curl "testphp.vulnweb.com" | grep -oP '(https*://|www\.)[^ ]*'
Please open Telegram to view this post
VIEW IN TELEGRAM
site:http://drive.google.com inurl:folder
site:http://drive.google.com inurl:open
site:http://docs.google.com inurl:d
site:http://drive.google.com "confidential"
site:http://docs.google.com inurl:d filetype:docx
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
If you hate wasting time with 2FA, try this:
1. Install github.com/rsc/2fa on your computer/VPS & configure it with your 2FA sites.
2. Install Espanso, then add the config below.
Now, whenever you need an OTP, just type :otp and it’ll auto-fill. Easy and fast!
Credit- sw33tLie
1. Install github.com/rsc/2fa on your computer/VPS & configure it with your 2FA sites.
2. Install Espanso, then add the config below.
Now, whenever you need an OTP, just type :otp and it’ll auto-fill. Easy and fast!
Credit- sw33tLie
From Broken Access Control to First Bounty: https://infosecwriteups.com/from-broken-access-control-to-first-bounty-01712b1dab53?source=rss------bug_bounty-5
Medium
From Broken Access Control to First Resolved Bug
In the Name of Allah, the Most Beneficent, the Most Merciful. All the praises and thanks be to Allah, the Lord of the ‘Alamin (mankind…
Bug Critical Flaw: Default Password to Super Admin!: https://medium.com/@firdansp/bug-critical-flaw-default-password-to-super-admin-ef20c4214231?source=rss------bug_bounty-5
Medium
🚨Bug Critical Flaw: Default Password to Super Admin!
Hello everyone,
👍2
API Pentesting: Broken Object Property Level Authorization: https://devilwrites.medium.com/api-pentesting-broken-object-property-level-authorization-21d65939ad24?source=rss------bug_bounty-5
Medium
API Pentesting: Broken Object Property Level Authorization
Basics of Broken Object Property Level Authorization
👍1
The Ultimate Checklist for Detecting IDOR and Broken Access Control Vulnerabilities: https://thexssrat.medium.com/the-ultimate-checklist-for-detecting-idor-and-broken-access-control-vulnerabilities-b1585dd4e999?source=rss------bug_bounty-5
Medium
The Ultimate Checklist for Detecting IDOR and Broken Access Control Vulnerabilities
When testing web applications for security vulnerabilities, Insecure Direct Object References (IDOR) and Broken Access Control (BAC) are…
👍1
Cross-Site Scripting (XSS): Techniques, Bypasses, and Detection: https://medium.com/@rootast/cross-site-scripting-xss-techniques-bypasses-and-detection-927af5a55d02?source=rss------bug_bounty-5
Medium
Cross-Site Scripting (XSS): Techniques, Bypasses, and Detection
Test All Input Fields:
- Start by testing every input field on the website. Check if the data you input is reflected back unsanitized in…
- Start by testing every input field on the website. Check if the data you input is reflected back unsanitized in…
👍1
Traditional Pentest vs. Bug Bounty Program: The Pros, The Cons, and How to Do It Right: https://medium.com/@hackrate/traditional-pentest-vs-bug-bounty-program-the-pros-the-cons-and-how-to-do-it-right-f2d8beff40bf?source=rss------bug_bounty-5
Medium
Traditional Pentest vs. Bug Bounty Program: The Pros, The Cons, and How to Do It Right
In the ever-evolving landscape of cybersecurity, businesses must stay one step ahead of potential threats to protect their assets, users…
Critical SQL Injection Vulnerability in Apache Traffic Control: https://medium.com/@wiretor/critical-sql-injection-vulnerability-in-apache-traffic-control-a28cedca8b93?source=rss------bug_bounty-5
Medium
🚨 Critical SQL Injection Vulnerability in Apache Traffic Control 🚨
WIRE TOR — The Ethical Hacking Services
Apache Traffic Control Vulnerability Let Attackers Inject Malicious SQL Commands: https://mhmmuneef.medium.com/apache-traffic-control-vulnerability-let-attackers-inject-malicious-sql-commands-66188cbcd84d?source=rss------bug_bounty-5
Medium
Apache Traffic Control Vulnerability Let Attackers Inject Malicious SQL Commands
A critical SQL injection vulnerability, identified as CVE-2024–45387, has been discovered in Apache Traffic Control, a widely used…
Earn up to $30,000 by just thinking like a pro hacker while pentesting.: https://medium.com/@anandrishav2228/earn-up-to-30-000-by-just-thinking-like-a-pro-hacker-while-pentesting-da8e5984ccb9?source=rss------bug_bounty-5
Medium
Earn up to $30,000 by just thinking like a pro hacker while pentesting.
In the world of cybersecurity, the ability to think like a hacker is your greatest weapon. Ethical hacking, especially bug bounty hunting…
Find Secrets in Hidden Directories Using Fuzzing ️: https://medium.com/@kumawatabhijeet2002/find-secrets-in-hidden-directories-using-fuzzing-%EF%B8%8F-21a9a96c3246?source=rss------bug_bounty-5
Medium
Find Secrets in Hidden Directories Using Fuzzing 🕵️
In the world of cybersecurity, hidden directories are like treasure chests waiting to be uncovered. These directories often hold sensitive…