Alejandro Olivares (@0x4lex_) 's Twitter Profile
Alejandro Olivares

@0x4lex_

Penetration Tester 0x4lex eCPPTv2 eWPTXv2 CRTP eMAPT

ID: 4155125958

linkhttps://github.com/0x4lex calendar_today07-11-2015 08:29:03

1,1K Tweet

274 Takipçi

293 Takip Edilen

HackenProof (@hackenproof) 's Twitter Profile Photo

Blind Sql injection in JSON: [-1+or+1%3d((SELECT+1+FROM+(SELECT+SLEEP(5))A))] {AnD SLEEP(5)}{1 AnD SLEEP(5)} {1' AnD SLEEP(5)--} {sleep 5} "emails":["AnD SLEEP(5)"] "emails":["[email protected]' OR SLEEP(5)#"] {"options":{"id":[],"emails":["AnD SLEEP(5)"],

Godfather Orwa 🇯🇴 (@godfatherorwa) 's Twitter Profile Photo

SQL Injection Payload i was able to locate a SQL injection very hard to exploit , with digging I successfully got it with the sleep payload ''||(select 1 from (select pg_sleep(6))x)||' ==> i added as well to my SQL wordlist happy hunting ♥ #bugbountytips #bugbountytip

SQL Injection Payload 

i was able to locate a SQL injection very hard to exploit , with digging I successfully got it with the sleep payload

''||(select 1 from (select pg_sleep(6))x)||'

==> i added as well to my SQL wordlist 

happy hunting ♥
#bugbountytips #bugbountytip
zack0x01 (@zack0x01) 's Twitter Profile Photo

Hey #BugBounty hunters 👋 I’d like to share my latest finding: an interesting business-logic bug I discovered. #bugbountytips #hacking #CyberSecurity medium.com/@zack0x01_/bus…

Gabbytech || Cyber_Security (@gabriel_coder01) 's Twitter Profile Photo

Critical: GET /api/users/signed_in exposes PII & a reusable session cookie — token replay after logout allows account takeover. Reported via @Intigriti. #ResponsibleDisclosure #AppSec

Critical: GET /api/users/signed_in exposes PII & a reusable session cookie — token replay after logout allows account takeover. Reported via @Intigriti. #ResponsibleDisclosure #AppSec
ethicxl (@ethicxlhuman) 's Twitter Profile Photo

Under project "The Sword" I present: 🛠️ etxNuclei Template Generator Submit CVE + POC → AI generates YAML → validated → uploaded to Slack Converts exploits to scan templates in seconds. No manual YAML writing. github.com/ethicxlhuman/n… #bugbounty #n8n

🇷🇴 cristi (@cristivlad25) 's Twitter Profile Photo

when you look for ATO, make sure that you go beyond x-forwarded-for. try at least the following, each individually. - x-forwarded-host - x-original-url - x-host - host I just found one via x-forwarded-host, while the rest did nothing or 421.

when you look for ATO, make sure that you go beyond x-forwarded-for. try at least the following, each individually.

- x-forwarded-host
- x-original-url
- x-host
- host

I just found one via x-forwarded-host, while the rest did nothing or 421.
Ben Sadeghipour (@nahamsec) 's Twitter Profile Photo

🚨 Doing a giveaway for my Blind XSS Masterclass Most people think they know XSS, until they meet blind XSS, the kind that fires where you’ll never see it. Same methods that helped me earn $250K+ from real reports. hhub.io/nahamsecbxss 🎁 Retweet and reply to enter.

🚨 Doing a giveaway for my Blind XSS Masterclass
Most people think they know XSS, until they meet blind XSS, the kind that fires where you’ll never see it.
Same methods that helped me earn $250K+ from real reports. hhub.io/nahamsecbxss
🎁 Retweet and reply to enter.
DarkShadow (@darkshadow2bd) 's Twitter Profile Photo

Parameter: &Path= ❎LFI ✅RCE if you ever got a LFI vector parameter, then not just try LFI payloads. Payload for RCE: "|id||" Join my BugBounty telegram channel: t.me/ShellSec

Parameter: &Path= ❎LFI ✅RCE

if you ever got a LFI vector parameter, then not just try LFI payloads.

Payload for RCE: "|id||"

Join my BugBounty telegram channel: t.me/ShellSec
⛧ L∆₣₮M₳₦ ⛧ (@08xdof20784) 's Twitter Profile Photo

Today was a day for retesting, and I found this other beauty: the payload was "><input%20onfocus=alert(1)%20autofocus> bypassed One more for Intigriti #BugBounty #bugbountytips #EthicalHacking 👾 I want to become a recognized insect hunter on the platform, so this is the bare

Today was a day for retesting, and I found this other beauty: the payload was "&gt;&lt;input%20onfocus=alert(1)%20autofocus&gt; bypassed
One more for <a href="/intigriti/">Intigriti</a> 
#BugBounty #bugbountytips #EthicalHacking 👾 I want to become a recognized insect hunter on the platform, so this is the bare
NullSecX (@nullsecurityx) 's Twitter Profile Photo

Found an XSS bypass during a bug bounty: Backend was only stripping quotes ("), so payload like: <s"vg o"nload=al"ert() /> turns into a valid: <svg onload=alert()> 🚨 Never rely on poor input filtering! #BugBounty #CyberSecurity

Found an XSS bypass during a bug bounty:
Backend was only stripping quotes ("), so payload like:

&lt;s"vg o"nload=al"ert() /&gt;

turns into a valid:

&lt;svg onload=alert()&gt;

🚨 Never rely on poor input filtering!

 #BugBounty #CyberSecurity
Jason Haddix (@jhaddix) 's Twitter Profile Photo

Happy Arcanum-versary! Arcanum Information Security 's 1st giveaway for the week is FOUR seats to our EPIC Advanced Client-Side Hacking course by myself and xssdoctor ! 👍 1 Like = 1 Entry! ♻️ 1 Share = 2 Entries! Winners announced 1/21! Syllabus for the course below 👇

Happy Arcanum-versary! 

<a href="/arcanuminfosec/">Arcanum Information Security</a> 's  1st giveaway for the week is FOUR seats to our EPIC Advanced Client-Side Hacking course by myself and <a href="/xssdoctor/">xssdoctor</a> !

👍 1 Like = 1 Entry!
♻️ 1 Share =  2 Entries!

Winners announced 1/21! 

Syllabus for the course below 👇
Jason Haddix (@jhaddix) 's Twitter Profile Photo

Day TWO of FIVE days of celebrating our 2 year ARCANUM-VERSARY! Arcanum Information Security 3rd Giveaway = FOUR seats to our new course by the_IDORminator "Zero to [BAC] Hero" ! 👍 1 Like = 1 Entry! ♻️ 1 Share = 2 Entries! Winners announced 1/21! Syllabus link below 👇

Day TWO of FIVE days of celebrating our 2 year ARCANUM-VERSARY! <a href="/arcanuminfosec/">Arcanum Information Security</a> 

3rd Giveaway = FOUR seats to our new course by <a href="/the_IDORminator/">the_IDORminator</a>  "Zero to [BAC] Hero" !

👍 1 Like = 1 Entry!
♻️ 1 Share =  2 Entries!

Winners announced 1/21!  Syllabus link below 👇
Godfather Orwa 🇯🇴 (@godfatherorwa) 's Twitter Profile Photo

I’ve added here github.com/orwagodfather/… PDF file for XSS, it can bypass any waf for who looking for Stored XSS , and it can be changed to blind if you want to Simply I encoded the payload as ASCII hex You can edit the payload over notepad++ #bugbountytips #bugbountytip

I’ve added here 
github.com/orwagodfather/…

PDF file for XSS, it can bypass any waf 
for who looking for Stored XSS , and it can be changed to blind if you want to

Simply I encoded the payload as ASCII hex

You can edit the payload over notepad++

#bugbountytips  #bugbountytip