0x0smilex (@assa2940) 's Twitter Profile
0x0smilex

@assa2940

bug hunter 🐛
ethical hacker / noob 🤓/
Follow for cool stuffs! 🤙🏻

ID: 1649761979689492487

calendar_today22-04-2023 13:08:22

214 Tweet

340 Takipçi

86 Takip Edilen

0x0smilex (@assa2940) 's Twitter Profile Photo

I decided to use deepseek to generate cool FOFA dork to expose firebase credentials 👌🏻🔥 Tip:Use AI I recommend deepseek in your bug bounty, you just have to be creative on how you prompt it😉 Thanks DarkShadow for the Tip on this #BugBounty #bugbountytips #hackerone

I decided to use deepseek to generate cool <a href="/fofabot/">FOFA</a> dork to expose firebase credentials 👌🏻🔥
Tip:Use AI I recommend deepseek in your bug bounty, you just have to be creative on how you prompt it😉
Thanks <a href="/darkshadow2bd/">DarkShadow</a> for the Tip on this
#BugBounty #bugbountytips 
#hackerone
KNOXSS (@kn0x55) 's Twitter Profile Photo

*** KNOXSS GIVEAWAY June 2025 *** Directions: 1. Like 2. Share 3. Be a follower Prize: KNOXSS Pro for 1 Month Results: June 10th Number of Winners: 3 Good luck! 😀 knoxss.pro - #XSS for pros. #BugBounty #PenTesting

0x0smilex (@assa2940) 's Twitter Profile Photo

This csrf exploit when clicked it can Re-generate any user's Support Pin without there consent 🔥👌🏻, haven't report for a while at bugcrowd #BugBounty #bugbountytip #Hacking

This csrf exploit when clicked it can Re-generate any user's Support Pin without there consent 🔥👌🏻, haven't report for a while at <a href="/Bugcrowd/">bugcrowd</a> 
#BugBounty  #bugbountytip 
#Hacking
0x0smilex (@assa2940) 's Twitter Profile Photo

Google dork is still alive 🔥😅, deepseek helped to generate a simple payload:<h1><img/src=x onerror=alert(1)></h1> #bugbounty #Hacking #bugbountytips #hackerone

Google dork is still alive 🔥😅, deepseek helped to generate a simple payload:&lt;h1&gt;&lt;img/src=x onerror=alert(1)&gt;&lt;/h1&gt;
#bugbounty #Hacking #bugbountytips #hackerone
0x0smilex (@assa2940) 's Twitter Profile Photo

A simple google dork + Ghauri did the work for me, time delay payload: if(now()=sysdate(),sleep(4),0) motivation from: Godfather Orwa 🇯🇴 N$ 🔥 #BugBounty #Hacking #bugbountytips #hackerone

A simple google dork + Ghauri did the work for me,
time delay payload: if(now()=sysdate(),sleep(4),0) motivation from: <a href="/GodfatherOrwa/">Godfather Orwa 🇯🇴</a> <a href="/nav1n0x/">N$</a> 🔥
#BugBounty #Hacking #bugbountytips #hackerone
0x0smilex (@assa2940) 's Twitter Profile Photo

Time-Based sql injection 😉⏲️, from PS , as always thanks Coffin for the Amazing methodologies. Tips:Use waybackurl,filter alive urls,use gf |sqli| then do mass url scan in sqlmap or ghauri #BugBounty #bugbountytips #sqlinjection #Hacking #CyberSecurity

Time-Based sql injection 😉⏲️, from <a href="/ProwlSec/">PS</a> , as always thanks <a href="/coffinxp7/">Coffin</a> for the Amazing methodologies. Tips:Use waybackurl,filter alive urls,use gf |sqli| then do mass url scan in sqlmap or ghauri
#BugBounty #bugbountytips #sqlinjection #Hacking #CyberSecurity
0x0smilex (@assa2940) 's Twitter Profile Photo

Please support my T-shirt Designs business on gumroad: shirtsdesignz.gumroad.com/l/vintagedesig… A Bundle of Vintage style Printables (Transparent) T-shirt Designs. #DigitalProducts #ecommerce #Tshirts #creativeinnovation #Gumroad #sidehustle #buildinginpublic #HustleMode

0x0smilex (@assa2940) 's Twitter Profile Photo

Vulnerable salesforce target gave me and unixtz Access to sensitive Info; like Emails,Phone numbers,Pyhsical address.. Thanks ZoomEye for the amazing tool 🔥 #BugBounty #bugbountytips #Hacking #togetherwecan

Vulnerable salesforce target gave me and <a href="/iamunixtz/">unixtz</a>  Access to sensitive Info; like Emails,Phone numbers,Pyhsical address.. Thanks <a href="/zoomeye_team/">ZoomEye</a> for the amazing tool 🔥
#BugBounty #bugbountytips #Hacking #togetherwecan
0x0smilex (@assa2940) 's Twitter Profile Photo

Hellow my dear Followers, iam a bit busy these days,but i will be back soon 💻🔥 BugBounty Tip:Keep grinding, it may seem boring, but remember "No pain no Gain" 💪🏻 #BugBounty #hackers #bugbountytips #TogetherWeCan #bugbountytip

0x0smilex (@assa2940) 's Twitter Profile Photo

Back with some #bugbountytips : simple but effective way "Google dorking" led me to a vulnerable param Dont ignore the power of google dorking or assuming it wont work #bugbountytips #BugBounty #sqlinjection #CyberSecurity

Back with some #bugbountytips : simple but effective way "Google dorking" led me to a vulnerable param
Dont ignore the power of google dorking or assuming it wont work
#bugbountytips #BugBounty #sqlinjection #CyberSecurity
0x0smilex (@assa2940) 's Twitter Profile Photo

Full DataBase compromised: Admin Creds Leaked #bugbountytips : Google dorking is your friend: inur:......._items.php?id= #bugbountytips #BugBounty #sqlinjection HackerOne #CyberSecurity

Full DataBase compromised: Admin Creds Leaked
#bugbountytips : Google dorking is your friend: inur:......._items.php?id=
#bugbountytips #BugBounty #sqlinjection <a href="/Hacker0x01/">HackerOne</a> #CyberSecurity
0x0smilex (@assa2940) 's Twitter Profile Photo

Tips:Use AI to make cool and fast python tools, eg;- I used gemini to make this tool and it got an XSS already 😉 #BugBounty #xss #bugbountytips #Hacking #bugbountytip

Tips:Use AI to make cool and fast python tools, eg;- I used gemini to make this tool and it got an XSS already 😉
#BugBounty #xss #bugbountytips #Hacking 
#bugbountytip
0x0smilex (@assa2940) 's Twitter Profile Photo

Example of the modified xss payload from the smilexss tool 🫴Tips: i used this dork inurl:q= | inurl:s= | inurl:search= | inurl:query= | inurl:keyword= | inurl:lang= inurl:& site:example.com #BugBounty #bugbountytips #bugbountytip #xss #googledorking

Example of the modified xss payload from the smilexss tool 🫴Tips: i used this dork inurl:q= | inurl:s= | inurl:search= | inurl:query= | inurl:keyword= | inurl:lang= inurl:&amp; site:example.com
#BugBounty #bugbountytips #bugbountytip #xss #googledorking
0x0smilex (@assa2940) 's Twitter Profile Photo

#bugbountytips :Used aws s3 tool to write some files in this vulnerable s3 bucket, use google dorks guys site:s3.amazonaws.com "example.com" #BugBounty #bugbountytips #Hacking #CyberSecurity

#bugbountytips :Used aws s3 tool to write some files in this vulnerable s3 bucket, use google dorks guys site:s3.amazonaws.com "example.com"
#BugBounty #bugbountytips #Hacking #CyberSecurity
0x0smilex (@assa2940) 's Twitter Profile Photo

XSS via s3 bucket misconfig, Tool: BucketList v4.1.1 Lesson: AI is not your enemy #bugbountytips #BugBounty #Cybersecurity

XSS via s3 bucket misconfig, Tool: BucketList v4.1.1  Lesson: AI is not your enemy
#bugbountytips #BugBounty #Cybersecurity
0x0smilex (@assa2940) 's Twitter Profile Photo

F5 BIG-IP RCE: A trivial TMUI flaw led to RCE. Need to quickly audit your own company's exposure? Use the specific Shodan dork: title:"BIG-IP&reg;" org:"[Your Company's Legal Name]" 👈 Patch now. #BIGIP #RCE #Exploit #Security #BugBounty #bugbountytips

F5 BIG-IP RCE: A trivial TMUI flaw led to RCE. Need to quickly audit your own company's exposure? Use the specific Shodan dork: title:"BIG-IP&amp;reg;" org:"[Your Company's Legal Name]" 👈 Patch now. #BIGIP #RCE #Exploit #Security #BugBounty #bugbountytips
0x0smilex (@assa2940) 's Twitter Profile Photo

Tip:Google dork is still alive!!🔥 payload used:<svg><animate onbegin=alert(1) attributeName=x dur=1s> Source:portswigger.net/web-security/c… #BugBounty #bugbountytips #cybersecurity #googledorks #xss

Tip:Google dork is still alive!!🔥 payload used:&lt;svg&gt;&lt;animate onbegin=alert(1) attributeName=x dur=1s&gt;
Source:portswigger.net/web-security/c…
#BugBounty #bugbountytips #cybersecurity
#googledorks #xss
0x0smilex (@assa2940) 's Twitter Profile Photo

Ivanti unauthenticated RCE 🙂, shodan favicon dorks:github.com/yoryio/ShodanF… exploit:shorturl.at/1L16Y For Education Purpose Only! #InfoSec #bugbountytips #BugBounty #rce

Ivanti unauthenticated RCE 🙂, shodan favicon dorks:github.com/yoryio/ShodanF… exploit:shorturl.at/1L16Y
For Education Purpose Only!
#InfoSec #bugbountytips #BugBounty #rce
0x0smilex (@assa2940) 's Twitter Profile Photo

Leaked Creds in Response 🫴: Admin accounts, Service logins:= (Telnet/FTP/SMB/Console),Camera access,Internal IPs,Management interfaces. Tip: Always Look for something in the response after messing with the request #BugBounty #bugbountytips #InfoSec #leaks #Hacking

Leaked Creds in Response 🫴: Admin accounts,
Service logins:= (Telnet/FTP/SMB/Console),Camera access,Internal IPs,Management interfaces. Tip: Always Look for something in the response after messing with the request
#BugBounty #bugbountytips #InfoSec #leaks #Hacking
0x0smilex (@assa2940) 's Twitter Profile Photo

Simple xss payload injected and executed in search bar just by using a simple xss payload from:shorturl.at/wYJws (PortSwigger ) #bugbountytips:inurl:"product.php?ID=" add this to your google dork lists for bug hunting 🤑 #BugBounty #bugbountytips #Hacking #xss

Simple xss payload injected and executed in search bar just by using a simple xss payload from:shorturl.at/wYJws (<a href="/PortSwigger/">PortSwigger</a> )
#bugbountytips:inurl:"product.php?ID=" add this to your google dork lists for bug hunting 🤑
#BugBounty #bugbountytips #Hacking #xss