Rezultati pretraživanja
  1. 1. velj

    I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)

  2. 4. velj

    ==API TIPS== To welcome the new year, we published a daily tip on API Security & API Pentesting during the month of January 2020. Check out my new article and explore 31 tips + interesting insights about them.

  3. 31. sij
  4. prije 17 sati
  5. 31. sij

    Steps 0) Login in with Twitter 1) Host Header Injection [to a.cxx] 2) Generate OAuth Token's Link 3) Send link to Victim, after victim authorize 4) Verifier send to a.cxx 5) Reuse use token Account Takeover by

  6. 1. velj

    I just got a fancy idea to create strings in without using dangerous characters 😃 Inspired by challenge from .

    Prikaži ovu nit
  7. 24. sij

    Some lesser known 0-click XSS vectors: <object data="data:text/html,<script>alert(5)</script>"> <iframe srcdoc="<svg onload=alert(4);>"> <object data=javascript:alert(3)> <iframe src=javascript:alert(2)> <embed src=javascript:alert(1)>

  8. 21. pro 2019.

    Got my first remote code execution on bug bounty program.Nothing is more beautiful than...... Tip? Just keep scanning for hidden directory until you found something else.

    Prikaži ovu nit
  9. 11. pro 2019.
  10. 11. pro 2019.

    Login Page Authentication bypass: Any file name / authorize account/connect/authorize home/authorize dashboard/authorize account/authorize/

  11. 14. sij

    CSP bypass for googleapis[.]com/customsearch/

  12. 30. sij

    Awesome Payloads Server-Side Template Injection Linux - Privilege Escalation

  13. 15. pro 2019.

    Simple 2FA bypass tip: Account setting > Change email > Logout > Login with password via email confirm link > 2FA won't ask when the backend check for login email.(only for rare cases)

  14. prije 21 sat

    A couple of people asked for my 'XSS for 2020' cheatsheet in PDF format, so I went ahead and made it today. Enjoy. :)

  15. 16. pro 2019.

    Got a survey from? Don't only test for blind xss Try this once

  16. 3. velj

    Hey bug hunters! Want a look at some of the top vulnerabilities ever found on ? They just released the last blog post I wrote before leaving. Enjoy!

    Prikaži ovu nit
  17. 4. velj

    I use my mobile phone with a termux app to find these two bugs while doing some uni stuff. Nmap syntax used to find ssl poodle: nmap -sV --version-light -Pn --script ssl-poodle -p 443

  18. Don’t forget to check ‘9200’ port for Elasticsearch.

  19. 3. sij

    You can do anonymously LDAP search on your targets using this command: ldapsearch -h <TARGET IP> 389 -x -s base -b '' "(objectClass=*)" "*"

    Prikaži ovu nit
  20. 27. sij

    -API TIP:26/31- Looking for BOLA (IDOR) in APIs? got 401/403 errors? AuthZ bypass tricks: * Wrap ID with an array {“id”:111} --> {“id”:[111]} * JSON wrap {“id”:111} --> {“id”:{“id”:111}} * Send ID twice URL?id=<LEGIT>&id=<VICTIM> * Send wildcard {"user_id":"*"}

    Prikaži ovu nit

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.