./Mr-Dark
./Mr-Dark@Mr_Dark55·
A tool that performs automated reconnaissance on a target domain by running the best set of tools to scan and find vulnerabilities reconFTW performs various vulnerability scans like XSS Open Redirect SSRF CRLF LFI SQLi SSL Tests SSTI DNS Zone Transfer and github.com/six2dez/reconf…
./Mr-Dark tweet media
English
0
3
15
1.7K
./Mr-Dark
./Mr-Dark@Mr_Dark55·
assetfinder fitbit.com | httpx -threads 300 -follow-redirects -silent | rush -j200 'curl -m5 -s -I -H "Origin: evil.com" {} | [[ $(grep -c "evil.com") -gt 0 ]] && printf "\n\033[0;32m[VUL TO CORS] \033[0m{}"' 2>/dev/null
English
0
0
8
874
./Mr-Dark
./Mr-Dark@Mr_Dark55·
For example, if the victim is a site administrator, the attacker can gain high-level access by changing their email or account password.
English
0
0
1
606
./Mr-Dark
./Mr-Dark@Mr_Dark55·
Cross-site request forgery (CSRF) occurs when an attacker forces a user to send a request that they did not intend to send. This vulnerability can easily bypass the same origin policy. In this attack, the attacker can cause the victim to make unwanted changes.
./Mr-Dark tweet media
English
1
1
4
815
./Mr-Dark
./Mr-Dark@Mr_Dark55·
Caching on CDN Caching means storing a copy of the data somewhere. Now this storage can be in the browser, DNS, CDN, etc. But when data is cached, there may be vulnerabilities, I will write an article about this t.me/ExploitQuest
./Mr-Dark tweet media./Mr-Dark tweet media
English
0
1
7
952
./Mr-Dark
./Mr-Dark@Mr_Dark55·
Great article
./Mr-Dark tweet media
English
0
3
6
798
./Mr-Dark
./Mr-Dark@Mr_Dark55·
Prototype Pollution is a security vulnerability in JavaScript that allows an attacker to add arbitrary properties to the prototype the root object) of a general object This enables an attacker to modify object properties that would typically be inacesible t.me/ExploitQuest/2…
English
14
11
61
6.7K
./Mr-Dark
./Mr-Dark@Mr_Dark55·
🚀 MSSQL Misconfigurations = Big Security Risks! Many underestimate Microsoft SQL Server as an attack vector. But if misconfigured, it can be an easy entry point for attackers! 🔹 Privilege escalation from local admin → sysadmin t.me/ExploitQuest/2…
./Mr-Dark tweet media
English
0
0
8
946
./Mr-Dark
./Mr-Dark@Mr_Dark55·
Leaking Sensitive Data for an Egyptian University Sensitive data from the website psu.edu.eg has been leaked, including: 🔹 Names and personal information 🔹 Primary and secondary email addresses 🔹 National IDs and passwords 🔹 Academic records
./Mr-Dark tweet media
English
2
1
5
1.7K
./Mr-Dark
./Mr-Dark@Mr_Dark55·
Privilege Escalation – The full explanation is available on my Telegram channel. t.me/ExploitQuest/2…
English
1
37
278
17.3K
./Mr-Dark
./Mr-Dark@Mr_Dark55·
@EdH4ck No one also cared and found more than a million and a half data such as E -mail, name, phone number and password .....
English
1
0
0
54
./Mr-Dark
./Mr-Dark@Mr_Dark55·
I have discovered a vulnerability in a website that allows privilege escalation from a regular user to an admin. I will explain how to exploit this vulnerability and provide technical details on my Telegram channel t.me/ExploitQuest
./Mr-Dark tweet media./Mr-Dark tweet media
English
1
0
33
2.9K
./Mr-Dark
./Mr-Dark@Mr_Dark55·
Today my birthday ♥.
./Mr-Dark tweet media
English
8
0
27
2K
HAIDER
HAIDER@UzairHaider502·
@Mr_Dark55 Happy Birthday Mate🖤✨
English
1
0
1
33