0 day exploit

354 posts

0 day exploit banner
0 day exploit

0 day exploit

@0day_exploit_

Security Researcher | Crypto auditor and malware analyst 🥰

加入时间 Mayıs 2022
746 关注2.6K 粉丝
置顶推文
0 day exploit
0 day exploit@0day_exploit_·
Top google Dorking Thread 🧵:👇 Here is how to find sensitive data issues: 1) publicly exposed documents :- site:target.com ext:doc | ext:docx | ext:odt | ext:rtf | ext:sxw | ext:psw | ext:ppt | ext:pptx | ext:pps | ext:csv #BugBounty #bugbountytips #infosec
English
31
199
569
54.6K
0 day exploit
0 day exploit@0day_exploit_·
How I found a Critical ($100k) bug that could allow an attacker to drain the entire pool in under an hour and end on an information already known issue🥲 Read full article at ;-@0day_exploit/critical-100k-bug-that-could-allow-an-attacker-to-drain-the-entire-pool-in-under-an-hour-962b7e4e2ba4" target="_blank" rel="nofollow noopener">medium.com/@0day_exploit/…
0 day exploit tweet media
English
2
1
10
955
0 day exploit
0 day exploit@0day_exploit_·
@adeolRxxxx This is the original report you got a duplicate of. Read my story about how I argued and ended up on information rather than paying 100k$ 😰
English
0
0
1
191
playboi.eth
playboi.eth@adeolRxxxx·
So basically, I have not been resting as I am currently competing in contests and also consistent in bug bounties. > So I think it would be nice to share my dups with the public for those who wanna learn. > But bug bounties have been a hell hole, or maybe let me say crazy. A bounty dropped last week in the heat of the day. I was asleep when I got pinged by my tool. I quickly woke up, checked, and saw it was in DLT. I have been preparing all my life for this. 4 hours just after this dropped on @HackenProof , I was able to find a critical that could allow an attacker to drain the entire pool in a single transaction by forging a block. I quickly wired an end-to-end POC to prove this issue, even estimating the time it would take the attacker. But unfortunately, I was met with "this issue has been found by another whitehat", bro, 4 hours?? Here, if you wanna learn: github.com/blessingblockc…
English
11
9
104
6.3K
0 day exploit
0 day exploit@0day_exploit_·
@nisedo_ Bro your just reported I am waiting for 15 days 2 report is form 2025 😮‍💨 more than 4 month 🫣
English
1
0
0
100
nisedo
nisedo@nisedo_·
I didn’t think the hardest part of bug bounties would be being patient
nisedo tweet media
English
4
2
80
6.1K
0 day exploit
0 day exploit@0day_exploit_·
@HackenProof swapHandler is never initialized, so executeFlashLoan calls getRouterAddress() on the zero address (no code there) and always reverts
English
0
0
4
393
HackenProof
HackenProof@HackenProof·
Spot the bug 🐛 This code is meant to be deployed on Base, Sonic, Arbitrum, and Ethereum, using Uniswap as the swap handler. Can you spot what’s wrong?👇
HackenProof tweet media
English
15
6
88
7.1K
HackenProof
HackenProof@HackenProof·
What was the last vulnerability you discovered?
English
23
3
72
6.4K
anu !
anu !@anssshka·
how to earn money without being employed
English
10
2
49
4.3K
secretlyadinosor
secretlyadinosor@saddagallaa·
where can I get a cable for this so I can connect it to my laptop pls help
secretlyadinosor tweet media
English
4
0
3
634
0 day exploit
0 day exploit@0day_exploit_·
5) exploit using jsleak cat test.txt | jsleaks -s -l -k github.com/byt3hx/jsleak 6) expoit by nuclei cat test.txt | nuclei -t credentials-disclosure-all.yaml -c 30
English
0
0
4
532
0 day exploit
0 day exploit@0day_exploit_·
2) katana katana -u test.com -d 5 -jc | grep '\.js$' | tee alljs.txt 3) Crawling with GAU echo test.com | gau | grep '\.js$' | anew alljs.txt 4)Refining Results with HTTPX cat alljs.txt | httpx-toolkit -mc 200 -o test.txt
English
1
0
2
634