Guax1

48 posts

Guax1

Guax1

@gu4x1_

aoba

Katılım Kasım 2021
103 Takip Edilen3 Takipçiler
Guax1 retweetledi
Md Ismail Šojal 🕷️
Md Ismail Šojal 🕷️@0x0SojalSec·
Use NextJS? Recon Tip by renniepak A quick way to find "all" paths for Next.js websites: DevTools->Console console.log(__BUILD_MANIFEST.sortedPages) javascript​:console.log(__BUILD_MANIFEST.sortedPages.join('\n')); #infosec #cybersec #bugbountytips
Md Ismail Šojal 🕷️ tweet media
English
6
251
1K
48.2K
Guax1 retweetledi
Yunus Emre Öztaş
Yunus Emre Öztaş@ynsmroztas·
if you get an error like this when you make a request "error on line 1 at column 1: Start tag expected, '<' not found" , you can get a lot of information by using curl -k -s --path-as-is -X GET https :// (domain).com/x/document(.jsp,otp,irs,php) command outside of SQL or XXE 🥰🌹 #bugbountytip #bugbountytips
Yunus Emre Öztaş tweet media
English
4
67
402
28.2K
Ben Sadeghipour
Ben Sadeghipour@NahamSec·
Final giveaway of the year🎁: 4️⃣Hand-On Web Exploitation (Course Only hhub.io/2024holidays) 3️⃣Shodan Codes 2️⃣Caido licenses 1️⃣Hands-On Web Exploitation (Certificate+Course Bundle) To enter drop a 🫶🏼and RT
Ben Sadeghipour tweet media
English
601
615
810
81.1K
Guax1 retweetledi
VAIDIK PANDYA
VAIDIK PANDYA@h4x0r_fr34k·
Hacking Drupal Want to Pentest Drupal Web Applications? 1. nahoragg.medium.com/chaining-cache… (Cache Poisioning to XSS) 2.@augustusphyras/ultimate-drupal-security-checklist-15d0425b04a4" target="_blank" rel="nofollow noopener">medium.com/@augustusphyra… (Prevention Chechlist) 3. @briskinfosec/drupal-core-remote-code-execution-vulnerability-cve-2019-6340-35dee6175afa" target="_blank" rel="nofollow noopener">medium.com/@briskinfosec/… (CVE-2019–6340 : RCE) 4. @knownsec404team/the-analysis-of-drupal-1-click-to-rce-ad7799b428e6" target="_blank" rel="nofollow noopener">medium.com/@knownsec404te… (1-Click RCE) 5. walk-throughs.medium.com/exploiting-dru… 6. @yasmeena_rezk/drupal-7-x-exploitation-7eb1c7cfa4dc" target="_blank" rel="nofollow noopener">medium.com/@yasmeena_rezk… 7. hackerone.com/reports/1844674
English
3
111
363
17.1K
Guax1 retweetledi
VAIDIK PANDYA
VAIDIK PANDYA@h4x0r_fr34k·
Fuzzing lists - Part 1 Wordlists for few specific Funtions you can use for Specific Purpuses. 1. Email Providers github.com/xajkep/wordlis… 2. Username Wordlist github.com/danielmiessler… 3. NoSqli github.com/cr0hn/nosqlinj… 4. Common Fuzzing github.com/orwagodfather/… 5. IIS github.com/orwagodfather/… 6. AEM github.com/orwagodfather/… 7. cgi-bin github.com/orwagodfather/… 8. .Filenames wordlists-cdn.assetnote.io/data/manual/do… 9. wp-contents github.com/random-robbie/… 10. ZIPs github.com/random-robbie/…
English
0
83
289
11.5K
Guax1 retweetledi
Maniesh.Neupane
Maniesh.Neupane@pwn4arn·
Upload functionality testing
Maniesh.Neupane tweet media
English
1
40
190
16K
Guax1 retweetledi
Maniesh.Neupane
Maniesh.Neupane@pwn4arn·
Some cool bypass for the endpoints !
Maniesh.Neupane tweet media
English
0
44
266
18.1K
Guax1 retweetledi
RootMoksha Labs
RootMoksha Labs@RootMoksha·
Two P3 after successfully bypassing the Cloudflare WAF on a private program. A simple SVG-based payload proved effective. Payload: ⚙️ "%3cSvg%20Only%3d1%20OnLoad%3dconfirm(1)%3e" credit: @nav1n0x #bugbountytips #BugBounty
RootMoksha Labs tweet mediaRootMoksha Labs tweet mediaRootMoksha Labs tweet media
English
0
28
131
4.6K
Guax1 retweetledi
elSec
elSec@adrielsec·
bypass XSS Cloudflare WAF Encoded Payload &#34;&gt;&lt;track/onerror=&#x27;confirm\%601\%60&#x27;&gt; Clean Payload "><track/onerror='confirm`1`'> HTML entity and URL encoding: " --> &#34;  > --> &gt;  < --> &lt; ' --> &#x27; ` --> \%60 #bugbounty #bugbountytip #bugbountytips
English
1
82
260
14.6K
Guax1 retweetledi
RootMoksha Labs
RootMoksha Labs@RootMoksha·
WAF bypass: By adding 'Content-Encoding: any_random_text' to the request header, you can deceive some WAFs, allowing your payload to slip through undetected. By:@jayesh25 #bugbountytips #bugbounty
RootMoksha Labs tweet media
English
10
111
468
21.6K