Sub_Zero

42 posts

Sub_Zero banner
Sub_Zero

Sub_Zero

@Subzxero

فأنا كأشجار الصفصافْ أموتُ دائماً .. وأنا واقفٌ على قدميْ

Katılım Mart 2023
732 Takip Edilen58 Takipçiler
Sub_Zero
Sub_Zero@Subzxero·
@awais0x1 Can you share with me the vulnerable site to bypass the WAF manually without using cookies?
English
0
0
0
430
Sub_Zero
Sub_Zero@Subzxero·
@j6_mu تم حل تحدي sql 💉💪💉رائع بالتوفيق
Sub_Zero tweet media
العربية
1
0
1
29
Sub_Zero
Sub_Zero@Subzxero·
@_casper0x The best dream from the first time in the report always when reporting a SQL injection vulnerability to prove the real concept to them you must extract: database names database version and database hostname
English
0
0
1
226
Casper0x
Casper0x@_casper0x·
SQLi allowed database enumeration and dumping, Still a bit weird the report was closed as Informative sqlmap -r r.txt --eval="import base64; payload_part='select 1 where 1=1'; GUID='x%27 or length(payload_part)=0'; del payload_part" #bugbounty #sqli #hackerone #bugbountytips
Casper0x tweet media
English
7
9
162
7.4K
Jenish Sojitra
Jenish Sojitra@_jensec·
Sharing my Burp Extension that earned me $200k in 2025 while API testing heavy JS-rich targets. github.com/jenish-sojitra… The tool helps find endpoints, files, internal emails, and some secrets from minified JS. Its goal is to achieve maximum efficiency with reduced noise in results. Contributions and feedbacks are welcome.
Jenish Sojitra tweet media
English
39
410
2.3K
126.2K
Sub_Zero
Sub_Zero@Subzxero·
@malekmesdour جميل جدا واصل اخي بالتوفيق
العربية
0
0
1
195
ryuku
ryuku@malekmesdour·
I found an SQLi on the main app and I was able to execute any SQL function. They “fixed” it in two days and downgraded it to High, saying it was “read-only”💀 Anyway, below how I bypassed the WAF using parameter pollution #BugBounty #bugbountytips
ryuku tweet media
English
12
32
437
31.9K
Sazouki 🇹🇳🚬
Sazouki 🇹🇳🚬@Sazouki_·
F5 SQLi WAF BYPASS ‘ or (select ‘sqli’) = ‘sqli // blocked ‘ || not (select ‘sqli’) like ‘s% // bypassed #F5 #sqli #BugBounty
English
1
12
113
7.9K
Sub_Zero
Sub_Zero@Subzxero·
@dk4trin @inspectiv @theWeertic 💉 Manual SQL Injection Challenge without tools, bypassing 🛡 Sucuri WAF and GoDaddy WAF Without using the Real IP method, as it's not always effective and lacks any fun 🌐 Website link: worldplants.ca
Sub_Zero tweet media
English
0
0
0
8
Wesley Santos
Wesley Santos@dk4trin·
huge thanks to @inspectiv aos poucos voltando + collab @theWeertic top top top shortscan > fuzzing > persistence fuzzing (+ theWeertic's tools)
Wesley Santos tweet media
English
11
12
298
12.2K
khan mamun
khan mamun@mamunwhh·
SQL Injection #bugbounty https://example. com/product.php?id=1 Append a single quote (') to the URL:http://example. com/product.php?id=1' If an error message like SQL syntax error appears, the input is vulnerable.
English
13
11
156
12.7K
blackd3v
blackd3v@black_d3v·
Hi everyone! As part of the ALX program, I'm reflecting on my journey in 2023. This year has been a whirlwind of learning, challenges, and incredible growth, not just in my technical skills but also in my approach to problem-solving and collaboration.#FacesofALXSE #ALX_SE_2023
English
2
0
0
52
Pushpak Pawar
Pushpak Pawar@PushpakPawar_11·
Hi @UBS, I’ve discovered a critical XSS vulnerability in your system and found other severe vulnerabilities. I reported this via email but haven’t received a response. Can you connect me with your web app security team?
English
1
0
3
202