Sergey
@or_serg
HackerOne hackerone.com/orlserg, prev @Robocash1, @replit
ID: 1956592988
12-10-2013 12:50:47
41 Tweet
13 Followers
48 Following
xargs -a domain -I@ -P500 sh -c 'shuffledns -d "@" -silent -w words.txt -r resolvers.txt' | httpx -silent -threads 1000 | nuclei -t /root/nuclei-templates/ -o re1 ๐ Nuclei by ProjectDiscovery ProjectDiscovery #bugbounty #bugbountytips
Nuclei Templates v8.2.3 release ๐๐ ๐ก๐๐บ๐ฏ๐ฒ๐ฟ ๐ผ๐ณ ๐ป๐ฒ๐๐น๐ ๐ฎ๐ฑ๐ฑ๐ฒ๐ฑ ๐๐ฒ๐บ๐ฝ๐น๐ฎ๐๐ฒ๐: 37 ๐ง๐ฒ๐บ๐ฝ๐น๐ฎ๐๐ฒ๐ ๐ฐ๐ต๐ฎ๐ป๐ด๐ฒ๐น๐ผ๐ด: github.com/projectdiscoveโฆ #hackwithautomation #pentest #cybersecurity #bugbounty
Hi TJ ๐บ๐ฆ๐จ๐ฆ. I discovered a critical vulnerability on the apex.sh site. I couldn't find an email address for security contacts. Also I cannot write you DM. I will be happy to tell you the details of the problem. Please contact me.
Articles worth reading discovered last week: ๐ blog.pksecurity.io/2023/01/16/202โฆ ๐ about.gitlab.com/blog/2023/01/2โฆ ๐ blog.viettelcybersecurity.com/saml-show-stopโฆ ๐ synacktiv.com/sites/default/โฆ ๐ blog.assetnote.io/2023/01/24/yelโฆ ๐ pathonproject.com/zb/?196945362fโฆ ๐ github.blog/2023-01-27-bypโฆ #PentesterLabWeekly
I recently developed and posted about a technique called "First sequence sync", expanding James Kettle's single packet attack. This technique allowed me to send 10,000 requests in 166ms, which breaks the packet size limitation of the single packet attack. flatt.tech/research/postsโฆ
While playing a challenge by Salvatore Abello, I found a pretty interesting way to exploit Dangling Markup with a strict CSP. All you need is an <iframe>, <object> or <embed> set to about:blank, with a dangling name= attribute. This vulnerable page should be iframable.