Abdullah Al Fahad (@frozenflame0001) 's Twitter Profile
Abdullah Al Fahad

@frozenflame0001

A #infosec & #cybersecurity lover. Would be #DOCTOR. ๐Ÿ˜ Right now, trying to learn #bugbountyhunting . Surely, I am nothing without my ALLAH.

ID: 1375423930597433346

linkhttps://everythingvuln1.blogspot.com/ calendar_today26-03-2021 12:26:50

660 Tweet

147 Followers

742 Following

KNOXSS (@kn0x55) 's Twitter Profile Photo

#DidYouKnow? #KNOXSS is the only #XSS tool that can pop an alert box in a DOUBLE INJECTION (2 inputs) in 2 different reflection contexts! Check the test page below, which requires a bypass on an alpha-based filter and a JSON encode function: brutelogic.com.br/lab/multix0.phโ€ฆ

#DidYouKnow?

#KNOXSS is the only #XSS tool that can pop an alert box in a DOUBLE INJECTION (2 inputs) in 2 different reflection contexts!

Check the test page below, which requires a bypass on an alpha-based filter and a JSON encode function:

brutelogic.com.br/lab/multix0.phโ€ฆ
Anmol Singh Yadav (@iamlucif3r_) 's Twitter Profile Photo

I found a tool called DorkSearch which facilitates in forming #google #dork queries. Check it out: Link๐Ÿ”—: dorksearch.com But be cautious because "Misuse of Google Dorking can be viewed as hacking in some countries"

Tushar Verma ๐Ÿ‡ฎ๐Ÿ‡ณ (@e11i0t_4lders0n) 's Twitter Profile Photo

How to start Bug Bounty Hunting Follow this thread ๐Ÿงต Note:I m assuming that you have cleared your basics #bugbounty #bugbountytip #bugbountytips

Jason Haddix (@jhaddix) 's Twitter Profile Photo

#bugbountytips ๐Ÿงต 1/x Starting from almost scratch. Testing Environment: DO Ubuntu VPS, 2 vCPUs. 4GB mem / 60GB Disk, ($20/mo) This works for most general tasks. In most VPS intensive tasks (content discovery, fuzzing, etc) memory is your bottleneck.

Brute Logic (@brutelogic) 's Twitter Profile Photo

#WAF #Bypass (Akamai's Kona) <a href="javas%09cript:[1].map(top['ale'+'rt'])"> Built with tricks you find in xsscheatsheet.com! PoC Vector: brutelogic.com.br/gym.php?p05=%3โ€ฆ PoC Bypass:

#WAF #Bypass 
(Akamai's Kona)

&lt;a href="javas%09cript:[1].map(top['ale'+'rt'])"&gt;

Built with tricks you find in xsscheatsheet.com!

PoC Vector:
brutelogic.com.br/gym.php?p05=%3โ€ฆ

PoC Bypass:
Andrei (@handrei_1) 's Twitter Profile Photo

Don't even bother activating #windows. It's so easy to get all the locked features without paying or using some weird activator (a thread๐Ÿ‘‡)

Begin n Bounty (@beginnbounty) 's Twitter Profile Photo

Ways to bypass JSON Web Token controls:โœ…Tip2 โ–ถ๏ธKID manipulation: { "alg" : "HS256", "typ" : "JWT" "kid" : "1" } If field is controlled by the user, it can be manipulated by attackers to lead: โ–ถ๏ธDirectory traversal: โ€œkidโ€: โ€œ../../etc/groupsโ€ #bugbountytips #infosecurity

Rithvik Reddy (@sk1dd13) 's Twitter Profile Photo

Not only Passwords, You can also crack โœ…NTLM hashes โœ…/etc/shadow files โœ…Password protected Zip files โœ…Password protected RAR Archives โœ…SSH keys With John The Ripper A ๐Ÿงต

Abdullah Al Fahad (@frozenflame0001) 's Twitter Profile Photo

Thanks for helping me to reach 1k subs on YouTube. Subscribing doesn't cost penny !! So, if you still haven't subscribed my channel yet, I think you can. youtube.com/c/FrozenFlame0โ€ฆ

Thanks for helping me to reach 1k subs on YouTube. Subscribing doesn't cost penny !! So, if you still haven't subscribed my channel yet, I think you can.

youtube.com/c/FrozenFlame0โ€ฆ
Anmol Singh Yadav (@iamlucif3r_) 's Twitter Profile Photo

Checkout this AMASS Cheat-sheet: Amass is a tool that facilitates reconnaissance and helps you finding more information on a target. #bugbountytips #bugbountytip #bughunting

Checkout this AMASS Cheat-sheet:
Amass is a tool that facilitates reconnaissance and helps you finding more information on a target. 

#bugbountytips #bugbountytip #bughunting