Gokul SK

459 posts

Gokul SK

Gokul SK

@GokTest

.git/config

Kerala 加入时间 Ekim 2022
290 关注1.3K 粉丝
Gokul SK 已转推
Het Mehta
Het Mehta@hetmehtaa·
don't leave babe, I'll find next critical soon
Het Mehta tweet media
English
17
41
479
22.4K
Gokul SK 已转推
‎Wojak Codes
‎Wojak Codes@wojakcodes·
“Until death, all defeat is psychological”
‎Wojak Codes tweet media
English
365
17K
71.1K
25.7M
Gokul SK
Gokul SK@GokTest·
Crazy part is one more report is still under review.
English
1
0
2
543
Gokul SK 已转推
ZoomEye
ZoomEye@zoomeye_team·
ZoomEye BugBounty Radar #12 | Best Practice: Discovering Origin IPs Behind CDNs When using ZoomEye BugBounty Radar, you may come across a target domain running a vulnerable web application (e.g., SQL injection), but it's protected by Cloudflare or another CDN, making direct exploitation impossible. In such cases, you can try to discover the origin IP address using ZoomEye: - Review the header, body, or SSL content of the target asset. - Look for unique identifiers — such as page titles, server banners, or SSL subjects. - Use one of these identifiers as a search keyword in ZoomEye. - If the results include IPv4 or IPv6 addresses, they are likely origin IPs for the protected domain. Example: Search using the page title — title="Welcome to XXX" Discovering origin IPs allows you to bypass CDN protection and interact with the real host — a key tactic for bounty hunters. 🚀 Learn to hunt smarter with BugBounty Radar — follow ZoomEye for daily tips. DM us for 15 days of Bounty Radar access! 🔗 zoomeye.ai/bugbounty #BugBounty #bugbountytip #CyberSec
ZoomEye tweet media
English
0
6
28
2.2K
Gokul SK 已转推
ZoomEye
ZoomEye@zoomeye_team·
ZoomEye BugBounty Radar #14 | Best Practice: Find Sensitive Subdomains Some subdomains may expose debug interfaces, sensitive APIs, backup files, or unfinished products — often overlooked but rich in bounty potential. Examples include: 'dev.xxx.com' — development environments Risk: weak credentials, debug endpoints, source code leaks 'test.xxx.com' — testing environments Risk: test accounts, flawed logic 'demo.xxx.com' — demo or preview instances Risk: default credentials, exposed data You can quickly find such subdomains using the following query: is_bugbounty=true && (domain="dev.*" || domain="test.*" || domain="staging.*" || domain="internal.*" || domain="old.*" || domain="backup.*" || domain="bak.*" || domain="demo.*" || domain="beta.*" || domain="git.*" || domain="repo.*") These often-overlooked subdomains may leak high-value sensitive information — don’t miss them. 🚀 Learn to hunt smarter with BugBounty Radar — follow ZoomEye for daily tips. DM us for 15 days of Bounty Radar access! 🔗 Try now: zoomeye.ai/bugbounty 🔗 User Guide: @zoomeye_team/bugbounty-radar-a-quick-user-guide-6ef72d2f04bb" target="_blank" rel="nofollow noopener">medium.com/@zoomeye_team/… #BugBounty #bugbountytip #CyberSec
ZoomEye tweet media
English
1
6
44
4.2K
Gokul SK 已转推
ZoomEye
ZoomEye@zoomeye_team·
ZoomEye BugBounty Radar #16 | Best Practice: Instantly Scan Bug Bounty Targets with Nuclei Combine ZoomEye BugBounty Radar with Nuclei's scanning engine to quickly identify exploitable vulnerabilities across bug bounty assets. 📌 Example: To scan for CVE-2025-53770 across bug bounty targets: nuclei -t http/cves/2025/CVE-2025-53770.yaml -uncover-engine zoomeye -uncover-query 'is_bugbounty=true && vul.cve="CVE-2025-53770"' Seamlessly pivot from asset discovery to real-time vulnerability scanning — and stay ahead in the hunt. 🚀 Learn to hunt smarter with BugBounty Radar — follow ZoomEye for daily tips. DM us for 15 days of Bounty Radar access! 🔗 Try now: zoomeye.ai/bugbounty 🔗 User Guide: @zoomeye_team/bugbounty-radar-a-quick-user-guide-6ef72d2f04bb" target="_blank" rel="nofollow noopener">medium.com/@zoomeye_team/… #BugBounty #bugbountytip #CyberSec
ZoomEye tweet media
English
3
28
119
7.6K