0x0smilex (@assa2940) 's Twitter Profile
0x0smilex

@assa2940

bug hunter πŸ›
ethical hacker / noob πŸ€“/
Follow for cool stuffs! πŸ€™πŸ»

ID: 1649761979689492487

calendar_today22-04-2023 13:08:22

214 Tweet

340 Followers

86 Following

0x0smilex (@assa2940) 's Twitter Profile Photo

I decided to use deepseek to generate cool FOFA dork to expose firebase credentials πŸ‘ŒπŸ»πŸ”₯ Tip:Use AI I recommend deepseek in your bug bounty, you just have to be creative on how you prompt itπŸ˜‰ Thanks DarkShadow for the Tip on this #BugBounty #bugbountytips #hackerone

I decided to use deepseek to generate cool <a href="/fofabot/">FOFA</a> dork to expose firebase credentials πŸ‘ŒπŸ»πŸ”₯
Tip:Use AI I recommend deepseek in your bug bounty, you just have to be creative on how you prompt itπŸ˜‰
Thanks <a href="/darkshadow2bd/">DarkShadow</a> for the Tip on this
#BugBounty #bugbountytips 
#hackerone
KNOXSS (@kn0x55) 's Twitter Profile Photo

*** KNOXSS GIVEAWAY June 2025 *** Directions: 1. Like 2. Share 3. Be a follower Prize: KNOXSS Pro for 1 Month Results: June 10th Number of Winners: 3 Good luck! πŸ˜€ knoxss.pro - #XSS for pros. #BugBounty #PenTesting

0x0smilex (@assa2940) 's Twitter Profile Photo

This csrf exploit when clicked it can Re-generate any user's Support Pin without there consent πŸ”₯πŸ‘ŒπŸ», haven't report for a while at bugcrowd #BugBounty #bugbountytip #Hacking

This csrf exploit when clicked it can Re-generate any user's Support Pin without there consent πŸ”₯πŸ‘ŒπŸ», haven't report for a while at <a href="/Bugcrowd/">bugcrowd</a> 
#BugBounty  #bugbountytip 
#Hacking
0x0smilex (@assa2940) 's Twitter Profile Photo

Google dork is still alive πŸ”₯πŸ˜…, deepseek helped to generate a simple payload:<h1><img/src=x onerror=alert(1)></h1> #bugbounty #Hacking #bugbountytips #hackerone

Google dork is still alive πŸ”₯πŸ˜…, deepseek helped to generate a simple payload:&lt;h1&gt;&lt;img/src=x onerror=alert(1)&gt;&lt;/h1&gt;
#bugbounty #Hacking #bugbountytips #hackerone
0x0smilex (@assa2940) 's Twitter Profile Photo

A simple google dork + Ghauri did the work for me, time delay payload: if(now()=sysdate(),sleep(4),0) motivation from: Godfather Orwa πŸ‡―πŸ‡΄ N$ πŸ”₯ #BugBounty #Hacking #bugbountytips #hackerone

A simple google dork + Ghauri did the work for me,
time delay payload: if(now()=sysdate(),sleep(4),0) motivation from: <a href="/GodfatherOrwa/">Godfather Orwa πŸ‡―πŸ‡΄</a> <a href="/nav1n0x/">N$</a> πŸ”₯
#BugBounty #Hacking #bugbountytips #hackerone
0x0smilex (@assa2940) 's Twitter Profile Photo

Time-Based sql injection πŸ˜‰β²οΈ, from PS , as always thanks Coffin for the Amazing methodologies. Tips:Use waybackurl,filter alive urls,use gf |sqli| then do mass url scan in sqlmap or ghauri #BugBounty #bugbountytips #sqlinjection #Hacking #CyberSecurity

Time-Based sql injection πŸ˜‰β²οΈ, from <a href="/ProwlSec/">PS</a> , as always thanks <a href="/coffinxp7/">Coffin</a> for the Amazing methodologies. Tips:Use waybackurl,filter alive urls,use gf |sqli| then do mass url scan in sqlmap or ghauri
#BugBounty #bugbountytips #sqlinjection #Hacking #CyberSecurity
0x0smilex (@assa2940) 's Twitter Profile Photo

Please support my T-shirt Designs business on gumroad: shirtsdesignz.gumroad.com/l/vintagedesig… A Bundle of Vintage style Printables (Transparent) T-shirt Designs. #DigitalProducts #ecommerce #Tshirts #creativeinnovation #Gumroad #sidehustle #buildinginpublic #HustleMode

0x0smilex (@assa2940) 's Twitter Profile Photo

Vulnerable salesforce target gave me and unixtz Access to sensitive Info; like Emails,Phone numbers,Pyhsical address.. Thanks ZoomEye for the amazing tool πŸ”₯ #BugBounty #bugbountytips #Hacking #togetherwecan

Vulnerable salesforce target gave me and <a href="/iamunixtz/">unixtz</a>  Access to sensitive Info; like Emails,Phone numbers,Pyhsical address.. Thanks <a href="/zoomeye_team/">ZoomEye</a> for the amazing tool πŸ”₯
#BugBounty #bugbountytips #Hacking #togetherwecan
0x0smilex (@assa2940) 's Twitter Profile Photo

Hellow my dear Followers, iam a bit busy these days,but i will be back soon πŸ’»πŸ”₯ BugBounty Tip:Keep grinding, it may seem boring, but remember "No pain no Gain" πŸ’ͺ🏻 #BugBounty #hackers #bugbountytips #TogetherWeCan #bugbountytip

0x0smilex (@assa2940) 's Twitter Profile Photo

Back with some #bugbountytips : simple but effective way "Google dorking" led me to a vulnerable param Dont ignore the power of google dorking or assuming it wont work #bugbountytips #BugBounty #sqlinjection #CyberSecurity

Back with some #bugbountytips : simple but effective way "Google dorking" led me to a vulnerable param
Dont ignore the power of google dorking or assuming it wont work
#bugbountytips #BugBounty #sqlinjection #CyberSecurity
0x0smilex (@assa2940) 's Twitter Profile Photo

Full DataBase compromised: Admin Creds Leaked #bugbountytips : Google dorking is your friend: inur:......._items.php?id= #bugbountytips #BugBounty #sqlinjection HackerOne #CyberSecurity

Full DataBase compromised: Admin Creds Leaked
#bugbountytips : Google dorking is your friend: inur:......._items.php?id=
#bugbountytips #BugBounty #sqlinjection <a href="/Hacker0x01/">HackerOne</a> #CyberSecurity
0x0smilex (@assa2940) 's Twitter Profile Photo

Tips:Use AI to make cool and fast python tools, eg;- I used gemini to make this tool and it got an XSS already πŸ˜‰ #BugBounty #xss #bugbountytips #Hacking #bugbountytip

Tips:Use AI to make cool and fast python tools, eg;- I used gemini to make this tool and it got an XSS already πŸ˜‰
#BugBounty #xss #bugbountytips #Hacking 
#bugbountytip
0x0smilex (@assa2940) 's Twitter Profile Photo

Example of the modified xss payload from the smilexss tool 🫴Tips: i used this dork inurl:q= | inurl:s= | inurl:search= | inurl:query= | inurl:keyword= | inurl:lang= inurl:& site:example.com #BugBounty #bugbountytips #bugbountytip #xss #googledorking

Example of the modified xss payload from the smilexss tool 🫴Tips: i used this dork inurl:q= | inurl:s= | inurl:search= | inurl:query= | inurl:keyword= | inurl:lang= inurl:&amp; site:example.com
#BugBounty #bugbountytips #bugbountytip #xss #googledorking
0x0smilex (@assa2940) 's Twitter Profile Photo

#bugbountytips :Used aws s3 tool to write some files in this vulnerable s3 bucket, use google dorks guys site:s3.amazonaws.com "example.com" #BugBounty #bugbountytips #Hacking #CyberSecurity

#bugbountytips :Used aws s3 tool to write some files in this vulnerable s3 bucket, use google dorks guys site:s3.amazonaws.com "example.com"
#BugBounty #bugbountytips #Hacking #CyberSecurity
0x0smilex (@assa2940) 's Twitter Profile Photo

XSS via s3 bucket misconfig, Tool: BucketList v4.1.1 Lesson: AI is not your enemy #bugbountytips #BugBounty #Cybersecurity

XSS via s3 bucket misconfig, Tool: BucketList v4.1.1  Lesson: AI is not your enemy
#bugbountytips #BugBounty #Cybersecurity
0x0smilex (@assa2940) 's Twitter Profile Photo

F5 BIG-IP RCE: A trivial TMUI flaw led to RCE. Need to quickly audit your own company's exposure? Use the specific Shodan dork: title:"BIG-IP&reg;" org:"[Your Company's Legal Name]" πŸ‘ˆ Patch now. #BIGIP #RCE #Exploit #Security #BugBounty #bugbountytips

F5 BIG-IP RCE: A trivial TMUI flaw led to RCE. Need to quickly audit your own company's exposure? Use the specific Shodan dork: title:"BIG-IP&amp;reg;" org:"[Your Company's Legal Name]" πŸ‘ˆ Patch now. #BIGIP #RCE #Exploit #Security #BugBounty #bugbountytips
0x0smilex (@assa2940) 's Twitter Profile Photo

Tip:Google dork is still alive!!πŸ”₯ payload used:<svg><animate onbegin=alert(1) attributeName=x dur=1s> Source:portswigger.net/web-security/c… #BugBounty #bugbountytips #cybersecurity #googledorks #xss

Tip:Google dork is still alive!!πŸ”₯ payload used:&lt;svg&gt;&lt;animate onbegin=alert(1) attributeName=x dur=1s&gt;
Source:portswigger.net/web-security/c…
#BugBounty #bugbountytips #cybersecurity
#googledorks #xss
0x0smilex (@assa2940) 's Twitter Profile Photo

Ivanti unauthenticated RCE πŸ™‚, shodan favicon dorks:github.com/yoryio/ShodanF… exploit:shorturl.at/1L16Y For Education Purpose Only! #InfoSec #bugbountytips #BugBounty #rce

Ivanti unauthenticated RCE πŸ™‚, shodan favicon dorks:github.com/yoryio/ShodanF… exploit:shorturl.at/1L16Y
For Education Purpose Only!
#InfoSec #bugbountytips #BugBounty #rce
0x0smilex (@assa2940) 's Twitter Profile Photo

Leaked Creds in Response 🫴: Admin accounts, Service logins:= (Telnet/FTP/SMB/Console),Camera access,Internal IPs,Management interfaces. Tip: Always Look for something in the response after messing with the request #BugBounty #bugbountytips #InfoSec #leaks #Hacking

Leaked Creds in Response 🫴: Admin accounts,
Service logins:= (Telnet/FTP/SMB/Console),Camera access,Internal IPs,Management interfaces. Tip: Always Look for something in the response after messing with the request
#BugBounty #bugbountytips #InfoSec #leaks #Hacking
0x0smilex (@assa2940) 's Twitter Profile Photo

Simple xss payload injected and executed in search bar just by using a simple xss payload from:shorturl.at/wYJws (PortSwigger ) #bugbountytips:inurl:"product.php?ID=" add this to your google dork lists for bug hunting πŸ€‘ #BugBounty #bugbountytips #Hacking #xss

Simple xss payload injected and executed in search bar just by using a simple xss payload from:shorturl.at/wYJws (<a href="/PortSwigger/">PortSwigger</a> )
#bugbountytips:inurl:"product.php?ID=" add this to your google dork lists for bug hunting πŸ€‘
#BugBounty #bugbountytips #Hacking #xss