sh

142 posts

sh banner
sh

sh

@_shellehs_

India Katılım Şubat 2019
1.1K Takip Edilen24 Takipçiler
sh retweetledi
Ben Sadeghipour
Ben Sadeghipour@NahamSec·
Giveaway and new course 🚨 I just released a nuclei course and we have made it a part of our Black Friday bundle. You can get all of our courses for the price of one. 🎁I’ll give some away. All you gotta do is RT & reply with which bundle you want! hhub.io/BugBountyBundl…
Ben Sadeghipour tweet media
English
175
147
276
26.6K
sh retweetledi
Ben Sadeghipour
Ben Sadeghipour@NahamSec·
🚨 Doing a giveaway for my Blind XSS Masterclass Most people think they know XSS, until they meet blind XSS, the kind that fires where you’ll never see it. Same methods that helped me earn $250K+ from real reports. hhub.io/nahamsecbxss 🎁 Retweet and reply to enter.
Ben Sadeghipour tweet media
English
391
377
725
76.9K
bugcrowd
bugcrowd@Bugcrowd·
$1,000 GIVEAWAY 🎁‼️ Here’s how to enter: 1️⃣ Fill out the ITMOAH survey 2️⃣ Like this post 3️⃣ Comment your fave tool 4️⃣ Repost bc your friends deserve a chance too Giveaway closes Sept 30 at 11:59pm ET. One hacker takes home $1K. 20 others will score $200 each. Already filled out the survey? You’re entered to win! If not, now's your chance: surveymonkey.com/r/bugcrowd-itm…
bugcrowd tweet mediabugcrowd tweet media
English
419
317
683
60.6K
sh retweetledi
Kirill Firsov
Kirill Firsov@k_firsov·
#bugbountytips Bypass CloudFlare Rate-Limit Ever struggled with CloudFlare rate-limiting when brute-forcing endpoints during your bug bounty research? A simple yet effective bypass is right there in CloudFlare’s documentation — specifically, leveraging the _cfuvid cookie. 1. Send initial requests to your target domain (e.g., target.example.com) to generate multiple _cfuvid cookies. 2. Save these cookies. Remember that _cfuvid cookies are bound to both IP address and user-agent, so ensure consistency to maintain cookie validity. 3. Randomly use the collected cookies when performing endpoint enumeration at scale (e.g., with 1000 threads). This technique helps you avoid hitting rate limits, significantly improving your enumeration process. #bugbounty #CFbypass #cloudflare
Kirill Firsov tweet media
English
1
25
107
6.2K
sh
sh@_shellehs_·
@xitsec Kya rank hai? Let's play xD
English
1
0
1
66
xit! 🇮🇳
xit! 🇮🇳@xitsec·
Waiting for the bouties by playing cs2 whole day ! The only thing that can let my frustration go
English
2
0
23
1.9K
sh retweetledi
Gareth Heyes \u2028
Gareth Heyes \u2028@garethheyes·
Someone posted on Twitter about a CTF where you could use "." in the protocol now. So I fuzzed it: shazzer.co.uk/vectors/6819f0… Let me know if it was you and I'll update the description with the link. I couldn't find it anywhere.
English
1
6
52
2.4K
sh retweetledi
André Baptista
André Baptista@0xacb·
Bug bounties ain't just web. Throwback to when @kernelpaniek and I got RCE on Steam Client via a buffer overflow in Server Browser 🚨 Root Cause: 🎯 Wide-char conversion without boundary checks inside serverbrowser.dll leading to stack corruption Exploit: 🪲 Crafted oversized Unicode player name payload 🪲 Unicode-compatible ROP chain built from Steam.exe gadgets 🪲 Dynamic call to VirtualProtect to mark stack executable 🪲 Shellcode launches cmd.exe Impact: 💥 Remote code execution (RCE) on Windows 🤔 Partial control on Linux (2 bytes of EIP) 🤔 SIGABRT on macOS (due to canaries) Delivery: 📦 User tries to connect to a CS game via Steam client 📦 User visits malicious webpage triggering Steam protocol handler Tools: 🛠️ Python for UDP server and payload generation 🛠️ Immunity Debugger for base address retrieval 🛠️ Steam Server Query documentation for packet crafting Read the full report: hackerone.com/reports/470520
André Baptista tweet media
English
4
59
348
22.7K
sh retweetledi
Kévin GERVOT (Mizu)
Kévin GERVOT (Mizu)@kevin_mizu·
I'm very happy to finally share the second part of my DOMPurify security research 🔥 This article mostly focuses on DOMPurify misconfigurations, especially hooks, that downgrade the sanitizer's protection (even in the latest version)! Link 👇 mizu.re/post/exploring… 1/2
English
4
102
359
36.8K
sh
sh@_shellehs_·
@yeswehack Black hoodie ♥️
English
0
0
0
8
YesWeHack ⠵
YesWeHack ⠵@yeswehack·
Today, we’re celebrating love by offering some swag! 😍 To take part, make sure to follow us & comment which item you prefer from the pic 👇 We’ll draw two winners (one on X, one on LinkedIn – so you can maximise your chances) on Monday, 10am CET. Happy Valentine’s Day! 💖
YesWeHack ⠵ tweet media
English
239
18
241
20.4K
sh retweetledi
d4d
d4d@zakfedotkin·
Introducing the Cookie Sandwich, a tasty technique to steal HttpOnly cookies using legacy RFC features: portswigger.net/research/steal…
English
2
92
265
29.5K
sh retweetledi
MrBeast
MrBeast@MrBeast·
BEAST GAME EPISODE 3 IS OUT NOW! To celebrate, I'm giving away $100,000 total to 10 random people who like and retweet this post! Go watch it here: amazon.com/beastgames
English
15.8K
111.9K
165K
13.1M
sh retweetledi
RyotaK
RyotaK@ryotkak·
I recently developed and posted about a technique called "First sequence sync", expanding @albinowax's single packet attack. This technique allowed me to send 10,000 requests in 166ms, which breaks the packet size limitation of the single packet attack. flatt.tech/research/posts…
English
15
245
797
121.9K
sh retweetledi
JS0N Haddix
JS0N Haddix@Jhaddix·
⚠️ Giveaway ⚠️ Want to learn modern reconnaissance and hacking skills? Join The Bug Hunter's Methodology Cohort 5! October 2nd, 3rd, 4th - jhaddix.gumroad.com/l/kihwd Like and retweet this post for a chance to win a free seat! Five winners will be announced on Sept 1st!
English
112
670
1K
102.7K
sh
sh@_shellehs_·
@nanditathhakur Hello ma'am, can you DM please 🙏
English
0
0
0
16
Bhanu
Bhanu@bhanu_in_tech·
@teatrunk I have placed order long ago no updates "RLS/20-21/32701" is order number and no response from customer support as well....doesn't sound unprofessional?
English
1
0
0
0