#bugbountytip #bugbounty Directory listing bypass payloads : Any file name or folder name ..%3B/
/%20../
/.ssh/authorized_keys
/.ssh/known_hosts
/%2e%2e/google.com
..%3B/////////////////////////////////
/%20../
/.ssh/authorized_keys
/.ssh/known_hosts
/%2e%2e/google.com
..%3B/////////////////////////////////
Some Automated Scanner
https://github.com/1N3/BruteX
https://github.com/1N3/BlackWidow
https://github.com/sa7mon/S3Scanner
https://github.com/MichaelStott/CRLF-Injection-Scanner
https://github.com/jaeles-project/jaeles
https://github.com/random-robbie/kube-scan
https://github.com/hash3liZer/Subrake
https://github.com/j3ssie/Osmedeus
https://github.com/sullo/nikto
#bugbounty,#bugbountytips
https://github.com/1N3/BruteX
https://github.com/1N3/BlackWidow
https://github.com/sa7mon/S3Scanner
https://github.com/MichaelStott/CRLF-Injection-Scanner
https://github.com/jaeles-project/jaeles
https://github.com/random-robbie/kube-scan
https://github.com/hash3liZer/Subrake
https://github.com/j3ssie/Osmedeus
https://github.com/sullo/nikto
#bugbounty,#bugbountytips
GitHub
GitHub - 1N3/BruteX: Automatically brute force all services running on a target.
Automatically brute force all services running on a target. - 1N3/BruteX
Linux For Pentester:tmux Privilege Escalation.pdf:
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/8-part-100-article/62_article/new/Linux%20For%20Pentester:%20tmux%20Privilege%20Escalation.pdf
Linux for Pentester:Perl Privilege Escalation.pdf
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/2/Linux%20for%20Pentester:%20Perl%20Privilege%20Escalation.pdf
Linux for Pentester:ed Privilege Escalation.pdf
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/8-part-100-article/62_article/new/Linux%20for%20Pentester:%20ed%20Privilege%20Escalation.pdf
#Pentesting #RedTeam #hacking #PenTest
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/8-part-100-article/62_article/new/Linux%20For%20Pentester:%20tmux%20Privilege%20Escalation.pdf
Linux for Pentester:Perl Privilege Escalation.pdf
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/2/Linux%20for%20Pentester:%20Perl%20Privilege%20Escalation.pdf
Linux for Pentester:ed Privilege Escalation.pdf
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE/blob/master/8-part-100-article/62_article/new/Linux%20for%20Pentester:%20ed%20Privilege%20Escalation.pdf
#Pentesting #RedTeam #hacking #PenTest
GitHub
blaCCkHatHacEEkr/PENTESTING-BIBLE
This repository was created and developed by Ammar Amer @cry__pto Only. Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .L...
Return a list of endpoints from a swagger.json.
Pass them to your fuzzer(s), +profit?
curl -s hxxps://petstore.swagger.io/v2/swagger.json | jq '.paths | keys[]'
#bugbounty #bugbountytips #redteam #security #oneliner #bash
Pass them to your fuzzer(s), +profit?
curl -s hxxps://petstore.swagger.io/v2/swagger.json | jq '.paths | keys[]'
#bugbounty #bugbountytips #redteam #security #oneliner #bash
Lots to dive into this week's CryptOsint.
U.S. Treasury tries its hand at graphic design, Paul Singer & Jack Dorsey make up, AND Russian oligarchs are investing in Telegram's ICO.
https://mailchi.mp/782847570f22/us-treasury-shows-how-chinese-nationals-launder-money-for-dprk
U.S. Treasury tries its hand at graphic design, Paul Singer & Jack Dorsey make up, AND Russian oligarchs are investing in Telegram's ICO.
https://mailchi.mp/782847570f22/us-treasury-shows-how-chinese-nationals-launder-money-for-dprk