moonsec (@moon_moonsec) 's Twitter Profile
moonsec

@moon_moonsec

moonsec

ID: 1506196837065445381

calendar_today22-03-2022 09:11:43

286 Tweet

24 Takipçi

561 Takip Edilen

bugcrowd (@bugcrowd) 's Twitter Profile Photo

Manual recon doesn’t scale, especially for hidden URLs. This one-liner surfaces endpoints you didn’t know existed. 👇

Manual recon doesn’t scale, especially for hidden URLs.

This one-liner surfaces endpoints you didn’t know existed. 👇
NullSecX (@nullsecurityx) 's Twitter Profile Photo

New videooo: Bug Bounty Recon 101 | Advanced Techniques, Tools, Workflow & Mindset Recon → endpoints → parameters → attack surface → vuln.. Here’s the complete Bug Bounty recon methodology I actually use. ▶️ youtu.be/cht1SXF5Mfo #BugBounty #Recon #CyberSecurity

ProjectDiscovery (@pdiscoveryio) 's Twitter Profile Photo

Ever wondered what’s actually standing between you and your target? 🔍 Stop guessing, start identifying. cdncheck is a powerful tool designed to instantly map DNS and IP addresses to their associated technologies. When paired with chaos for lightning-fast subdomain discovery,

Ever wondered what’s actually standing between you and your target? 🔍

Stop guessing, start identifying.

cdncheck is a powerful tool designed to instantly map DNS and IP addresses to their associated technologies. When paired with chaos for lightning-fast subdomain discovery,
VIEH Group (@viehgroup) 's Twitter Profile Photo

OAuth State Parameter Misbinding → Account Takeover POC → 1. While testing OAuth login flow, observed the state parameter was generated but not properly validated on callback 2. Initiated OAuth login on attacker account and captured the authorization response 3. Forced the

OAuth State Parameter Misbinding → Account Takeover

POC →

1. While testing OAuth login flow, observed the state parameter was generated but not properly validated on callback
2. Initiated OAuth login on attacker account and captured the authorization response
3. Forced the
HackProve (@hackprove_) 's Twitter Profile Photo

How I got a $$$$ by discovring a critical Sql Injecation vulnerability In a Public Bug Bounty… Explore more: discord.com/invite/h6dKuEt… medium.com/@a7madhacck/ho…

X (@themsterdoctor1) 's Twitter Profile Photo

Claude Bug Bounty Hunter - github.com/shuvonsec/clau… Claude Code skill that turns Claude into your AI bug bounty co-pilot. Point it at any target and Claude maps the attack surface, runs your scanners, validates findings, and writes the HackerOne or Bugcrowd report — all from a

Claude Bug Bounty Hunter - 

github.com/shuvonsec/clau…

Claude Code skill that turns Claude into your AI bug bounty co-pilot. Point it at any target and Claude maps the attack surface, runs your scanners, validates findings, and writes the HackerOne or Bugcrowd report — all from a
André Baptista (@0xacb) 's Twitter Profile Photo

I keep finding GraphQL batching bugs out there. Here's how to find them 👇 Most GraphQL endpoints accept arrays of operations in a single HTTP request. So instead of sending one login request at a time (and getting rate limited after 5 attempts), you send 1000 login mutations in

bugcrowd (@bugcrowd) 's Twitter Profile Photo

Popping alert(1) doesn't show REAL impact. Escalate your XSS by stealing cookies instead👇 Better XSS escalation paths here: bugcrowd.com/blog/the-ultim…

Muqsit 𝕏 (@mqst_) 's Twitter Profile Photo

📜 HackerOne-Reports: Top disclosed reports from HackerOne. - Top 100 reports (most paid/upvoted) - Top reports by bug type (XSS, SQLi, IDOR, etc) - Top reports by program (Yahoo, Uber, Shopify, etc) Github: github.com/reddelexc/hack…

📜 HackerOne-Reports: Top disclosed reports from HackerOne.

- Top 100 reports (most paid/upvoted)
- Top reports by bug type (XSS, SQLi, IDOR, etc)
- Top reports by program (Yahoo, Uber, Shopify, etc)

Github: github.com/reddelexc/hack…