hyk3n

406 posts

hyk3n banner
hyk3n

hyk3n

@ryu_kanzake

your average script kiddie passing by. ````` https://t.co/16fyalvlIE https://t.co/9QfLQZgVFa https://t.co/MVo1B2jJl4 ```````

Katılım Kasım 2021
209 Takip Edilen24 Takipçiler
hyk3n retweetledi
obscaries ❘ AppSec
obscaries ❘ AppSec@obscaries·
If you're serious about mastering client-side bugs, this repo is a goldmine. A curated roadmap covering: • XSS (DOM-based & advanced) • postMessage exploitation • CSP bypass techniques • Prototype Pollution • Real-world writeups & labs Stop jumping randomly between topics, follow a structured path. 🔗 github.com/zomasec/client… #BugBounty #WebSecurity #XSS #AppSec #InfoSec
English
3
87
391
14.5K
hyk3n retweetledi
Cybersecurity by Cyberkid
Cybersecurity by Cyberkid@Anastasis_King·
🚨 Bug Bounty / Red Team Tip CVE-2026-21643 — Critical Pre-Auth SQL Injection (CVSS 9.1) in FortiClient EMS 7.4.4 (multi-tenant mode only) Unauthenticated attackers can inject arbitrary SQL via the Site HTTP header to the public endpoint /api/v1/init_consts (or login endpoint). This happens before authentication and hits the PostgreSQL backend with superuser-level access in many setups → full DB dump, schema extraction, or RCE (via PostgreSQL features like COPY FROM PROGRAM). - Affected: Only FortiClient EMS 7.4.4 (multi-tenant/Sites feature enabled) - Not affected: 7.2.x, 8.0.x, single-site deployments - Fixed: Upgrade to 7.4.5 or later - Status: Actively exploited in the wild + public PoCs available Main Detail Article (Highly Recommended): Bishop Fox deep-dive with exploitation paths, payloads (e.g., pg_sleep(5) for blind testing), and lab results → bishopfox.com/blog/cve-2026-… Public PoC (GitHub): github.com/0xBlackash/CVE… Useful Google/Shodan Dorks: - http.title:"FortiClient EMS" "7.4.4" - http.html:"FortiClient Enterprise Management Server" - http.favicon.hash: -specific-hash (or search for EMS login page) - Shodan: "Model: FCTEMS" or "FortiClient EMS" Quick Check: If your EMS login page is internet-facing and running 7.4.4 with multi-tenant enabled → patch ASAP or block public access. Thousands of instances are exposed (Shadowserver ~2k+, Shodan ~1k+). High-value target for hunters. Patch or restrict immediately! #BugBounty #RedTeam #Fortinet #CVE202621643 #SQLi
Cybersecurity by Cyberkid tweet media
English
2
57
260
15.9K
hyk3n retweetledi
obscaries ❘ AppSec
obscaries ❘ AppSec@obscaries·
🔥 If you’re serious about bug bounty, this repo is pure gold. 📦 Bug Bounty Reference by @ngalongc 🔗 github.com/ngalongc/bug-b… 📌 Why it’s a game-changer: ✅ Real-world disclosed reports — not just theory ✅ Organized by bug class: XSS, SSRF, IDOR, RCE, you name it ✅ Peek inside the actual hacker mindset 🧠 ✅ Connect the dots across different targets & reports 🚀 Pro-level way to use it: Pick a vulnerability class Read 5+ reports in that category Map out sources → sinks → attack chains Apply those patterns to live targets ⚠️ Stop memorizing payloads. Start recognizing patterns. #BugBounty #InfoSec #CyberSecurity #EthicalHacking #WebSecurity #HackerMindse
English
0
81
331
14.2K
hyk3n
hyk3n@ryu_kanzake·
@intigriti That's true when I faced in beginning they say I got $$$ just look deeper yo how the heck did find staring at screen doesn't help
English
0
0
2
31
hyk3n retweetledi
obscaries ❘ AppSec
obscaries ❘ AppSec@obscaries·
🛡️ Many modern web apps run on Next.js — and where there’s code, there are bugs 👀 This security checklist highlights common risks like: 🔹 Input validation issues 🔹 Exposed secrets 🔹 Dependency vulnerabilities 🔹 Missing security headers Great read for bug bounty hunters 🔍 🔗 blog.arcjet.com/next-js-securi… #BugBounty #AppSec #WebSecurity #NextJS 🐞
obscaries ❘ AppSec tweet media
English
0
5
53
2.4K
hyk3n retweetledi
Casper0x
Casper0x@_casper0x·
Simple XSS payload for AngularJS testing. Older AngularJS versions are still vulnerable to expression injection. {{$on.constructor('alert(document.domain)')()}} #BugBounty #XSS #bugbountytips #hackerone
Casper0x tweet media
English
1
22
161
6.7K
hyk3n retweetledi
ProjectDiscovery
ProjectDiscovery@pdiscoveryio·
Did you collect subdomains but don’t know which ones are real? That’s where the real work begins. Passive enumeration maps the surface. Resolution and wildcard filtering build the foundation. Let Subfinder discover them. Let Shuffledns verify them. Clean pipeline below 👇
ProjectDiscovery tweet media
English
0
33
157
7.4K
hyk3n retweetledi
X
X@TheMsterDoctor1·
# Default Credentials 1. Cisco ``` User: cisco Password: cisco ``` 2. Citrix ``` User: nsroot Password: nsroot ``` 3. Dell iDRAC ``` User: root Password: calvin ``` 4. Juniper ``` User: super Password: juniper123 ``` 5. pfSense ``` User: admin Password: pfsense ``` 6. SAP ``` User: SAP* Password: 06071992 ``` 7. Tomcat ``` User: tomcat Password: tomcat ``` 8. UniFi ``` User: ubnt Password: ubnt ``` 9. Weblogic ``` User: weblogic Password: weblogic1 ``` 10. Zabbix ``` User: Admin Password: zabbix ``` 11. Windows ``` User: Administrator Password: P@ssw0rd ```
Deutsch
11
510
3.9K
247.3K
hyk3n retweetledi
DarkShadow
DarkShadow@darkshadow2bd·
🔥SQL injection in json endpoint💀 Join my BugBounty telegram channel t.me/ShellSec Tip: Always check blind SQL injection in json, js endpoints. Even it's show you 404 but if the Backend process after .json';{yourpayload} then you can get only blind base SQLi. ㅤ
DarkShadow tweet media
English
5
39
321
13.9K
hyk3n retweetledi
ProjectDiscovery
ProjectDiscovery@pdiscoveryio·
Stop missing attack surface behind Round Robin DNS. 🛑 By default, tools often check just one IP. Force httpx to enumerate ALL resolved A records for every subdomain using -probe-all-ips. Use this Command👇 httpx -l live_hosts.txt -probe-all-ips -silent -o multi_ip_hosts.txt Essential for finding hidden origins and inconsistent WAF protections. #recon #httpx #infosec
ProjectDiscovery tweet media
English
0
71
350
16.1K
hyk3n retweetledi
Het Mehta
Het Mehta@hetmehtaa·
XSSNow - The Ultimate XSS Payload Database xssnow.in
Het Mehta tweet media
English
10
231
1.2K
48.1K
hyk3n retweetledi
Intigriti
Intigriti@intigriti·
Need a simple scanner to test for React2Shell at scale? 🤑 React2shell-scanner by @assetnote is a Python-based command-line tool that detects CVE-2025-55182 and CVE-2025-66478 in Next.js applications. It even includes support for bypassing WAF filters! 😎 🔗 github.com/assetnote/reac…
Intigriti tweet media
English
6
69
421
32.9K