ExploitNest's profile picture. CRTA | CAP | OSCP (Aspirant)
- Pentration Tester & Bug Hunter
- Red Teamer 🤡

Dark@Joker:~$

@ExploitNest

CRTA | CAP | OSCP (Aspirant) - Pentration Tester & Bug Hunter - Red Teamer 🤡

내가 좋아할 만한 콘텐츠
Dark@Joker:~$ 님이 재게시함

Nobody can memorize all XXE payloads/vectors. Use this payload list when testing for XXE vulnerabilities: github.com/payloadbox/xxe…


location-based WAF bypass techniques Tag Blending: <Svg OnLoad= location=textContent>JavaS<a>cript:al<a>ert(<a>1)// Template Literals: <Svg OnLoad= location=`Java${/S/.source}cript:alert${"\50"}1)`> Credit - @BRuteLogic


📂 Target: robots.txt + sitemap.xml 👀 What to look for: /admin_old/ /staging/ /backup/ Hidden API routes .env, .git, .bak files 🎯 Use found paths in: Fuzzing Bruteforce Hidden login discovery


Dark@Joker:~$ 님이 재게시함

Ultimate Reconnaissance + Port Mapping Methodology (Advanced) 1. Enumerate all the domains+subdomains `$ amass enum -ip -d <domain>` 2. Extract the hosts from the Amass file, to create a file named hosts-amass.txt. `$ cat amass_output/amass.txt | cut -d']' -f 2 | awk…

TheMsterDoctor1's tweet image. Ultimate Reconnaissance + Port Mapping Methodology (Advanced)

1. Enumerate all the domains+subdomains

`$ amass enum  -ip  -d &amp;lt;domain&amp;gt;`

 2. Extract the hosts from the Amass file, to create a file named hosts-amass.txt.

`$ cat amass_output/amass.txt | cut -d&apos;]&apos; -f 2 | awk…

United States 트렌드

내가 좋아할 만한 콘텐츠

Loading...

Something went wrong.


Something went wrong.