nullfuzz
@skymloder
ID: 1514291833
13-06-2013 19:36:37
374 Tweet
87 Followers
1,1K Following
Awesome Fuzzing Enhancements 💪 coming soon to Nuclei by ProjectDiscovery 🚀, The upcoming features will allow over 50% of manual checks to be automated through fuzzing templates in Nuclei by ProjectDiscovery. Here's a sneak peek !! 👀 #hackwithautomation #BugBounty #appsec #security #opensource
IOS Pentesting Series Learn how to work with useful tools and apps such as Frida, Objection, 3uTools, Cydia, Burp, fsmon, fridump, SSL bypass, reFlutter etc. Part 1: 🔗kishorbalan.medium.com/start-your-fir… Part 2: 🔗kishorbalan.medium.com/ios-pentesting… Part 3: 🔗kishorbalan.medium.com/ios-pentesting…
Red Teaming 101 : FUD Reverse Shell and Advanced Social Engineering on Windows (Part 4) : osintteam.blog/red-teaming-10… Privilege Escalation on Windows Using LNK Files (Part 3) : osintteam.blog/red-teaming-10… Part 2 : Bypass Mark of the Web (MotW) on Windows : osintteam.blog/red-teaming-10…
Malware Development : Part 8 : Reverse Shell Via Dll Hijacking : sid4hack.medium.com/malware-develo… Part 7 : Advanced code injection : sid4hack.medium.com/malware-develo… Part 6 : DLL Hijacking : sid4hack.medium.com/malware-develo… Part 5 : DLL injection into the process : sid4hack.medium.com/malware-develo… Part 4 :
403 bypass methodology ! 1- using space symbols exmaple: /admin -> 403 /admin%09 -> 200 /admin%20 -> 200 2- use traversal Example: /admin -> 403 /..;/admin -> 200 you can fuzz with traversal sometimes that's end with results Example: /..;/FUZZ #bugbountytips by VIEH Group