X (@themsterdoctor1) 's Twitter Profile
X

@themsterdoctor1

I Characterize Myself as a Retired Hacker. I'm Applying What I Know To Improve Security at Companies Ethical Hacker | AppSec Engineer Team Lead | OSCP

ID: 1256413047389904896

linkhttps://www.buymeacoffee.com/chupachikoq/posts calendar_today02-05-2020 02:40:02

2,2K Tweet

25,25K Followers

615 Following

X (@themsterdoctor1) 's Twitter Profile Photo

Quick tip to find reflected xss: 1- python3 paramspider.py --domain domian.com 2- cat domain.com.txt | kxss | grep "< >" | tee unfiltered_param.txt 3- inject simple xss payload: "><img src=x onerror=alert("XSS")> —————————————————- Payloads

Quick tip to find reflected xss:

1- python3 paramspider.py --domain domian.com

2- cat domain.com.txt | kxss | grep "&lt; &gt;" | tee unfiltered_param.txt 

3- inject simple xss payload:

"&gt;&lt;img src=x onerror=alert("XSS")&gt;
—————————————————-
Payloads
X (@themsterdoctor1) 's Twitter Profile Photo

🔥 Advanced Recon Methodology — by TheM@sterDoctor1 --- ## 🛰 Reconnaissance Phase: Gathering URLs Historical Files Enumeration # Extract .zip, .rar, .sql, .env, etc. from Wayback Machine & GAU cat domains.txt | waybackurls | grep -Ei

🔥 Advanced Recon Methodology — by TheM@sterDoctor1

---

## 🛰 Reconnaissance Phase: Gathering URLs

Historical Files Enumeration

# Extract .zip, .rar, .sql, .env, etc. from Wayback Machine &amp; GAU

cat domains.txt | waybackurls | grep -Ei
X (@themsterdoctor1) 's Twitter Profile Photo

🧠💥 99% of hackers QUIT when they see a 403… But the 1%? They try this: 👇 I found a 403 Forbidden on /admin. But then I tried: •POST /admin •X-Original-URL: /admin •/admin..;/ •%2e/admin •X-Rewrite-URL: /admin •/ADMIN (yes, just caps) •/;/admin •/..;/admin 👇👇👇

🧠💥 99% of hackers QUIT when they see a 403…

But the 1%? They try this: 👇

I found a 403 Forbidden on /admin.

But then I tried:
•POST /admin
•X-Original-URL: /admin
•/admin..;/
•%2e/admin
•X-Rewrite-URL: /admin
•/ADMIN (yes, just caps)
•/;/admin
•/..;/admin

👇👇👇
X (@themsterdoctor1) 's Twitter Profile Photo

🚨 EXPOSED: $5,000+ AI AGENTS LEAKED (Free Access) 🚨 200+ plug-and-play AI agents — built for social media, sales, scraping, support, content, devops & more — just went public. 🧠 Agents include: ✅ Social Media Agents ($8K builds) ✅ Lead Booking / Cold Outreach ($6K) ✅ Data

X (@themsterdoctor1) 's Twitter Profile Photo

💣 Elite-Level XLSX → XXE Payload Delivery Chain for Web App Compromise & Bounty Farming ⸻ 🧠 TL;DR: Turn Excel Into an RCE Vector via Blind XXE Exploit the widespread assumption that .xlsx files are harmless. Embed XXE payloads inside Office XML files, get blind

💣 Elite-Level XLSX → XXE Payload Delivery Chain for Web App Compromise &amp; Bounty Farming

⸻

🧠 TL;DR: Turn Excel Into an RCE Vector via Blind XXE

Exploit the widespread assumption that .xlsx files are harmless. Embed XXE payloads inside Office XML files, get blind
X (@themsterdoctor1) 's Twitter Profile Photo

Here’s an ultra-advanced Google Dorks cheat-sheet for bug bounty hunters. Replace example{}.com with your target domain (or use ${DOMAIN} in scripts), and feel free to mix & match the clauses for more surgical searches. 🌐 Domain-Scoped Templates # Basic domain scope

Here’s an ultra-advanced Google Dorks cheat-sheet for bug bounty hunters. Replace example{}.com with your target domain (or use ${DOMAIN} in scripts), and feel free to mix &amp; match the clauses for more surgical searches.

🌐 Domain-Scoped Templates

# Basic domain scope
X (@themsterdoctor1) 's Twitter Profile Photo

🦅 20 RECON COMMANDS FROM THE FUTURE 1. 🚀 GPT-Aided Wildcard Scope Expansion + Org Correlation echo "uber.com" | httpx -silent | gptcli -p "Find all owned subsidiaries, forgotten domains, infrastructure, GitHub orgs, SaaS integrations, and analytics IDs tied to

X (@themsterdoctor1) 's Twitter Profile Photo

🚨 STOP WASTING TIME on clunky recon workflows! Just found Web Check – an insanely powerful all-in-one OSINT tool that breaks down everything about a website in seconds. 🕵️‍♂️💻 🔗 web-check.xyz 🔍 GitHub: github.com/lissy93/web-ch… ✨ Features: •WHOIS, DNS, WAF, TLS,

🚨 STOP WASTING TIME on clunky recon workflows!

Just found Web Check – an insanely powerful all-in-one OSINT tool that breaks down everything about a website in seconds. 🕵️‍♂️💻
🔗 web-check.xyz
🔍 GitHub: github.com/lissy93/web-ch…

✨ Features:
•WHOIS, DNS, WAF, TLS,
X (@themsterdoctor1) 's Twitter Profile Photo

Anyone Can Access Your CCTV CAMERAS ☠️📷 CamXploit v2.0.1 Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials. Run Online: lnkd.in/eSDdGk93 GitHub: lnkd.in/erqEsRBD What's New in v2.0.1 Massive port

Anyone Can Access Your CCTV CAMERAS ☠️📷

CamXploit v2.0.1
Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.

Run Online: lnkd.in/eSDdGk93

GitHub: lnkd.in/erqEsRBD

What's New in v2.0.1

Massive port