DIMOOON 🇺🇦 (@reewardius) 's Twitter Profile
DIMOOON 🇺🇦

@reewardius

./acunetix -u kremlin.ru -t ~/shutdown_payloads/

ID: 1377943862698770435

calendar_today02-04-2021 11:20:12

3,3K Tweet

727 Takipçi

1,1K Takip Edilen

X S C O R P (@xscorp7) 's Twitter Profile Photo

Power up your recon with BeVigil CLI bevigil-cli is a handy tool to extract assets like subdomains, URL params, hosts, S3 buckets, URLs from android applications through BeVigil OSINT API with ease. It has finally been released on github. github.com/Bevigil/BeVigi… [1/n]

Hussein Daher (@hussein98d) 's Twitter Profile Photo

Vulnerability of the day: host[.]xyz/.DS_Store --> strings --> zip file containing older JS files --> authentication token leak #bugbounty

Vulnerability of the day:
host[.]xyz/.DS_Store --> strings --> zip file containing older JS files --> authentication token leak

#bugbounty
Paul Seekamp (@nullenc0de) 's Twitter Profile Photo

This my new favorite tool. Although, I'm biased because I made it. I always felt like FFUF and FFUFPostProcessor should be married. So, I glued them together. github.com/nullenc0de/FFU…

This my new favorite tool. Although, I'm biased because I made it. I always felt like FFUF and FFUFPostProcessor should be married. So, I glued them together.

github.com/nullenc0de/FFU…
Paul Seekamp (@nullenc0de) 's Twitter Profile Photo

Tired of finding Cognito tokens in JS files and manually converting them into session tokens? I built this tool. It allowed me to gain access to a web app. If anyone can figure out how to forge admin roles that would be awesome. Check it out here: github.com/nullenc0de/Cog…

Emad Shanab - أبو عبد الله (@alra3ees) 's Twitter Profile Photo

Automate bug bounty. SQLI - XSS - LFI waymore -i urls | tee urls-his cat urls-his | gf sqli |urless| anew sqli cat urls-his | gf xss | urless|anew xss cat urls-his | gf lfi | urless|anew lfi ghauri -m sqli --confirm --batch --level=3 -b knoxnl -i xss -X BOTH python3

/ XNL -н4cĸ3r (and @xnl-h4ck3r in the new Sky) (@xnl_h4ck3r) 's Twitter Profile Photo

🛠️ waymore: Tip #5 📝 With -mode R there can be LOTS of files. Everyone looks at JS files, but don't forget inline JS! For ease you can use --output-inline-js to get a file of external JS files referenced in ALL inline JS, plus file(s) of combined inline JS for easier review 🤘

🛠️ waymore: Tip #5 📝

With -mode R there can be LOTS of files. Everyone looks at JS files, but don't forget inline JS!
For ease you can use --output-inline-js to get a file of external JS files referenced in ALL inline JS, plus file(s) of combined inline JS for easier review 
🤘
Frogy (@iamthefrogy) 's Twitter Profile Photo

My entire month is dedicated to my project. github.com/iamthefrogy/fr… External ASM Tool for Bug-Hunters/Pentesters and Red-Teamers. #cybersecurity #infosec #informationsecurity #bughunting #bugbounty #bugbountytips #bugbountytip

My entire month is dedicated to my project.

github.com/iamthefrogy/fr…

External ASM Tool for Bug-Hunters/Pentesters and Red-Teamers.

#cybersecurity #infosec #informationsecurity #bughunting #bugbounty #bugbountytips #bugbountytip
Six2dez (@six2dez1) 's Twitter Profile Photo

Super excited to share reconftw_ai 🎉 A new tool that reads reconftw results and uses a local LLM (Ollama) to generate actionable reports: bughunter, executive, or brief. It’s lightweight, fast, and helps turn raw recon into insights. Give it a spin! github.com/six2dez/reconf…

Super excited to share reconftw_ai 🎉
A new tool that reads reconftw results and uses a local LLM (Ollama) to generate actionable reports: bughunter, executive, or brief.
It’s lightweight, fast, and helps turn raw recon into insights.
Give it a spin!
github.com/six2dez/reconf…
Emad Shanab - أبو عبد الله (@alra3ees) 's Twitter Profile Photo

Found another 6 SQLI vulnerabilities, I will report them after finishing my work. My target is PHP,Mysql, behind cloudflare. Using proxychains to bypass the WAF.

N$ (@nav1n0x) 's Twitter Profile Photo

Make sure to test mobile endpoints, not just mobile apps—test m.target.com. Mobile front-ends often run on separate infra, different WAF policies with different code base for huge sites like gaming/chat etc, hiding unique vuln surfaces...#BugBounty #SQLi #SQLMap [1/n]

Make sure to test mobile endpoints, not just mobile apps—test m.target.com. Mobile front-ends often run on separate infra, different WAF policies with different code base for huge sites like gaming/chat etc, hiding unique vuln surfaces...#BugBounty #SQLi #SQLMap [1/n]
Meydi (@neotrony) 's Twitter Profile Photo

Just found an interesting behavior in Firefox that can be used for XSS: If a response lacks the Content-Type header, Firefox renders it as text/plain. But if the URL ends with an extension like .html, Firefox treats it as that. #bugbounty #bugbountytips

Just found an interesting behavior in Firefox that can be used for XSS:
If a response lacks the Content-Type header, Firefox renders it as text/plain.
But if the URL ends with an extension like .html, Firefox treats it as that.
#bugbounty #bugbountytips
ProjectDiscovery (@pdiscoveryio) 's Twitter Profile Photo

Did you know naabu supports UDP port scanning too? 🚀 Just run: naabu -l <targets> -p u:<port>,<port>,<port> Super handy for broadening your recon game. #opensource #hacking #cybersecurity #portscanning #bugbounty

Did you know naabu supports UDP port scanning too? 🚀

Just run: naabu -l &lt;targets&gt; -p u:&lt;port&gt;,&lt;port&gt;,&lt;port&gt;

Super handy for broadening your recon game.

#opensource #hacking #cybersecurity #portscanning #bugbounty
bugcrowd (@bugcrowd) 's Twitter Profile Photo

Live-stream your jq output with the --unbuffered flag😎 It prints results line by line so it's perfect for long-running JSON streams. Check it out 👇