Bug Bounty
10.5K subscribers
369 photos
3 videos
46 files
426 links
Bugbounty Resources • Tips • Security Zines • Writeups • Vulnerability Update • Notes • Mindmaps • Cheatsheets • Checklists • Article / Blogs • PDFs • ebooks •
Download Telegram
30 XSS uniquely and encoded payload generated using ChatGPT

Here is the link :
https://bugbountyguide.org/bug-bounty/bug-bounty-tips/#XSSPayload

#bugbounty #infosec
👍12🔥5👏2
Do You Guys Know About ChatGPT Or I'll Make Tutorial On it will gonna help you in bugbounty a lot . So please Vote
Anonymous Poll
10%
No, We Don't Know, We Need Don't Need tutorial Will learn from YouTube
15%
Yes, We Know and We don't Need Tutorial
57%
Yes, We Need Tutorial too
18%
NO, We Need Tutorial
👍11🔥21
Cybersecurity Roadmap

#bugbounty #cybersecurity #infosec
11👍8🥰3👏2🤣2
To find XSS bugs in a website

You can follow these steps :👇

Identify all the input fields on the website, such as text boxes, dropdown menus, and search boxes.

Test each input field by entering different types of data, such as numbers, special characters, and long strings of text.

Pay attention to how the website responds to your input. If the website echoes your input back to you in any way, such as in an error message or a search result, there may be a potential XSS vulnerability.

If you suspect that a particular input field is vulnerable to XSS, try entering special characters, such as the "<" and ">" characters, to see if the website processes them in a way that could allow an attacker to inject malicious code.

If you are able to successfully inject malicious code into the website, you have found an XSS vulnerability.

🌟 Keep in mind that finding XSS vulnerabilities requires a combination of technical skill and attention to detail.

• It is also important to test the website carefully and systematically, as some XSS vulnerabilities may be well-hidden and difficult to find.

• If you are unsure about how to proceed, you may want to seek help from an experienced security professional.

#bugbounty #bugbountytips #infosec #cybersecurity
🔥15👍4👏32
Can Anybody Contribute To Write Article Related to bugbounty For
Our -> Website bugbountyguide.org with me

Plz DM : @RootxAbhishek
Free bug bounty webinar lasting 2 hours for you! Hurry up though we only have 150 slots <3

Grab this out guys : https://thexssrat.podia.com/view/webinars/free-bug-bounty-webinar-start-2-hack
7👍3🥰2
I am trying to switch to window 11 -> Does Still Win 11 have bugs or some gliches
Anonymous Poll
43%
Window 10 is still better than win 11
36%
Window 11 better and faster
14%
Both are equal in performance now
12%
Ya Still win 11 is buggy
👍4🔥2
Approach To Find Broken Access Control Download In More Clarity : Link 👇
👍9🔥3
Bug Bounty
Do You Guys Know About ChatGPT Or I'll Make Tutorial On it will gonna help you in bugbounty a lot . So please Vote
For some reason I wasn't able to make tutorial

You can watch these suggested video's to understand ChatGPT

English:
https://youtu.be/tz6FfzpCfhY

Hindi:
https://youtu.be/V9Rz4RktDvE
🔥5👏1
Top 7 Google Dorks You Need to Know

🚀 Cache : This dork will show you the cached version of any website.
• cache : example• com

🚀 After : This dork will give you result after like :
• After : 2019, After : 2016 ( Use with Site Dork )

🚀 Allintext : Searches for specific text contained on any web page.
• allintext : admin

🚀 Allinurl : exactly the same as allintext, but will show pages that contain titles with "X" characters.
• allinurl : "password"

🚀 Anchor Tag : this is useful when you need to search for an exact anchor text used on any links.
• "Some_Text" Filetype : php

Another dork that Works like same as filetype is ext :
• "python" ext : pdf

🚀 Allinurl : It can be used to fetch results whose URL contains all the specified characters.
• allinurl :"login"

( Use these with Site Dork exclude cache )

#bugbounty #infosec #cybersecurity #hacking #hackinggroup
👍135🔥2🤩2
🔰 Best Way to Find Clint-Side Bugs

➡️ Contains : CSRF Injection, Vuln Cookie For self XSS, Bypass WAF with double encoding, Stealing Anti-CSRF token, Step by Step of how Exploit WOrks and Much More

➡️ Link : https://bugbountyguide.org/2022/12/10/best-way-to-find-clint-side-bugs/

#hacking #bugbounty #Infosec #server
👍8🔥3
🔰 The OWASP WTG4.2 Mindmap
#bugbounty #infosec

Credit : Abdelrhman Allam

➡️ Mindmap Link : https://xmind.app/m/XM7KaG/

Do Check This Out :👆
🔥11👍5👌2
🔰 { One-Liner } - Extract all URL from Source Code

➡️ curl "https://example .com/" | grep -oP '(https*://|www\.)[^ ]*'

#bugbounty #Infosec
👍27👏2
🔰 { One-Liner } - Extract End-Points From Js File

by @renniepak

➡️ cat main.js | grep -oh "\"\/[a-zA-Z0-9_/?=&]*\"" | sed -e 's/^"//' -e 's/"$//' | sort -u

#bugbounty #infosec
🔥19👍4🫡4
🔰 Local File Inclusion (LFI) Attack

An LFI attack may lead to inform. disclosure, RCE, or even XSS).

Take a look Below : 👆

#bugbounty #infosec #cybersecurity #hacking
👍14🔥5
🔰 Offensive Security Approved OSCP Notes

🔗 https://oscpnotes.infosecsanyam.in/

#bugbounty #infosec #oscp #cybersecurity
16👍41🤩1