Bug Bounty Diary
6.19K subscribers
14 photos
27 links
A diary documenting the journey of finding bugs, with daily notes and useful tricks. Follow for real experiences, discoveries, and practical tips in bug bounty hunting.

Group: @BugBounty_Forum
Download Telegram
Why isn't this channel as active as others? It's because I prefer not to repost content from other channels or Twitter accounts. Instead, I aim to create original content based on my own knowledge. Therefore, I've decided to revisit Network+, studying it chapter by chapter and summarizing my learnings on Notion for our next post.β™₯️
1❀35πŸ”₯11πŸ‘8πŸ‘Œ8
✎ Django RCE Exploit Tool

I’ve built a Python tool that exploits the #Django PickleSerializer vulnerability, enabling Remote Code Execution (#RCE) through session cookies.

1. Clone the repository:
git clone https://github.com/Spix0r/django-rce-exploit.git
cd django-rce-exploit


2. Prepare your settings.json file with the following format:

{
"settings": [
{
"SECRET_KEY": "your_secret_key",
"Sites_COOKIE": "your_cookie_value"
}
]
}


3. Run the exploit:

python3 exploit.py


β€’ Repository: Github

#bugbounty #tools #Pickle #PickleSerializer
Β© T.me/BugBounty_Diary
1πŸ‘15❀9❀‍πŸ”₯2
✎ Bypass 403 Forbidden with HTTP Headers Fuzzing

I’ve analyzed numerous tools, blogs, tweets, and other resources on bypassing #403 #Forbidden errors using HTTP Headers #Fuzzing techniques. After extensive research, I’ve compiled a list of headers you can fuzz to potentially #bypass 403 restrictions.

β€’ HTTP Headers List: GitHub

#bugbounty #403bypass #HTTP
Β© T.me/BugBounty_Diary
1❀26❀‍πŸ”₯1πŸ‘1πŸ‘Œ1
✎ Robofinder

I've developed a Python script that allows you to search for and retrieve historical robots.txt files for any given website using Archive.org. This tool is particularly useful for security researchers and web archivists to discover previously accessible paths or directories that were once listed in a site's robots.txt.

1. Clone the repository and install the required dependencies:
git clone https://github.com/Spix0r/robofinder.git
cd robofinder
pip install -r requirements.txt


2. Run the program by providing a URL with the -u flag:
python3 robofinder.py -u https://example.com


πŸ‘€ Discover additional commands and options on GitHub page (don’t forget to give it a star ⭐️)πŸ‘‡

β€’
Repository: Github

#bugbounty #recon #tools #crawl
Β© T.me/BugBounty_Diary
1❀14πŸ‘6πŸ”₯4πŸ‘Ύ2❀‍πŸ”₯1
✎ Writeup-Miner: Stay Updated with Medium Feeds & Real-Time Alerts for Security Enthusiasts and Tech Researchers!

Writeup-Miner
is a Python script that fetches new articles from Medium RSS feeds and stores them in MongoDB or a simple .txt file. Plus, it sends you instant notifications through Telegram or Discord!

β€’ Key Features:
β€’ Scrape Medium posts via RSS feeds
β€’ Store data in MongoDB or .txt format
β€’ Set custom filters to refine content
β€’ Get a real-time notifications via Telegram or Discord


πŸ‘€ Read the full guide on GitHub (⭐️ Don't forget to star the repo!)

#bugbounty #rss #feedparser #tools
Β© T.me/BugBounty_Diary
πŸ‘9πŸ”₯5πŸ‘Œ3❀1❀‍πŸ”₯1
✎ I've created a repository called Nuclei Community Templates

It's a collaborative hub for the best Nuclei templates shared by the security research community. Whether you're a bug bounty hunter, pentester, or cybersecurity enthusiast, you can contribute your Nuclei template repositories or find powerful templates for CVE scans, fuzzing, and more!

Contribute via PRs and help build the largest Nuclei template library. Together, we’re leveling up vulnerability detection and reconnaissance!

πŸ‘€ Check it out on Github

#bugbounty #Nuclei #tools
Β© T.me/BugBounty_Diary
❀9πŸ‘6πŸ‘Œ3❀‍πŸ”₯1
✎ Hello World!

It's been a while since my last update, but I'm excited to share some great news.
I've completely rewritten FBack, moving from Python to JavaScript. Since this project hasn't been introduced here yet, let me guide you through the methodology behind it.

β€’ Methodology
You know those static websites, especially WordPress sites, where you encounter paths like:
https://example.com/files/config.php

But you don't have access to config.php, so now what? What should you test here?
This is where FBack comes in!
Use FBack to generate target-specific wordlists and fuzz for possible backup files:

β€’ Installation
npm install @spix0r/fback -g


β€’ Usage

echo "https://example.com/files/config.php" | fback -y 2020-2024 -m 1-12

Example output:
config.php.bak
config_backup.php
config_2024.php
files_config.php
example_config_backup.php

Then Fuzz for backup files - maybe you'll find a juicy accessible backup file!

β€’ Repository: Github

#bugbounty #recon #tools
Β© T.me/BugBounty_Diary
1❀36❀‍πŸ”₯2πŸ”₯2
The @Hide_Club channel was banned by Telegram, and honestly, I don’t know why. I worked hard to grow Hide Club, so this has been really tough. Maybe it’s time to start fresh from here. For now, please stay alert and join me at @Spider_Crew.

Losing everything has shaken my motivation, and I’m thinking about sharing my daily reads on my X account. But please give me some time I’m still figuring out the best way forward. Thanks so much to everyone who’s asked about the channel ❀️
πŸ’”42❀6πŸ‘6❀‍πŸ”₯1
I think it's time to move on from Hide Club. I will post here my daily reads and interesting cases from my bug hunting. Good luck, and please support me so we can grow together❀️
❀48❀‍πŸ”₯13
✎ The perils of the β€œreal” client IP & X-Forwarded-For Header

You've probably seen headers like these in common 403-bypass wordlists (e.g., my gist):
X-Forwarded-For: 127.0.0.1
X-Forwarded-Host: 127.0.0.1
X-Client-IP: 127.0.0.1

…and hundreds of similar variations (with 127.0.0.1, localhost, 192.168.1.1, internal IPs, etc.), but have you ever stopped to wonder why they sometimes actually work to bypass IP-based restrictions, rate limits, or 403/401 responses?

The answer lies in how unreliable and inconsistent the handling of "real client IP" headers is when a web application sits behind a reverse proxy (whether that’s a CDN like Cloudflare, an AWS ALB, a simple Nginx instance, etc.). It’s quite challenging for developers, because there’s no universal, standardized way for proxies to convey the original visitor’s IP to the backend and even less consensus on how the backend should parse and trust that information.

As a result, developers often rely on headers like X-Forwarded-For, X-Real-IP, or True-Client-IP to detect a visitor’s β€œreal” IP address. But many frameworks use fragile logic especially the common pattern of trusting the left-most value in X-Forwarded-For. This is dangerous because the left-most entry is fully controlled by the client.

Cloudflare, AWS ALB, and many other proxies append the real IP to the header instead of overwriting it. So an attacker can send:
X-Forwarded-For: 127.0.0.1

and it becomes:
127.0.0.1, <real attacker IP>

Many libraries (like go-chi/httprate in Go) will mistakenly trust that spoofed first value. The app then believes the user is localhost or a trusted internal IP and may skip rate limits, authentication checks, or internal-only protections entirely.

This is not rare! dozens of frameworks and servers (Express, Jetty, IIS, Go libs, etc.) use inconsistent or insecure parsing strategies. The root problem: trusting client-controlled forwarding headers without restricting which proxies are allowed to set them.

β€’
I summarized the blog, but I highly recommend reading the full article here: Article

#bugbounty #recon #HTTP #bypass
Β© T.me/BugBounty_Diary
❀‍πŸ”₯17πŸ”₯4❀3
✎ rep+ - a lightweight HTTP Repeater inside Chrome DevTools

Finally, someone created a clean, native way to send requests without leaving the debugging context or having to install certificates and set up proxies. It even has built-in AI for explanations and attack ideas!

β€’ Repository: Github

#bugbounty #recon #HTTP
Β© T.me/BugBounty_Diary
πŸ”₯21❀‍πŸ”₯4❀2
✎ Useful Browser Extensions for Bug Bounty Hunters (New Update) - I categorized them by browser compatibility, but some of them are available on both.

β€’ Firefox
➀ Link Gopher
➀ Adblock Plus
➀ FoxyProxy Standard
➀ Video Speed Controller
➀ Check XSS
➀ HackTools
➀ Bulk URL Opener
➀ Temp Mail
➀ JS Beautify CSS HTML
➀ Multi-Account Containers

β€’ Chrome
➀ TruffleHog
➀ Code Formatter
➀ Freedium Extension
➀ BuiltWith
➀ Wappalyzer
➀ WhatRuns
➀ Retire.js
➀ Cookie Extractor
➀ Wayback Machine
➀ EXIF Data Viwer
➀ Shodan
➀ S3 Bucket List
➀ Ublock Origin
➀ Resources Saver
➀ Dot Git
➀ EndPointer
➀ FindSomething
➀ Gecko
➀ rep+


#bugbounty #Extension #Browser
Β© T.me/BugBounty_Diary
πŸ”₯17❀6❀‍πŸ”₯4
Just received a $4,000 bounty for multiple one-click account takeovers.

The scenarios were really interesting and educational, especially the OAuth bugs I discovered in a very popular company.

A full write-up will be published next week on my Hashnode. Stay tunedβ™₯️

Follow me on Hashnode:
https://hashnode.com/@mirzadzare
πŸ”₯21❀10❀‍πŸ”₯1
✎ Common Rate Limit Bypass Techniques

IP Spoofing
Altering a request’s source IP to appear from another device, and rotating IPs lets an attacker bypass per-IP limits. You can use the following Burp Extensions for IP Spoofing:

β€’ BurpFakeIP: GitHub
β€’
IP-Rotate: GitHub

Changing User-Agent
Rate-limit systems often track the User-Agent header; changing or randomizing it makes requests appear from different clients, and attackers may brute-force the User-Agent field (e.g., with tools like Burp Suite Intruder).

Header Manipulation
Header manipulation alters HTTP headers (e.g., X-Forwarded-For, X-Real-IP) to trick servers β€” bypassing IP restrictions, evading rate limits, or hiding the real IP from logs and filters.

β€’ Common Headers by πŸ•·Spix0r

Requesting with Different HTTP Methods
Some rate-limiters monitor only certain HTTP methods (e.g., GET/POST); attackers may bypass them by sending requests with other methods (PUT, DELETE, OPTIONS) and testing alternatives (e.g., with Burp Suite Repeater).

β€’ HTTP request methods

Parameter Name Variation
Some backends accept alternate parameter names and still process requests, enabling attackers to bypass input filters, WAFs, or login restrictions.
username=admin&password=1234
user=admin&pass=1234
uname=admin&pwd=1234
login=admin&passwd=1234
u=admin&p=1234
email=admin&key=1234
id=admin&token=1234


Encoding Tricks
Encoding represents characters in different formats; attackers use encoding to obfuscate payloads and bypass input filters, WAFs, or validation rules.
user=admin%20        # space after admin
user=admin%00 # null byte injection
user=%61%64%6d%69%6e # 'admin' in hex
user=ad%6Din # only 'm' is encoded
user=%2561%2564%256d%2569%256e # double-encoded 'admin'


Case Sensitivity and Font Tricks
Case or character-variant changes in strings (emails, usernames, paths) can let attackers bypass security checks or exploit improper validation.
Email: Test@Example.com  # Mixed case
Email: test@example.com # Lowercase
Email: TEST@example.com # Uppercase


Using Look-Alike Characters
Email: t3st@3xample.com   # '3' instead of 'e'
Email: t@est@example.com # Replacing 'l' with 'I' or vice versa


Blank Characters
Inserting spaces, null bytes, or invisible characters (e.g., TAB, CRLF) can bypass filters, break input validation, or exploit server input handling.
email=" test@example.com "  # Adding spaces at the beginning and end
email=test@example.com%20 # Adding a space encoded as %20
email=test@example.com%E2%80%8B # Injecting a zero-width space
email=test@example.com%09 # Tab character
email=test@example.com%0A # Newline character


#bugbounty #ratelimit
Β© T.me/BugBounty_Diary
❀20❀‍πŸ”₯3
Bug Bounty Diary pinned Β«Just received a $4,000 bounty for multiple one-click account takeovers. The scenarios were really interesting and educational, especially the OAuth bugs I discovered in a very popular company. A full write-up will be published next week on my Hashnode. Stay…»
While hunting for vulnerabilities, I always wondered why developers can’t write even simple code safely. Why don’t they follow best practices before coding? Why are they still not sanitizing user inputs properly? Why, why, why…

But when I started writing a full-stack blog for myself called !safe-blog, I realized secure coding is not as easy as I thought. It’s actually very challenging even for a bug bounty hunter. The hunter becomes the hunted!

Sometimes, as a developer, you do everything right: you follow all the security checklists and best practices. But bugs still appear. Maybe from weird interactions between parts of the code, or from one small moment of β€œI’ll just test this quickly and forget to undo it later.” One tired evening is enough. So yes, you can never be 100% sure your code is completely safe.

Respect to all devs who make mistakes and give us bugs πŸ’€πŸ₯ƒ
πŸ‘9❀5❀‍πŸ”₯1
Bug Bounty Diary
Just received a $4,000 bounty for multiple one-click account takeovers. The scenarios were really interesting and educational, especially the OAuth bugs I discovered in a very popular company. A full write-up will be published next week on my Hashnode. Stay…
I just published my first write-up on my blog:

From "Log in with OAuth" to "Your Account Is Mine" – Desktop App Edition

This article is based on a recent OAuth vulnerability I discovered. I have requested permission to disclose the full report, but it hasn’t been approved yet. Once I get the green light, I will attach my proof of concept (PoC) and the full report.

I hope you enjoy it! ❀️‍πŸ”₯πŸ™Œ
1❀‍πŸ”₯17❀7πŸ”₯2
✎ Hacking Modern Web Applications - Client-Side Path Traversal (CSPT)

First of all, I highly recommend that you read this PDF if you don't know what CSPT is. To understand this vulnerability, just set up the CSPT Playground lab, which I have put in the Labs section.

Publications (blog posts, advisories, …)
β€’ Cloudflare Image Proxy as a CSPT Gadget
β€’ Bypassing WAFs to Exploit CSPT
β€’ CSPT & File Upload Bypasses
β€’ CSPT Reports & Techniques
β€’ Automating CSPT Discovery
β€’ Saving CSRF with CSPT
β€’ The Power of CSPT
β€’ Fetch Diversion
β€’ CSTP Attacks
β€’ CSPT β†’ Open Redirect β†’ XSS
β€’ CSPT β†’ JSONP β†’ XSS
β€’ CSPT β†’ JSONP β†’ XSS
β€’ CSPT β†’ XSS
β€’ CSTP β†’ ATO

Videos
β€’ Navigating The Landscape Of Client-Side Request Hijacking On The Web
β€’ CSPT vulnerability class explained
β€’ CSPT β†’ Exploit Cache Deseption

Labs
β€’ CSPT Playground

#bugbounty #ratelimit #CSPT
Β© T.me/BugBounty_Diary
❀20❀‍πŸ”₯4πŸ”₯4
✎ CVE-2025-55182 (RSC RCE) Critical Security Vulnerability in React Server Components

The vulnerability is present in versions 19.0, 19.1.0, 19.1.1, and 19.2.0 of:
β€’ react-server-dom-webpack
β€’ react-server-dom-parcel
β€’ react-server-dom-turbopack


Useful Blogs
β€’
slcyber.io
β€’
react.dev
β€’
amazon.com

Most reliable public detections (at this time):
β€’ Nuclei Template
β€’ react2shell-scanner
β€’ Burp Extension: Active Scan++

POC
β€’ CVE-2025-55182 - React Server Components RCE
β€’
CVE-2025-55182 that works on Next.js 16.0.6
β€’
CVE-2025-55182 RCE

#bugbounty #CVE #POC
Β© T.me/BugBounty_Diary
πŸ”₯13❀4❀‍πŸ”₯3
✎ The Anatomy of Source Maps and Reconstructing Original Source Code

A source map is a .map file that links transformed code back to the original source, allowing browsers to display the original code in debuggers. For bug hunters, this is valuable because it makes reading code easier, reveals developer comments and ... .

Browsers use source maps to reconstruct original code automatically. Similarly, you can use tools like Sourcemapper to retrieve a website’s original source if the .map files are publicly accessible.

sourcemapper -output dhubsrc -url https://target.com/js/client.356c1491.js.map

 
References
β€’ Introduction to JavaScript Source Maps
β€’ Source maps: languages, tools
β€’ Extracting JavaScript from Sourcemaps

#bugbounty #sourcemap #javascript
Β© T.me/BugBounty_Diary
πŸ”₯14❀‍πŸ”₯5❀1
Bug Bounty Diary
I just published my first write-up on my blog: From "Log in with OAuth" to "Your Account Is Mine" – Desktop App Edition This article is based on a recent OAuth vulnerability I discovered. I have requested permission to disclose the full report, but it hasn’t…
They patched it, I hacked it, and got rewarded again!πŸ”₯
I can't wait to write my new writeup explaining how I hacked the patched version of this bug. It will be a valuable case study.
But before I do, please read this amazing article by Adam Pritchard as a prerequisite for my writeup.
πŸ”₯18❀‍πŸ”₯4❀2