RootMoksha Labs

1K posts

RootMoksha Labs banner
RootMoksha Labs

RootMoksha Labs

@RootMoksha

Cybersecurity focussed Bitcoin venture studio

Katılım Kasım 2023
1 Takip Edilen6.8K Takipçiler
RootMoksha Labs
RootMoksha Labs@RootMoksha·
403 bypass methodology ! 1- using space symbols exmaple: /admin -> 403 /admin%09 -> 200 /admin%20 -> 200 2- use traversal Example: /admin -> 403 /..;/admin -> 200 you can fuzz with traversal sometimes that's end with results Example: /..;/FUZZ #bugbountytips by @viehgroup
RootMoksha Labs tweet media
English
0
52
245
10K
RootMoksha Labs
RootMoksha Labs@RootMoksha·
Subdomain Enumeration Using Web Archive This Bash function extracts subdomains from Web Archive results! Add it to your ~/.bashrc: function wayback() { curl -sk "web.archive.org/cdx/search/cdx…" | awk -F/ '{gsub(/:.*/, "", $3); print $3}' | sort -u } By: @Sp1x0r #BugBountyTips
English
0
10
37
1.7K
RootMoksha Labs
RootMoksha Labs@RootMoksha·
If you come across a Windows IIS server, definitely scan the shortname and try to obtain the files by fuzzing, this may allow you to find vulnerabilities like 'CVE-2024-39677: NHibernate SQL Injection Vulnerability ' By:@ynsmroztas #BugBounty #bugbountytips
RootMoksha Labs tweet media
English
1
38
186
9.7K
RootMoksha Labs
RootMoksha Labs@RootMoksha·
Google Dorks - Code Leaks site:pastebin. com "example. com" site:jsfiddle. net "example. com" site:codebeautify. org "example. com" site:codepen. io "example. com" Credits: @TakSec #BugBounty #bugbountytips
RootMoksha Labs tweet media
English
1
22
113
6.3K