epicbounties (@epicbounties) 's Twitter Profile
epicbounties

@epicbounties

The fastest-growing Bug Bounty platform

ID: 1317047128359927808

linkhttps://www.epicbounties.com/ calendar_today16-10-2020 10:18:27

414 Tweet

538 Followers

155 Following

epicbounties (@epicbounties) 's Twitter Profile Photo

If you need to find "interesting" targets from a huge set of web-based host, go ahead and use your favorite screenshotting tool like normal and then run them through Eyeballer to tell you what's likely to contain vulnerabilities, and what isn't ๐Ÿ”Ž๐Ÿ“‹ . buff.ly/3JYFUSc

If you need to find "interesting" targets from a huge set of web-based host, go ahead and use your favorite screenshotting tool like normal and then run them through Eyeballer to tell you what's likely to contain vulnerabilities, and what isn't ๐Ÿ”Ž๐Ÿ“‹ . buff.ly/3JYFUSc
epicbounties (@epicbounties) 's Twitter Profile Photo

If you don't have time to configure, host, debug and maintain your own infrastructure to analyse websites at scale ๐Ÿ”Ž๐Ÿ“‹, wappalyzer offer a SaaS solution that has all the same capabilities and a lot more. Learn more here: buff.ly/3Ps8L2H

If you don't have time to configure, host, debug and maintain your own infrastructure to analyse websites at scale ๐Ÿ”Ž๐Ÿ“‹, wappalyzer offer a SaaS solution that has all the same capabilities and a lot more. Learn more here: buff.ly/3Ps8L2H
epicbounties (@epicbounties) 's Twitter Profile Photo

Scan a web app for use of vulnerable JavaScript libraries with this tool ๐Ÿงฐ๐Ÿ”Ž. Using the provided Grunt plugin you can easily include Retire.js into your build process. Retire.js also provides a chrome extension allowing you to detect libraries while surfing your website

Scan a web app for use of vulnerable JavaScript libraries with this tool ๐Ÿงฐ๐Ÿ”Ž. Using the provided Grunt plugin you can easily include Retire.js into your build process. Retire.js also provides a chrome extension allowing you to detect libraries while surfing your website
epicbounties (@epicbounties) 's Twitter Profile Photo

Now let's talk about content discovery tools ๐Ÿ”Ž. Go buster is used to brute-force URIs including directories and files, DNS subdomains, virtual host names and open amazon S3 buckets ๐Ÿ”ซ๐Ÿ›ก๏ธ. Check it out> buff.ly/36asIor

Now let's talk about content discovery tools ๐Ÿ”Ž. Go buster is used to brute-force URIs including directories and files, DNS subdomains, virtual host names and open amazon S3 buckets ๐Ÿ”ซ๐Ÿ›ก๏ธ. Check it out> buff.ly/36asIor
epicbounties (@epicbounties) 's Twitter Profile Photo

Brute force combined with a wordlist to search ๐Ÿ”ญ for unlinked content in target directories ๐Ÿงฐ, that's feroxbuster, forced browsing. Try it now >> buff.ly/3iIWaYh

Brute force combined with a wordlist to search ๐Ÿ”ญ for unlinked content in target directories ๐Ÿงฐ, that's feroxbuster, forced browsing. Try it now >> buff.ly/3iIWaYh
epicbounties (@epicbounties) 's Twitter Profile Photo

A Fast web crawler for us hackers, extract all URL endpoints from an application and simply dump them to the command-line, including any subdoamin it finds along the way ๐Ÿš€๐Ÿ“‹ . Find out more about it here >> buff.ly/37ySBPu

A Fast web crawler for us hackers, extract all URL endpoints from an application and simply dump them to the command-line, including any subdoamin it finds along the way ๐Ÿš€๐Ÿ“‹ . Find out more about it here >> buff.ly/37ySBPu
epicbounties (@epicbounties) 's Twitter Profile Photo

Identifying hidden, unlinked parameters it's easier than you might think โšก, guess up to 65,000 param names per request ๐Ÿ”ซ. Go and try it >> buff.ly/3APxFFs

Identifying hidden, unlinked parameters it's easier than you might think โšก, guess up to 65,000 param names per request ๐Ÿ”ซ. Go and try it >> buff.ly/3APxFFs
epicbounties (@epicbounties) 's Twitter Profile Photo

Todayโ€™s web applications have lots of parameters so Arjun comes as a useful tool to discover those hidden parameters to give you a greater attack surface ๐Ÿ•ต๏ธ๐Ÿ‘พโš ๏ธ. >> buff.ly/332u7eU

Todayโ€™s web applications have lots of parameters so Arjun comes as a useful tool to discover those hidden parameters to give you a greater attack surface ๐Ÿ•ต๏ธ๐Ÿ‘พโš ๏ธ. >> buff.ly/332u7eU
epicbounties (@epicbounties) 's Twitter Profile Photo

Letยดs jump directly to fuzzing tools with fuzzilli, not the pasta but the tool., a guided fuzzer for dynamic language interpreters based on a custom intermediate language ("FuzzIL") which can be mutated and translated to JavaScript ๐Ÿ”Ž๐Ÿ“‹ . buff.ly/2TncEsC

Letยดs jump directly to fuzzing tools with fuzzilli, not the pasta but the tool., a guided fuzzer for dynamic language interpreters based on a custom intermediate language ("FuzzIL") which can be mutated and translated to JavaScript ๐Ÿ”Ž๐Ÿ“‹ . buff.ly/2TncEsC
epicbounties (@epicbounties) 's Twitter Profile Photo

Now the turn is for VAF, the computerized tool used to fuzz the files and directories from the target domain. It can be used to automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program and detect the bug ๐Ÿ‘พ

Now the turn is for VAF, the computerized tool used to fuzz the files and directories from the target domain. It can be used to automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program and detect the bug ๐Ÿ‘พ
epicbounties (@epicbounties) 's Twitter Profile Photo

Commix is verything you need to perform effective command injection attacks against multiple operating systems and applications ๐Ÿ”Ž๐Ÿ“‹, written in phyton, easy to use and compatible with multiple penetration testing tools and freamworks. Read more here: buff.ly/3FgJ1Cq

Commix is verything you need to perform effective command injection attacks against multiple operating systems and applications ๐Ÿ”Ž๐Ÿ“‹, written in phyton, easy to use and compatible with multiple penetration testing tools and freamworks. Read more here: buff.ly/3FgJ1Cq
epicbounties (@epicbounties) 's Twitter Profile Photo

Let us introduce the most powerful CRLF injection scanner ๐Ÿ†, we don't need to say anything else about it, just try it and make the most of it >> buff.ly/3POKAeL

Let us introduce the most powerful CRLF injection scanner ๐Ÿ†, we don't need to say anything else about it, just try it and make the most of it >> buff.ly/3POKAeL
epicbounties (@epicbounties) 's Twitter Profile Photo

Meet the fastest โšกCRLF vulnerability scanning tool written in Go. The installation is easy. You can download โฌ‡๏ธ a prebuilt binary from the releases page, unpack and run it! Try it and learn more about this tool. ๐Ÿค ๐Ÿ‘Œ >> buff.ly/3XZYWxz

Meet the fastest โšกCRLF vulnerability scanning tool written in Go. The installation is easy. You can download โฌ‡๏ธ a prebuilt binary from the releases page, unpack and run it! Try it and learn more about this tool. ๐Ÿค ๐Ÿ‘Œ >> buff.ly/3XZYWxz
epicbounties (@epicbounties) 's Twitter Profile Photo

Today ๐Ÿ“† we want to introduce you XSRFProbe, an advanced cross-site forgery (CSRF/XSRF) auditing.๐Ÿ”‹Equipped with a powerful crawling engine and numerous systematic checks, able to detect most cases of CSRF vulnerabilities.๐Ÿ”ŽFor more info on how works: buff.ly/3C8AW31

Today ๐Ÿ“† we want to introduce you XSRFProbe, an advanced cross-site forgery (CSRF/XSRF) auditing.๐Ÿ”‹Equipped with a powerful crawling engine and numerous systematic checks, able to detect most cases of CSRF vulnerabilities.๐Ÿ”ŽFor more info on how works: buff.ly/3C8AW31
epicbounties (@epicbounties) 's Twitter Profile Photo

Now,โฒ๏ธwe have LFI Exploitation tool๐Ÿ”งA little python tool to perform Local file inclusion. Is the improved version of liffy which was originally created by rotlogix/liffy. It has a particular focus on using PHP Input, PHP Filter, and Data URI methods.๐Ÿง >> buff.ly/3a2QEMw

Now,โฒ๏ธwe have LFI Exploitation tool๐Ÿ”งA little python tool to perform Local file inclusion. Is the improved version of liffy which was originally created by rotlogix/liffy. It has a particular focus on using PHP Input, PHP Filter, and Data URI methods.๐Ÿง >> buff.ly/3a2QEMw
epicbounties (@epicbounties) 's Twitter Profile Photo

Bugs are a problem ๐Ÿ˜ž, but for participants in bug bounty programs, they can be a source of income! ๐Ÿคฉ Join a #bugbounty program and help improve web security ๐Ÿงฐ. #dataprotection

epicbounties (@epicbounties) 's Twitter Profile Photo

Number 1๏ธโƒฃ of the biggest security holes is passwords. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from a remote to a system. โš ๏ธTHIS TOOL IS FOR LEGAL PURPOSES ONLY! โš ๏ธ

Number 1๏ธโƒฃ of the biggest security holes is passwords. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from a remote to a system.

โš ๏ธTHIS TOOL IS FOR LEGAL PURPOSES ONLY! โš ๏ธ
epicbounties (@epicbounties) 's Twitter Profile Photo

Is an automatic authorization enforcement detection extension for Burp Suite. It was written in Python by Barak Tawily, an application security expert. Autorize was designed to help security ๐Ÿ”ง testers by performing automatic authorization tests. ๐Ÿ‘€ >> buff.ly/3EFmBwa

Is an automatic authorization enforcement detection extension for Burp Suite. It was written in Python by Barak Tawily, an application security expert. Autorize was designed to help security ๐Ÿ”ง testers by performing automatic authorization tests. ๐Ÿ‘€ >> buff.ly/3EFmBwa
epicbounties (@epicbounties) 's Twitter Profile Photo

๐Ÿ’ฅ Meet Headi! is a customizable and automated HTTP header injection. ๐Ÿง‘โ€๐Ÿ’ป Example run from the HTB machine Control. Learn more about in the following link >> buff.ly/3EHvQvw

๐Ÿ’ฅ Meet Headi! is a customizable and automated HTTP header injection. ๐Ÿง‘โ€๐Ÿ’ป Example run from the HTB machine Control. 

Learn more about in the following link >> buff.ly/3EHvQvw
epicbounties (@epicbounties) 's Twitter Profile Photo

โšก This is a burp plugin (python) that extracts keywords from response using regexes and test for reflected XSS on the target scope. Valid parameters reflected, vulnerable parameters are show in results in the rexsser extension tab. ๐Ÿง  Read more >> buff.ly/3EHA2eR

โšก This is a burp plugin (python) that extracts keywords from response using regexes and test for reflected XSS on the target scope. Valid parameters reflected, vulnerable parameters are show in results in the rexsser extension tab. ๐Ÿง   Read more >> buff.ly/3EHA2eR