πŸ”₯OSCP TrainingπŸ”₯πŸ›‘βš”οΈπŸ‘¨πŸ»β€πŸ’»
8.11K subscribers
162 photos
1 video
27 files
64 links
Offensive Security Certified Professional
@WebHacking
@pfsense
@WifiHacking
πŸ”°For safer days
Download Telegram
Bug Bounty Tip

Want to learn HTTP Request Smuggling?

Check out this incredible Workshop with over 120 minutes of theory, videos, and practice using Docker Labs


https://gosecure.github.io/request-smuggling-workshop/#0
πŸ‘14❀1
403 Bypass tricks...
❀9πŸ‘5πŸ€”4πŸ‘Ž2
Forwarded from WiFi Security
Aircrack-NG Cheat Sheet
πŸ‘12❀1
Github Dorks Cheatsheet

Find files with sensitive info, API Keys, Tokens and Passwords.

+ list of github dorks automation tools
πŸ‘14❀4πŸ€”3πŸ‘Ž1
Windows useful Directories
❀35πŸ‘15
Chrome has just unleashed popovers: modal dialogs without JS! Of course you can abuse them for XSS filter evasion
❀13πŸ”₯5πŸ‘1
Periodical reminder: it's possible to navigate sub-tabs (like Repeater entries) from the keyboard.

You simply have to configure the actions "Go to previous tab" and "Go to next tab".

Burp Suite
As Burp Suite is developed in Java, regexes may use embedded flag expressions like "(?m)"

Here's a detailled description of all the possibilities (including embedded flags, character classes, quantifiers, groups, ...)
πŸ‘7❀2πŸŽ‰1
Bug Bounty Tip

GBK Encoding / MultiByte Attack

嘊 = %E5%98%8A = \u560a β‡’ %0A
嘍 = %E5%98%8D = \u560d β‡’ %0D
嘾 = %E5%98%BE = \u563e β‡’ %3E (>)
嘼 = %E5%98%BC = \u563c β‡’ %3C (<)
嘒 = %E5%98%A2 = \u5622 β‡’ %22 (')
嘧 = %E5%98%A7 = \u5627 β‡’ %27 (")

For XSS, CRLF, WAF bypass
❀6πŸ‘3