Twitter | Search | |
Search Refresh
luffydragneel Aug 19
yay, I was awarded $$$ for finding a Stored XSS on Synack. The payload used was the classic, "><img src=x onerror=alert(1)>. A user can create a file with that payload and share it with the Admin, and XSS gets triggered on the Admin side also. .:)
Reply Retweet Like
Shubham Mittal Aug 20
Quick Tip: While you are trying to find more subdomains and you use the Google Dork: site:*.example.com, NEVER forget to check site:*.*.example.com and site:*.*.*.example.com
Reply Retweet Like
djrootdz Aug 18
$20,000 Bug Bounty Program
Reply Retweet Like
Fisher Aug 20
Here it is! Burp Scope Monitor, a simple extension to help you keep track of unique endpoints in your history, marking them as analyzed, highlighting and other cool stuff! Check it out: πŸ₯³πŸ₯³πŸ˜‡
Reply Retweet Like
✎ /𝒅𝒆𝒗/𝒏𝒖𝒍𝒍 Aug 21
ModSecurity {" XSS "} ~Bypass braindeath; β“Ύ ~1; " %3Cspyerror%20script%20goes%20here%3E=%0AByPass " ~2; "%3Cscript%3Ealert(document.cookie)%3C/script%20ByPass%3E"
Reply Retweet Like
Rob Fitzpatrick Aug 21
Type the same recon commands alot? Edit your ~/.bash_profile to create aliases and save time. e.g. dirsearch(){ cd /tools/dirsearch python3 dirsearch .py -u $1 -e $2 -t 100 -x 429}
Reply Retweet Like
Ashish Kunwar 10h
Got 3 digit bounty from Verizon ;)
Reply Retweet Like
Rishabh Aug 20
Did you know you can "edit and resend" requests without any interceptor in Mozilla firefox
Reply Retweet Like
Supras Aug 19
Great tool ! Thank you for your work ! Automated monitoring of subdomains for fun and profitβ€Šβ€”β€ŠRelease of Sublert by Yassine Aboukir
Reply Retweet Like
Sathish Kumar Aug 21
Most productive night ever. Synack β™₯️
Reply Retweet Like
Deepak Holani Aug 18
Just boom blind xss No verification on email so registered by Company domain and requested for reset password add payload in user agent bingoo it's worked $$$$
Reply Retweet Like
Katie Moussouris Aug 22
Replying to @k8em0
One more time for the folks in the back: Attempts to control behavior of security researchers via banning their continued good will reports, especially when they are literally not seeking money is the worst possible way to handle vulnerability disclosure sustainably.
Reply Retweet Like
✎ /𝒅𝒆𝒗/𝒏𝒖𝒍𝒍 Aug 18
"Cloudflare"; live payloads: 🧠 ~1: &lt;img longdesc="src='x'onerror=alert(document.domain);//&gt;&lt;img " src='showme'&gt; ~2: &lt;img longdesc="src=" images="" stop.png"="" onerror="alert(document.domain);//&amp;quot;" src="x" alt="showme"&gt;
Reply Retweet Like

Related searches

#hackers · #bugbountytips · infosec · #cybersecurity · webmin
luffydragneel Aug 20
I earned $1000(2x$500) for my 2 submissions on . Stored XSS on Angular applications. Payload used: {{constructor.constructor('alert(1)')()}} Thanks to my bro for the help.:)
Reply Retweet Like
m0z Aug 22
file.php?url=/admin/ Redirects to: Put URL file.php?url=.com Now it is website.com@google.com which redirects to !
Reply Retweet Like
Mo'men Basel Aug 15
HTTP request headers can be a golden gem for finding vulnerabilities never miss tampering/adding these headers!
Reply Retweet Like
luffydragneel Aug 21
. This guy found a SQL Injection on and it was marked as Informative at first. I guess the bots are doing everything now and there is no sense of urgency from a multi-million company who still provides kudos instead of bounties.
Reply Retweet Like
Mo'men Basel Aug 18
XSS [requires action] Reported and Fixed.
Reply Retweet Like
Ali TΓΌtΓΌncΓΌ 18h
Reply Retweet Like
Ali TΓΌtΓΌncΓΌ Aug 22
Reply Retweet Like