#OSINT :
Built With:https://builtwith.com
Google Dorks:https://exploit-db.com/google-hacking-database/
Metagoofil:https://code.google.com/archive/p/metagoofil
Censys:https://censys.io
URLScan:https://urlscan.io
DNSStuff:https://dnsstuff.com/tools
Netcraft:https://searchdns.netcraft.com
#bugbountytips #redteam #BugBountyTip
Built With:https://builtwith.com
Google Dorks:https://exploit-db.com/google-hacking-database/
Metagoofil:https://code.google.com/archive/p/metagoofil
Censys:https://censys.io
URLScan:https://urlscan.io
DNSStuff:https://dnsstuff.com/tools
Netcraft:https://searchdns.netcraft.com
#bugbountytips #redteam #BugBountyTip
BuiltWith
Find out what websites are BuiltWith
Subdomain Takeover
https://t.co/5m9oDoTHQZ
https://t.co/Q7mEFPn33S
https://t.co/K2vaBNyvx0
https://t.co/U2pR9LUPlZ
https://t.co/O7WewUuj6u
https://t.co/Ix1MeUXm9O
https://t.co/aQrm9dW6qc
https://t.co/MeMOdEzOPu
https://t.co/r5v8T8pWHO
https://t.co/PsBhaoQlh7
#bugbounty
https://t.co/5m9oDoTHQZ
https://t.co/Q7mEFPn33S
https://t.co/K2vaBNyvx0
https://t.co/U2pR9LUPlZ
https://t.co/O7WewUuj6u
https://t.co/Ix1MeUXm9O
https://t.co/aQrm9dW6qc
https://t.co/MeMOdEzOPu
https://t.co/r5v8T8pWHO
https://t.co/PsBhaoQlh7
#bugbounty
Smaran Chand
Subdomain takeover via pantheon
I hope you are having a great time, I would like to share an issue which i discovered in less than 10 minutes and got rewarded $XXXX bounty within 24 hours of the submission. So the story begins wh…
Parameter tampering
https://t.co/qUyDVS7cON
https://t.co/MvYCAJHnvh
https://t.co/S7cjVw1wVc
https://t.co/QQ1tKjs1ww
https://t.co/gvP1bCRvXY
https://t.co/cHy7ZqsHr7
https://t.co/C8Qii9WG5E
https://t.co/jsS8CHp9Vb
https://t.co/7QMCAbzLg1
https://t.co/JBdqNPVGTV
#bugbounty
https://t.co/qUyDVS7cON
https://t.co/MvYCAJHnvh
https://t.co/S7cjVw1wVc
https://t.co/QQ1tKjs1ww
https://t.co/gvP1bCRvXY
https://t.co/cHy7ZqsHr7
https://t.co/C8Qii9WG5E
https://t.co/jsS8CHp9Vb
https://t.co/7QMCAbzLg1
https://t.co/JBdqNPVGTV
#bugbounty
Security Breached Blog
Improper Input Validation | Add Custom Text and URLs In SMS send by Snapchat | Bug Bounty POC - Security Breached Blog
Hey guys so this blog post is about an Issue in Snapchat's Website, due to Improper Input Validation one can add custom text & urls in SMS send by Snapchat here's a Short POC of the issue.
Password reset flaw
https://t.co/jGpEwy3Lpt
https://t.co/Cq3rHAIid1
https://t.co/OJiiXUZgWS
https://t.co/rJGr1hRtlw
https://t.co/1aYPhHoW2U
https://t.co/ufBZWGwptT
https://t.co/t3HFbNtXa5
https://t.co/i1PQ79EJHA
https://t.co/uY7UkHi2Mf
https://t.co/LpkUySCXf1
#bugbounty
https://t.co/jGpEwy3Lpt
https://t.co/Cq3rHAIid1
https://t.co/OJiiXUZgWS
https://t.co/rJGr1hRtlw
https://t.co/1aYPhHoW2U
https://t.co/ufBZWGwptT
https://t.co/t3HFbNtXa5
https://t.co/i1PQ79EJHA
https://t.co/uY7UkHi2Mf
https://t.co/LpkUySCXf1
#bugbounty
Medium
How I discovered an interesting account takeover flaw?
Hi everyone, today I will talk about an interesting account takeover flaw which I found around a year back. The root cause of this issue…
#CSRF
https://t.co/EVShJTsIP6
https://t.co/vB1z8VL0j1
https://t.co/Z8mMOnM8Co
https://t.co/eL6yL9z5ZZ
https://t.co/i1NsI8MeB7
https://t.co/RhplucOSlq
https://t.co/EwIONkbC0k
https://t.co/PTxDhMLmS7
https://t.co/kWrLyNB8fH
https://t.co/2PLIzQsPIZ
#bugbounty #bugbountytips
https://t.co/EVShJTsIP6
https://t.co/vB1z8VL0j1
https://t.co/Z8mMOnM8Co
https://t.co/eL6yL9z5ZZ
https://t.co/i1NsI8MeB7
https://t.co/RhplucOSlq
https://t.co/EwIONkbC0k
https://t.co/PTxDhMLmS7
https://t.co/kWrLyNB8fH
https://t.co/2PLIzQsPIZ
#bugbounty #bugbountytips
santuySec
Google Bug Bounty: CSRF in learndigital.withgoogle.com - santuySec
Hi everyone,This is my first Google bug bounty writeups, I want to tell you about CSRF vulnerability on Google Digital Garage. Have you ever heard of the Google Gigital Garage? an online courses from Google that is designed for you to grow your career or…
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2020-7799 FusionAuth RCE via Apache Freemarker Template
This media is not supported in your browser
VIEW IN TELEGRAM
SettingSyncHost.exe as a LolBin
http://hexacorn.com/blog/2020/02/02/settingsynchost-exe-as-a-lolbin/
#LOLBIN
cd %TEMP% & c:\windows\system32\SettingSyncHost.exe -LoadAndRunDiagScript foo
http://hexacorn.com/blog/2020/02/02/settingsynchost-exe-as-a-lolbin/
#LOLBIN
cd %TEMP% & c:\windows\system32\SettingSyncHost.exe -LoadAndRunDiagScript foo