Forwarded from โธ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ ๊ Moonfoxes ๐
The results come very quickly!
DM @Mm_fit
Channel https://t.me/cve0day
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฅ4โค1๐1
Please open Telegram to view this post
VIEW IN TELEGRAM
๐3
๐ฅ BB TIP: Automate Secret Hunting Like a Pro
Manual hunting is slow. Automation scales.
Instead of randomly browsing subdomains, pipe your recon properly:
What this really means is:
โข subfinder โ enumerate subdomains
โข httpx โ filter alive hosts
โข gau โ pull historical URLs
โข grep โ hunt for juicy patterns like .env, config, backup
Youโre basically combining live assets + historical endpoints + pattern filtering in one clean chain.
This approach often reveals:
Exposed environment files
Backup endpoints
Forgotten config files
Hidden OpenID configurations
JS config leaks
Most hunters stop at subdomain enumeration. Smart hunters pivot into URL discovery and pattern extraction.
Automation doesnโt replace thinking. It multiplies it.
Test responsibly. Stay within scope. Move fast, think slow.
Manual hunting is slow. Automation scales.
Instead of randomly browsing subdomains, pipe your recon properly:
subfinder -d target.com -silent | httpx -silent | gau | grep -Ei "\.env|config|backup"
What this really means is:
โข subfinder โ enumerate subdomains
โข httpx โ filter alive hosts
โข gau โ pull historical URLs
โข grep โ hunt for juicy patterns like .env, config, backup
Youโre basically combining live assets + historical endpoints + pattern filtering in one clean chain.
This approach often reveals:
Exposed environment files
Backup endpoints
Forgotten config files
Hidden OpenID configurations
JS config leaks
Most hunters stop at subdomain enumeration. Smart hunters pivot into URL discovery and pattern extraction.
Automation doesnโt replace thinking. It multiplies it.
Test responsibly. Stay within scope. Move fast, think slow.
โค14๐1
๐ SILENTCHAIN Pro v1.1.0 Powered by deepseek-v3.1:671b (via Ollama cloud)
Target scanned: http://aspnet.testinvicti.com
Results:
โข Total findings: 151
โข Verified: 20
โข Breakdown: 16 High / 37 Medium / 63 Low / 35 Info
Scan time: 19 minutes
AI requests: 137
Tokens used: 138K
OWASP Top 10 coverage + passive LLM-powered analysis for Burp Suite
๐ https://silentchain.ai
Target scanned: http://aspnet.testinvicti.com
Results:
โข Total findings: 151
โข Verified: 20
โข Breakdown: 16 High / 37 Medium / 63 Low / 35 Info
Scan time: 19 minutes
AI requests: 137
Tokens used: 138K
OWASP Top 10 coverage + passive LLM-powered analysis for Burp Suite
๐ https://silentchain.ai
๐7โค4
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ซก4
Please open Telegram to view this post
VIEW IN TELEGRAM
Medium
Subdomain Takeover: One of the Most Misunderstood Bug Bounty Vulnerabilities
Anyone who spends time in reconnaissance has seen subdomains pointing to external platforms such as GitHub Pages, Heroku, Vercel, AWS S3โฆ
โค13๐2
Don't forget to drop likes, it keeps motivate us to put such contents. Thanks Everyone ๐ฎ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐14โค4
Autonomous Multi-Agent Based Red Team Testing Service, AI hacker.
- http://github.com/PurpleAILAB/Decepticon
- http://github.com/PurpleAILAB/Decepticon
โค7๐4๐1
Please open Telegram to view this post
VIEW IN TELEGRAM
1โค17
#AD
๐ก Nxploited | Cybersecurity & CVEs
๐จ Latest Vulnerabilities: CVEs 2025 | 2026 โ Free โ
๐ฅ Timely updates on Critical / High severity CVEs
๐ง Clear technical breakdowns: root cause + impact
๐งช PoCs - Python (Mass Exploit )
โก๏ธ 0-Days
๐ Additional content available on YouTube and GitHub
๐ฒ Telegram: https://t.me/KNxploited
๐ฅ YouTube: https://www.youtube.com/@Nxploited
๐ป GitHub (130+ free ready-to-use exploits): https://github.com/Nxploited/
#AD
๐ฅ6โค3๐ค1๐ฟ1
Forwarded from Brut Security (Mr Brut)
Bug Bounty Beginner's.pdf
187.9 KB
Roadmap for Bug Bounty
โค4๐ฅ1
Hey Hunterโs,
DarkShadow is here back again, just look at thisโฆ
Authenticated RCE in Ai code editor!
- some times Some bugs are hidden, so to uncover these are bugs always make account.
- if you find any endpoint which works to validate any code its a gold mine, try RCE payloads.
if you guys need to learn DarkShadows methods to find more bug and pro recon method then let me know.
#bugbountytpis #rce
DarkShadow is here back again, just look at thisโฆ
Authenticated RCE in Ai code editor!
- some times Some bugs are hidden, so to uncover these are bugs always make account.
- if you find any endpoint which works to validate any code its a gold mine, try RCE payloads.
if you guys need to learn DarkShadows methods to find more bug and pro recon method then let me know.
#bugbountytpis #rce
๐ฅ8โค1๐1๐1
Please open Telegram to view this post
VIEW IN TELEGRAM
โค4๐ฟ1