Shad0wH3x (@shad0wh3x) 's Twitter Profile
Shad0wH3x

@shad0wh3x

Shad0wH3x

Why do people blame that speed kills, it's not, Its suddenly becoming stationary that gets you

ID: 1737698849488281600

calendar_today21-12-2023 04:57:55

113 Tweet

468 Followers

69 Following

Shad0wH3x (@shad0wh3x) 's Twitter Profile Photo

Created an SQLMAP Addition for sending webhooks to Discord It will have the exact same options as SQLMAP just run it as ./sqlmap.sh and use -u or -f options for File and or Url with sqlmap options if you have any issues @ me or dm me. github.com/ShadowByte1/sq…

Shad0wH3x (@shad0wh3x) 's Twitter Profile Photo

Found a significant Amount of StoredCross-Site Scripting (XSS) vulnerability in a program on HackerOne. Our organization decided to create a short video about it. You can check out the short video here: youtube.com/shorts/4wMGV2Z… H1 Profile: hackerone.com/4c1dr3aper/hac…

Shad0wH3x (@shad0wh3x) 's Twitter Profile Photo

What is a good WP Plugin to test for Vulnerabilities, (Heaps of code / areas to test and not overly used for getting used to SCA / Static Code Analysis) Thanks

Shad0wH3x (@shad0wh3x) 's Twitter Profile Photo

Made the most Extensive Swagger UI Xss Nuclei Template I have ever seen, it may take a while to scan everything however you will find Swagger Endpoints they didn't even know about, I found 14 Swagger XSS on one Program. works best against subdomains. #xss github.com/ShadowByte1/Sw…

Shad0wH3x (@shad0wh3x) 's Twitter Profile Photo

Morning Everyone Check out how our ORG Hacked Foxycart and gained Credential and PII Theft against Users youtube.com/watch?v=cAXoE5… #hacking #foxycart #org

Shad0wH3x (@shad0wh3x) 's Twitter Profile Photo

Does anyone know about PNA Exploits for XSP from remote to internal networks mostly to printers then escalate there, I assume I need a V8 Exploit to disable it via Chrome flags as an xss won't be able to disable it due to blocks and the XSP gets blocked due to prefetch requests

Devansh (⚡, 🥷) (@0xasm0d3us) 's Twitter Profile Photo

A neat trick for bypassing WAF/filters while testing for OS command injection vulnerabilities. Use shell globbing / wildcard expansion. Here is an example `cat /e*c/p*s*d` is equivalent to `cat /etc/passwd`. But how? Before cat runs, the shell expands the glob pattern

A neat trick for bypassing WAF/filters while testing for OS command injection vulnerabilities.

Use shell globbing / wildcard expansion. Here is an example

`cat /e*c/p*s*d` is equivalent to  `cat /etc/passwd`. But how? 

Before cat runs, the shell expands the glob pattern
Shad0wH3x (@shad0wh3x) 's Twitter Profile Photo

Anyone have malware myself and Malectrica can Reverse engineer - Preferably a challenge / ransomware, trojan or something not overly known is also preferred. Dm me or reply if you have anything.