Rezultati pretraživanja
  1. 29. sij
  2. 30. sij

    Some hunters made over €50.000 in bug bounties with this simple trick. 🤑 Thanks for the , !

    Prikaži ovu nit
  3. 27. sij
  4. 30. sij

    I earned 2x$350 for my 2 submissions on . Both were stored XSS with a simple payload "><img src=x onerror=alert(1)>.

    Prikaži ovu nit
  5. 31. sij

    My day ends at midnight 03:00am Busy making my tool after coming from the office Finally, it's done Just give a list of url's and this tool will do some enum. -Content-Lenght -Status_code -Dom-XXS -Forms -Title DAY ENDS :) 👇

    Prikaži ovu nit
  6. 31. sij

    Akamai WAF Bypass, worked on a recent program <x onauxclick=a=alert,a(domain)>click

  7. 2. velj

    WooT! There is always a way. New short write up! Chain the bugs till you get what you want. Some steps were not mentionned. RT, Like and Comments are appreciated. For any pentest work DM me:) 🎉🎉

    Prikaži ovu nit
  8. 2. velj

    Maybe I'm weird or just dumb but I use to test for Blind XXE, I have just created a simple payload generator for my own use. I almost never use python so this was a learning experience for me.

  9. 26. sij

    Data extraction bug in Facebook. Sorry, no write-up for this one for the current time!

  10. 31. sij

    Just released a quick tool, wordlistgen, I put together for taking a list of URLs/paths from stdin and parsing components (subdomains, paths, query strings & values) to easily/quickly make contextual content discovery wordlists for

    Prikaži ovu nit
  11. A source code analyzer built for surfacing features Burp Bounty(a quick and simple way, to improve the active and passive scanner) Sublert is a security and reconnaissance tool ,

  12. 25. sij

    Facebook rewarded me with a bounty of $30000 for SSRF on prod server (Internal Access 😎).

  13. 20. sij

    Directory Listings --> JS files --> Hidden Endpoints --> Endpoints contains hidden parameters --> Playing with, got Server Errors --> Found Apache Solr version 6.0.0 --> Found Vulnerable --> Public POC --> Got RCE :)

  14. prije 6 sati

    We are going public with our some of the products in our program . ~10 services will go from private -> public. This will be done gradually over the next two months. The program is now online at Happy hacking!

    Prikaži ovu nit
  15. prije 6 sati

    Today, we are launching , a series of interviews with hunters. In our first edition, we are discussing logic flaws and with ! 🐸 Who would you like to see interviewed next? Leave a comment! 👇

  16. prije 4 sata

    Learn to test the embedded or IoT devices, firmware analysis, fuzzing and much more in this hands-on training by Kaustubh Register here:

  17. 31. sij

    Alham-du-lillah this was my best ever month in BB - Made 11.7k$ . played a major part in it. I am in love with this community and happy to be a part of it.❣️

  18. 23. sij

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.