Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - incursi0n/GodPotatoBOF: Cobalt Strike BOF used to perform privilege escalation by exploiting the SeImpersonate privilege.β¦
Cobalt Strike BOF used to perform privilege escalation by exploiting the SeImpersonate privilege. Based on the original GodPotato PoC by BeichenDream. - incursi0n/GodPotatoBOF
β€6π±2
Please donβt forget to react to the post and share it. Your reactions motivate us to post more content like this. You can also tap the βοΈ to show your support. Thanks!π π π
Please open Telegram to view this post
VIEW IN TELEGRAM
β€4
50 Free Coupon for Bug Bounty Masterclass - https://topmate.io/saumadip/2009859?coupon_code=awxe3
topmate.io
Bug Bounty Masterclass with Saumadip Mandal
Beginner to bug bounty hunter β tools, recon & real PoCs.
β€3π1
awxeβ Brut Security
Please open Telegram to view this post
VIEW IN TELEGRAM
topmate.io
Web Application Bug Bounty Methodology with Saumadip Mandal
Pro hacker's playbook: recon, XSS, SQLi, SSRF & more
5β€4π₯3π1π1
Brut Security pinned Β«β οΈ Just dropped something I've been building for a while π A complete Web Application Bug Bounty Methodology β 59 pages, 20 chapters, real techniques I actually use. Covers everything from recon to JWT attacks, SSRF, XSS, file upload RCE, HTTP smuggling, reportingβ¦Β»
Hey Hunterβs,
DarkShadow is here back again!
Ranking Most common /api vulnerable endpoints:
(not only /api/v1 also test for /api/v2)
π€«if WAF blocks your request then find ip origin and it might works with out bypassing by any extra waf bypass payloads!!!
#bugbountytips #info_leak
DarkShadow is here back again!
Ranking Most common /api vulnerable endpoints:
/api/v1/users
/api/v1/users/{userId}
/api/v1/oauth/token
/api/v1/forgot-password
/api/v1/debug or /api/v1/status
(not only /api/v1 also test for /api/v2)
π€«if WAF blocks your request then find ip origin and it might works with out bypassing by any extra waf bypass payloads!!!
#bugbountytips #info_leak
π₯8β€1
Recon β Scan β Exploit β Report (automated)
β’ Subdomains (15+ sources)
β’ Nuclei + CVE scan
β’ JS secrets + GitHub leaks
β’ DNS takeover + misconfigs
β’ AI agent (FREE)
β’ Results β Cloudflare R2
Stop manual recon.
https://github.com/h0tak88r/AutoAR
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - h0tak88r/AutoAR: AutoAR is an automated security reconnaissance tool, ASM and Discord bot for bug bounty hunters and penetrationβ¦
AutoAR is an automated security reconnaissance tool, ASM and Discord bot for bug bounty hunters and penetration testers. It automates gathering subdomains, scanning ports, detecting technologies, m...
π₯9β€7π2
10 Free Coupons for New Learners--->
Please open Telegram to view this post
VIEW IN TELEGRAM
topmate.io
Web Application Bug Bounty Methodology with Saumadip Mandal
Pro hacker's playbook: recon, XSS, SQLi, SSRF & more
π2β€1
Hey Hunter's,
DarkShadow is here back again!
π¨ Import schema from H2 Database β RCE via EXEC Alias β‘
Creating an alias to execute system commands via Java Runtime
π Quick Analysis:
ο»Ώ
π§ Bug Bounty Tips:
So guys if you really enjoy to read such methods show your love β€οΈ
#bugbountytips #rce
DarkShadow is here back again!
π¨ Import schema from H2 Database β RCE via EXEC Alias β‘
Creating an alias to execute system commands via Java Runtime
π Quick Analysis:
- Default oken validation
- H2 database exposed with unsafe configurations
- Ability to create custom ALIAS β leads to RCE
- No proper input validation or restriction on JDBC params
ο»Ώ
π§ Bug Bounty Tips:
- Always check hidden/internal endpoints like "/getSchema", "/actuator", "/env"
- Look for H2 / embedded DB usage β often misconfigured
- Try injecting JDBC params (INIT, TRACE, etc.)
- Donβt ignore default tokens or exposed headers
- Think beyond SQLi β DB features themselves can be weaponized
So guys if you really enjoy to read such methods show your love β€οΈ
#bugbountytips #rce
β€7π±5
π₯ Ultimate Bug Bounty Goldmine β 1000+ Real Writeups
XSS, CSRF, SSRF, IDOR, SQLi, RCE⦠everything in one place.
Real reports from Google, Facebook, PayPal, Microsoft & more.
Perfect for learning real-world exploitation, not just theory.
GitHub: https://github.com/devanshbatham/Awesome-Bugbounty-Writeups
XSS, CSRF, SSRF, IDOR, SQLi, RCE⦠everything in one place.
Real reports from Google, Facebook, PayPal, Microsoft & more.
Perfect for learning real-world exploitation, not just theory.
GitHub: https://github.com/devanshbatham/Awesome-Bugbounty-Writeups
GitHub
GitHub - devanshbatham/Awesome-Bugbounty-Writeups: A curated list of bugbounty writeups (Bug type wise) , inspired from https:β¦
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference - devanshbatham/Awesome-Bugbounty-Writeups
β€5π₯4
Source : https://github.com/securitycipher/awsome-websecurity-checklist/blob/main/Mindmaps/S3-Bucket%20Recon.png
Please open Telegram to view this post
VIEW IN TELEGRAM
β€6π3
π Free Coupons for the New Learners https://topmate.io/saumadip/2054509?coupon_code=awxe
topmate.io
Web Application Bug Bounty Methodology with Saumadip Mandal
Pro hacker's playbook: recon, XSS, SQLi, SSRF & more
β€3π₯1
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - mrmtwoj/apache-vulnerability-testing: Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024β¦
Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709 - mrmt...
β€7π1