codetrigger (@codetrigger0101) 's Twitter Profile
codetrigger

@codetrigger0101

Tech nerd

ID: 1845377710769496068

calendar_today13-10-2024 08:15:40

23 Tweet

9 Takipçi

558 Takip Edilen

Pomme (@pxmme1337) 's Twitter Profile Photo

Triagers don’t care about your methods tbh. I was a triager at HackerOne for a while. Most of my teammates weren’t bug bounty hunters at all. The few that were were so much better than the average joe, they couldn’t care less about « stealing payloads » or learning from reports

Dr. Sniper (@thedrsniper) 's Twitter Profile Photo

I have a potential subdomain takeover. The CNAME is like https://<name>-c207e81233-1462895681.eu-central-1.elb.amazonaws.com/ If anyone has experience in takingover elb.amazonaws.com, please send me a DM #bugbounty #collab

codetrigger (@codetrigger0101) 's Twitter Profile Photo

Phone phreaking is a type of hacking that allows you to explore the telephone network by exploiting the phone systems and phone company employees.

𝕏 Bug Bounty Writeups 𝕏 (@bountywriteups) 's Twitter Profile Photo

📒 URL validation bypass cheat sheet 📄 This cheat sheet contains payloads for bypassing URL validation. These wordlists are useful for attacks such as server-side request forgery, CORS misconfigurations, and open redirection. portswigger.net/web-security/s… #bugbounty #bugbountytips

📒 URL validation bypass cheat sheet 

📄 This cheat sheet contains payloads for bypassing URL validation. These wordlists are useful for attacks such as server-side request forgery, CORS misconfigurations, and open redirection.

portswigger.net/web-security/s…

#bugbounty #bugbountytips
codetrigger (@codetrigger0101) 's Twitter Profile Photo

Implement multi-factor authentication wherever possible. It adds an extra layer of security to your accounts. #BestPractices #Pentesting #ethicalhacking #Awareness

XSS Report (@xssreport) 's Twitter Profile Photo

Say hello to the Polyglot Payload. The complete payload for the XSS Polyglot Challengev2 is now available on the xss.report platform. Source: web.archive.org/web/2019061711… Thanks FD and crlf #xss #polyglot #polyglotxss

Say hello to the Polyglot Payload.
The complete payload for the XSS Polyglot Challengev2 is now available on the xss.report platform. 

Source: web.archive.org/web/2019061711… 

Thanks <a href="/filedescriptor/">FD</a> and crlf 
#xss #polyglot #polyglotxss
KNOXSS (@kn0x55) 's Twitter Profile Photo

Basic Static Analysis Script (to find possible #XSS in source code) #!/bin/bash # 1) save it as xssaminer # 2) allow execution: chmod +x xssaminer # 3) run it & check usage: ./xssaminer if [ -z $1 ] then echo -e "Usage:\n$0 FILE\n$0 -r FOLDER" exit else f=$1 fi sources=(GET

Basic Static Analysis Script 
(to find possible #XSS in source code)

#!/bin/bash

# 1) save it as xssaminer
# 2) allow execution: chmod +x xssaminer
# 3) run it &amp; check usage: ./xssaminer

if [ -z $1 ]
then
echo -e "Usage:\n$0 FILE\n$0 -r FOLDER"
exit
else
f=$1
fi

sources=(GET
d4d (@d4d89704243) 's Twitter Profile Photo

You can bypass path-based WAF restrictions by appending raw/unencoded non-printable and extended-ASCII characters like \x09 (Spring), \xA0 (Express), and \x1C-1F (Flask):

You can bypass path-based WAF restrictions by appending raw/unencoded non-printable and extended-ASCII characters like \x09 (Spring), \xA0 (Express), and \x1C-1F (Flask):
elsec 🪓 (@adrielsec) 's Twitter Profile Photo

This repository contain a lot of web and API vulnerability checklist , a lot of vulnerability ideas and tips. #bugbounty #bugbountytip #bugbountytips github.com/Az0x7/vulnerab…

7h3h4ckv157 (@7h3h4ckv157) 's Twitter Profile Photo

This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter Source: github.com/Az0x7/vulnerab…

This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter

Source: github.com/Az0x7/vulnerab…
X (@themsterdoctor1) 's Twitter Profile Photo

🚀 **Hack Like a Pro:** Extract IPs from Shodan HTML in Seconds! 🔥 Sick of digging through HTML? Let `grep` do the work! 💻 ```bash grep -oP '(?<=<strong>).*?(?=</strong>)' ip.html > ips ``` 1️⃣ **Save Shodan page source as HTML** 2️⃣ **Run this command** 3️⃣ **BOOM 💥** — All

Rony (@ronycoder) 's Twitter Profile Photo

𝐀𝐥𝐥 𝐏𝐚𝐢𝐝 𝐂𝐨𝐮𝐫𝐬𝐞𝐬 (𝐅𝐫𝐞𝐞 𝐟𝐨𝐫 𝐅𝐢𝐫𝐬𝐭 𝟓𝟎𝟎𝟎 𝐏𝐞𝐨𝐩𝐥𝐞)😍👇 1. Artificial Intelligence 2. Machine Learning 3. Cloud Computing 4. Ethical Hacking 5. Data Analytics 6. AWS Certified 7. Data Science 8. BIG DATA 9. Python 10. MBA And for 48 hrs, it's 100%

𝐀𝐥𝐥 𝐏𝐚𝐢𝐝 𝐂𝐨𝐮𝐫𝐬𝐞𝐬 (𝐅𝐫𝐞𝐞 𝐟𝐨𝐫 𝐅𝐢𝐫𝐬𝐭 𝟓𝟎𝟎𝟎 𝐏𝐞𝐨𝐩𝐥𝐞)😍👇

1. Artificial Intelligence
2. Machine Learning
3. Cloud Computing
4. Ethical Hacking
5. Data Analytics
6. AWS Certified
7. Data Science
8. BIG DATA
9. Python
10. MBA

And for 48 hrs, it's 100%
VAIDIK PANDYA (@h4x0r_fr34k) 's Twitter Profile Photo

Email Verification Bypasses ? Here are 10 Blogs about Email Verification Vulnerabilites ! 1. medium.com/@mohamed.yasse… 2. medium.com/@akrachliy/ema… 3. shrirangdiwakar.medium.com/how-i-turned-0… 4. mo9khu93r.medium.com/discovered-a-u… 5. medium.com/@mo9khu93r/how… 6. bevijaygupta.medium.com/email-verifica… 7.