attacker

5 posts

attacker

attacker

@ReturnSafe1

BLH HIJACKED BY Javeed.shaik

เข้าร่วม Mayıs 2023
26 กำลังติดตาม0 ผู้ติดตาม
attacker รีทวีตแล้ว
Aditya
Aditya@ADITYASHENDE17·
As recon process I observed few things in dorking site:*.target.* This dork was giving all the urls with com,net,co,io Gathered all the domains and use following to command /1
Aditya@ADITYASHENDE17

I’ve decided to do bug hunt with only dorking for remaining month. Where I’ll be creating new dorks to get sensitive information: EOM I’ll share all the dorks. As I’ve got good results for dorking so far . Basic : site*.*.target.com -ext:pdf | ext:xlsx #kongsec

English
8
75
236
39.8K
attacker รีทวีตแล้ว
H41th3m 🇩🇿👾
H41th3m 🇩🇿👾@h41th3m·
For Fuzzing for Hidden Params , you can use FFUF which is faster tool or Arjun: ffuf -w ~/tools/wordlist/param.txt:PARAM -u "$1?PARAM=XSS" -mr "XSS" -c arjun -w ~/tools/wordlist/param.txt -u $1 #bugbounty #bugbountytips
English
5
8
46
2.6K
attacker รีทวีตแล้ว
Mustafa Adam Gamaraldin Abdalla 🇸🇩♥️
Reflected XSS Bug #VDP Tips :- 1- site:*.target.com ext:php 2- echo sub.target.com | waybckurls | grep "\?" | uro | httpx -silent > parameters.txt 3- nuclei -l parameters.txt -t fuzzing-templates 4- You may find xss,sqli,ssrf,open redirect...ext #bugbountytips
Mustafa Adam Gamaraldin Abdalla 🇸🇩♥️ tweet media
English
11
127
508
54.9K