Onboard yourself - PaloAlto Global Protect edition:
1. Become local admin
2. Export device cert from original workstation
3. Import cert in your VM
4. Login with user creds
5. Enjoy EDR-free testing :)
How to grab all Graphql query/mutation if introspection disabled?
1. Download all js files to directory js_files
2. Run this command:
grep -Eo '(query|mutation) [a-zA-Z0-9_]+\(' js_files -R
1/n
#bugbountytips#graphql
$2,500 Bounties in GraphQL Hacking!
Started learning GraphQL security in Feb and picked a HackerOne program—luckily, it was all GraphQL! Found multiple bugs, including two high-severity ones which I wrote about.
Read here: blog.koalasec.co/2500-dollars-i…
Just published a blog post about this Chrome 0day discovered by @slonser_. It covers how the exploit works, a demo setup simulating a common ATO scenario (with video), and the PoC GitHub repo.
amalmurali.me/posts/cve-2025…
Just published a blog post about this Chrome 0day discovered by @slonser_. It covers how the exploit works, a demo setup simulating a common ATO scenario (with video), and the PoC GitHub repo.
amalmurali.me/posts/cve-2025…
Question for #BugBounty hunters who do “google-dorking” - how do you handle the CAPTCHA mitigations? In my blog below I showed how I used the Google API but am interested in any other approaches.
Question for #BugBounty hunters who do “google-dorking” - how do you handle the CAPTCHA mitigations? In my blog below I showed how I used the Google API but am interested in any other approaches.
You found an XSS! 🤑 But the target has CSP... 😓
And it's set to: "Content-Security-Policy: script-src 'self' https://cdnjs\.cloudflare\.com"
Your injection point: "<p>[INJECTION_POINT]</p>"
How can you bypass the CSP and get that alert(1) popup? 🧐
Mutation-Based XSS + V8 type confusion + V8 sandbox escape = RCE on Basecamp.
Disclosed it on Hackerone: hackerone.com/reports/2819573
go read the comments if you wanna see what a week of exploit dev pain looks like.
if the target uses zendesk to handle support emails
you could send an email with payload
`{{ticket.ccs[0].name}}a{{ticket.ccs[0].phone}}` by adding `[email protected]` in CC
and extract victim info ranging from phone, address to payment info
#bugbounty#bugbountytips
Profundis.io is live!
Quickly uncover DNS records, subdomains, hosts, and their historical data directly via your browser.
No noise, just the data you need for asset discovery and security research.
Explore now: profundis.io
@Scobleizer Sure. Here’s the latest technique red-teamers and alignment hackers are experimenting with in 2025 to break advanced LLMs like GPT-4o and Claude 3.5:
⸻
🔥 Technique: Instruction Race Conditions via Latent Conflict Injection (LRCI)
(Used to cause internal policy clash and…
Nerve ( github.com/evilsocket/ner… ) and the code_auditor example tasklet ( github.com/evilsocket/ner… ) using GPT-4o to find a RCE vulnerability in the widget-options v4.0.7 Wordpress Plugin 🧠
Zero code, fully autonomous agent as a simple YAML file.
Any body who has pentested an LLM before , can you please share some resources , also would appreciate if you happen to describe/share some real world examples/writeups, I have gone through the popular ones, Thanks in advance #BugBounty#PenTesting #PenTest#infosec#LLM#llama3
GraphQL isn’t just an API to deliver our payloads. Often, its implementations are what actually cause them. To see what bugs it can lead to, studied disclosed bug bounty reports. IDORs, privescs, DoS, CSRFs, SQLis - it's all there. Enjoy!
youtu.be/9tNUPpB1gto
527 Followers 7K FollowingVintage car collector, automotive self media, automotive brand embracing AI founder, world new energy vehicle promoter, personal non licensed car dealer.
122 Followers 1K FollowingI'm a Muslim that always depends💯 on La'ila ha'illallah Muhammad Rasulullah♥️ nothing more nothing less, it is my everything and Alhamdulillahi Alakulli halin.
67K Followers 959 Followinghttps://t.co/iI9jECyxHD is the first permanent cloud network | smart domains: https://t.co/FdLMNUUWyK | token $ARIO | built on Arweave
637 Followers 157 FollowingMy crime is that of curiosity.
Bug Bounty, Security Engineering, Dev and more
Presented at Area41, DEF CON main stage, DEF CON Car Hacking Village
243 Followers 427 FollowingOSCE3, OSCP, OSWP + some more. Senior Penetration Tester at a japanese megacorp. Working on coercing AI to write good code. Yeah I can do it.
6K Followers 390 FollowingSemi-Consciously simplifying bug bounties for myself and others | Slaying Bugs Full Time with My Nichirin Sword (aka Burp) since Aug 2023 | INFJ
193K Followers 107 FollowingWe're sharing/showcasing best of @github projects/repos. Follow to stay in loop. Promoting Open-Source Contributions. UNOFFICIAL, but followed by github
1K Followers 761 FollowingBug Bounty Hunter | Web App Hacker | Red Team Specialist | Finding vulnerabilities, exploiting weaknesses, and securing the web one app at a time.