Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
โค8๐3
Please open Telegram to view this post
VIEW IN TELEGRAM
โค6๐3๐ณ1
Hey Hunter's,
DarkShadow here back again, dropping a RCE in mail input field!
Listen, this is very important.
I Hope this method also help you to improve your bug hunting. Now guys show your love โค๏ธ
#bugbountytip #rce
DarkShadow here back again, dropping a RCE in mail input field!
Listen, this is very important.
1. When a sign-in/sign-up page comes, use a normal email using your burp collaborator.
2. If you got any HTTP hit back in your burp, then don't stop thinking by SSRF.
3. Now test command injection payload on the mail input field.
4. Don't use URL encoding in space like %20 always use ${IFS} to replace spaces.
5. It's essential when you try here RCE also try blind OS injection payloads.
I Hope this method also help you to improve your bug hunting. Now guys show your love โค๏ธ
#bugbountytip #rce
โค7๐ฅ7
โกFlowsint - Flowsint is an open-source OSINT graph exploration tool designed for ethical investigation, transparency, and verification.
โ https://github.com/reconurge/flowsint
โ https://github.com/reconurge/flowsint
โค7๐ฅ4
#AD
๐ก Private Exploit Subscription
๐ VIP Nxploited Access ๐
๐ Whatโs Included:
๐ All vulnerabilities are critical (high-severity CVEs only)
๐ Every CVE is published immediately upon release along with a dedicated exploit
๐ All vulnerabilities include a working Proof of Concept (POC) or ready-to-use script
๐ Clear documentation is provided, along with private support for target verification
๐ No public or outdated exploits โ all content is exclusive and up to date
๐ง Subscription Plans:
-โ
Weekly: $150
-โ
Monthly: $300
-โ
4 Months: $600
๐ Terms of Subscription:
- Access is personal and non-transferable
- Sharing or leaking any materials is strictly prohibited
- Any violation results in permanent removal without refund
- All content is for educational and research purposes only
- Each member is fully responsible for how the material is used
๐ Contact to Join:
Telegram: @Kxploit๐ถ
Channel โ https://t.me/KNxploited
๐ก Private Exploit Subscription
๐ Whatโs Included:
-
-
-
๐ Terms of Subscription:
- Access is personal and non-transferable
- Sharing or leaking any materials is strictly prohibited
- Any violation results in permanent removal without refund
- All content is for educational and research purposes only
- Each member is fully responsible for how the material is used
๐ Contact to Join:
Telegram: @Kxploit
Channel โ https://t.me/KNxploited
#AD
Please open Telegram to view this post
VIEW IN TELEGRAM
1โค6๐ฅ1๐จโ๐ป1
Please open Telegram to view this post
VIEW IN TELEGRAM
๐2
๐ฅ Bug Bounty Recon Tip: Find forgotten / hidden APIs & endpoints devs left behind! ๐ฅ
Chain these 2 awesome free tools by @xnl-h4ck3r:
๐ก Pro combo (most people run):
waymore -i example.com -oU urls.txt && xnLinkFinder -i urls.txt -sf example.com -o cli -sp
Youโll often discover undocumented /admin-api/v2, debug endpoints, old GraphQL paths, forgotten params with IDORs, leaked keys etc. โ pure passive recon gold!
Install both via pip:
pip install waymore
pip install git+https://github.com/xnl-h4ck3r/xnLinkFinder.git
Repos:
โ https://github.com/xnl-h4ck3r/waymore
โ https://github.com/xnl-h4ck3r/xnLinkFinder
Happy hunting & donโt forget to chain โ gau + katana + waymore + xnLinkFinder = monster recon list ๐
#BugBounty #Recon #WebHacking #APIHunting #CyberSecurity
Chain these 2 awesome free tools by @xnl-h4ck3r:
1๏ธโฃ waymore โ pulls massive archived URLs + responses from Wayback, Common Crawl, VirusTotal, URLScan, OTX & more
Basic command:
waymore -i target.com -oU waymore-urls.txt
2๏ธโฃ xnLinkFinder โ parses those responses / JS / pages and extracts juicy endpoints, parameters, secrets & even generates a target-specific wordlist
Chain it like this:
xnLinkFinder -i waymore-urls.txt -sf target.com -o results/๐ก Pro combo (most people run):
waymore -i example.com -oU urls.txt && xnLinkFinder -i urls.txt -sf example.com -o cli -sp
Youโll often discover undocumented /admin-api/v2, debug endpoints, old GraphQL paths, forgotten params with IDORs, leaked keys etc. โ pure passive recon gold!
Install both via pip:
pip install waymore
pip install git+https://github.com/xnl-h4ck3r/xnLinkFinder.git
Repos:
โ https://github.com/xnl-h4ck3r/waymore
โ https://github.com/xnl-h4ck3r/xnLinkFinder
Happy hunting & donโt forget to chain โ gau + katana + waymore + xnLinkFinder = monster recon list ๐
#BugBounty #Recon #WebHacking #APIHunting #CyberSecurity
โค13๐6๐ฅ2
Please open Telegram to view this post
VIEW IN TELEGRAM
๐8๐1