30 XSS uniquely and encoded payload generated using ChatGPT
Here is the link :
https://bugbountyguide.org/bug-bounty/bug-bounty-tips/#XSSPayload
#bugbounty #infosec
Here is the link :
https://bugbountyguide.org/bug-bounty/bug-bounty-tips/#XSSPayload
#bugbounty #infosec
👍12🔥5👏2
Do You Guys Know About ChatGPT Or I'll Make Tutorial On it will gonna help you in bugbounty a lot . So please Vote
Anonymous Poll
10%
No, We Don't Know, We Need Don't Need tutorial Will learn from YouTube
15%
Yes, We Know and We don't Need Tutorial
57%
Yes, We Need Tutorial too
18%
NO, We Need Tutorial
👍11🔥2❤1
To find XSS bugs in a website
You can follow these steps :👇
➡ Identify all the input fields on the website, such as text boxes, dropdown menus, and search boxes.
➡ Test each input field by entering different types of data, such as numbers, special characters, and long strings of text.
➡ Pay attention to how the website responds to your input. If the website echoes your input back to you in any way, such as in an error message or a search result, there may be a potential XSS vulnerability.
➡ If you suspect that a particular input field is vulnerable to XSS, try entering special characters, such as the "<" and ">" characters, to see if the website processes them in a way that could allow an attacker to inject malicious code.
➡ If you are able to successfully inject malicious code into the website, you have found an XSS vulnerability.
🌟 Keep in mind that finding XSS vulnerabilities requires a combination of technical skill and attention to detail.
• It is also important to test the website carefully and systematically, as some XSS vulnerabilities may be well-hidden and difficult to find.
• If you are unsure about how to proceed, you may want to seek help from an experienced security professional.
#bugbounty #bugbountytips #infosec #cybersecurity
You can follow these steps :👇
➡ Identify all the input fields on the website, such as text boxes, dropdown menus, and search boxes.
➡ Test each input field by entering different types of data, such as numbers, special characters, and long strings of text.
➡ Pay attention to how the website responds to your input. If the website echoes your input back to you in any way, such as in an error message or a search result, there may be a potential XSS vulnerability.
➡ If you suspect that a particular input field is vulnerable to XSS, try entering special characters, such as the "<" and ">" characters, to see if the website processes them in a way that could allow an attacker to inject malicious code.
➡ If you are able to successfully inject malicious code into the website, you have found an XSS vulnerability.
🌟 Keep in mind that finding XSS vulnerabilities requires a combination of technical skill and attention to detail.
• It is also important to test the website carefully and systematically, as some XSS vulnerabilities may be well-hidden and difficult to find.
• If you are unsure about how to proceed, you may want to seek help from an experienced security professional.
#bugbounty #bugbountytips #infosec #cybersecurity
🔥15👍4👏3❤2
Can Anybody Contribute To Write Article Related to bugbounty For
Our -> Website bugbountyguide.org with me
Plz DM : @RootxAbhishek
Our -> Website bugbountyguide.org with me
Plz DM : @RootxAbhishek
Free bug bounty webinar lasting 2 hours for you! Hurry up though we only have 150 slots <3
Grab this out guys : https://thexssrat.podia.com/view/webinars/free-bug-bounty-webinar-start-2-hack
Grab this out guys : https://thexssrat.podia.com/view/webinars/free-bug-bounty-webinar-start-2-hack
❤7👍3🥰2
I am trying to switch to window 11 -> Does Still Win 11 have bugs or some gliches
Anonymous Poll
43%
Window 10 is still better than win 11
36%
Window 11 better and faster
14%
Both are equal in performance now
12%
Ya Still win 11 is buggy
👍4🔥2
Bug Bounty
I am trying to switch to window 11 -> Does Still Win 11 have bugs or some gliches
You Guys Are Wrong Win 11 is Faster
🔥5👍4😁1
Bug Bounty
Do You Guys Know About ChatGPT Or I'll Make Tutorial On it will gonna help you in bugbounty a lot . So please Vote
For some reason I wasn't able to make tutorial
You can watch these suggested video's to understand ChatGPT
English:
https://youtu.be/tz6FfzpCfhY
Hindi:
https://youtu.be/V9Rz4RktDvE
You can watch these suggested video's to understand ChatGPT
English:
https://youtu.be/tz6FfzpCfhY
Hindi:
https://youtu.be/V9Rz4RktDvE
🔥5👏1
Uncovering Your First Blind SQLi
Bugbounty Article : https://bugbountyguide.org/2022/12/08/uncovering-your-first-blind-sql-injection-vulnerability/
#bugbounty #infosec #hacking #cybersecurity
Bugbounty Article : https://bugbountyguide.org/2022/12/08/uncovering-your-first-blind-sql-injection-vulnerability/
#bugbounty #infosec #hacking #cybersecurity
👍4🔥2
Top 7 Google Dorks You Need to Know
🚀 Cache : This dork will show you the cached version of any website.
• cache : example• com
🚀 After : This dork will give you result after like :
• After : 2019, After : 2016 ( Use with Site Dork )
🚀 Allintext : Searches for specific text contained on any web page.
• allintext : admin
🚀 Allinurl : exactly the same as allintext, but will show pages that contain titles with "X" characters.
• allinurl : "password"
🚀 Anchor Tag : this is useful when you need to search for an exact anchor text used on any links.
• "Some_Text" Filetype : php
✨Another dork that Works like same as filetype is ext :
• "python" ext : pdf
🚀 Allinurl : It can be used to fetch results whose URL contains all the specified characters.
• allinurl :"login"
( Use these with Site Dork exclude cache )
#bugbounty #infosec #cybersecurity #hacking #hackinggroup
🚀 Cache : This dork will show you the cached version of any website.
• cache : example• com
🚀 After : This dork will give you result after like :
• After : 2019, After : 2016 ( Use with Site Dork )
🚀 Allintext : Searches for specific text contained on any web page.
• allintext : admin
🚀 Allinurl : exactly the same as allintext, but will show pages that contain titles with "X" characters.
• allinurl : "password"
🚀 Anchor Tag : this is useful when you need to search for an exact anchor text used on any links.
• "Some_Text" Filetype : php
✨Another dork that Works like same as filetype is ext :
• "python" ext : pdf
🚀 Allinurl : It can be used to fetch results whose URL contains all the specified characters.
• allinurl :"login"
( Use these with Site Dork exclude cache )
#bugbounty #infosec #cybersecurity #hacking #hackinggroup
👍13❤5🔥2🤩2
🔰 Best Way to Find Clint-Side Bugs
➡️ Contains : CSRF Injection, Vuln Cookie For self XSS, Bypass WAF with double encoding, Stealing Anti-CSRF token, Step by Step of how Exploit WOrks and Much More
➡️ Link : https://bugbountyguide.org/2022/12/10/best-way-to-find-clint-side-bugs/
#hacking #bugbounty #Infosec #server
➡️ Contains : CSRF Injection, Vuln Cookie For self XSS, Bypass WAF with double encoding, Stealing Anti-CSRF token, Step by Step of how Exploit WOrks and Much More
➡️ Link : https://bugbountyguide.org/2022/12/10/best-way-to-find-clint-side-bugs/
#hacking #bugbounty #Infosec #server
👍8🔥3
🔰 The OWASP WTG4.2 Mindmap
#bugbounty #infosec
Credit : Abdelrhman Allam
➡️ Mindmap Link : https://xmind.app/m/XM7KaG/
Do Check This Out :👆
#bugbounty #infosec
Credit : Abdelrhman Allam
➡️ Mindmap Link : https://xmind.app/m/XM7KaG/
Do Check This Out :👆
🔥11👍5👌2
🔰 { One-Liner } - Extract all URL from Source Code
➡️ curl "https://example .com/" | grep -oP '(https*://|www\.)[^ ]*'
#bugbounty #Infosec
➡️ curl "https://example .com/" | grep -oP '(https*://|www\.)[^ ]*'
#bugbounty #Infosec
👍27👏2
🔰 { One-Liner } - Extract End-Points From Js File
by @renniepak
➡️ cat main.js | grep -oh "\"\/[a-zA-Z0-9_/?=&]*\"" | sed -e 's/^"//' -e 's/"$//' | sort -u
#bugbounty #infosec
by @renniepak
➡️ cat main.js | grep -oh "\"\/[a-zA-Z0-9_/?=&]*\"" | sed -e 's/^"//' -e 's/"$//' | sort -u
#bugbounty #infosec
🔥19👍4🫡4
🔰 Local File Inclusion (LFI) Attack
➖ An LFI attack may lead to inform. disclosure, RCE, or even XSS).
Take a look Below : 👆
#bugbounty #infosec #cybersecurity #hacking
➖ An LFI attack may lead to inform. disclosure, RCE, or even XSS).
Take a look Below : 👆
#bugbounty #infosec #cybersecurity #hacking
👍14🔥5
🔰 Offensive Security Approved OSCP Notes
🔗 https://oscpnotes.infosecsanyam.in/
#bugbounty #infosec #oscp #cybersecurity
🔗 https://oscpnotes.infosecsanyam.in/
#bugbounty #infosec #oscp #cybersecurity
❤16👍4✍1🤩1
🔰 Linux Challenge Part – 1 { Tryhackme Room }
➖https://bugbountyguide.org/2022/12/12/linux-challenge-part-1-tryhackme-room/
#bugbounty #infosec #cybersecurity #hacking
➖https://bugbountyguide.org/2022/12/12/linux-challenge-part-1-tryhackme-room/
#bugbounty #infosec #cybersecurity #hacking
👍7