HackTheBridge's profile picture. Social Media Manager! Dad. OSCP Student. Skateboarder. Chef.

HackTheBridge

@HackTheBridge

Social Media Manager! Dad. OSCP Student. Skateboarder. Chef.

Open for work! DM me! 🤘


HackTheBridge reposted

Cool list of Nuclei AI prompts by @reewardius! - Recon - SQL Injection - XSS - SSRF  - RCE - XXE And much more! Check it out! 👇 github.com/reewardius/Nuc…


HackTheBridge reposted

N8n AI Agents are INSANE!! #n8n


HackTheBridge reposted

What might you use this payload for?

WebSecAcademy's tweet image. What might you use this payload for?

HackTheBridge reposted

Don't let managing security tools slow you down. With the PD Tool Manager a.k.a PDTM, you can install, update, and remove ALL ProjectDiscovery tools with just a few simple commands. Watch this to learn how 👇 youtu.be/q7Y5JeQ0ERk?fe…

pdiscoveryio's tweet card. ProjectDiscovery Tips and Tricks - the PD Tool Manager!

youtube.com

YouTube

ProjectDiscovery Tips and Tricks - the PD Tool Manager!


HackTheBridge reposted

Oneliner to download ALL of @assetnote's wordlists: ⌨️ wget -r --no-parent -R "index.html*" wordlists-cdn.assetnote.io/data/ -nH -e robots=off

hackinghub_io's tweet image. Oneliner to download ALL of @assetnote's wordlists:

⌨️ wget -r --no-parent -R "index.html*" wordlists-cdn.assetnote.io/data/ -nH -e robots=off

HackTheBridge reposted

Who needs a HUGE list of search queries for searching servers with various vulnerabilities or installed software!?  Here it is 👇 github.com/projectdiscove…


HackTheBridge reposted

Got a spare 3 hours? That's all it takes to learn regex. In our new Regex For Hackers course, @nahamsec and @BuildHackSecure will take you from basic pattern matching to real-world hacking applications in under 3 hours. Sign up today: app.hackinghub.io/hubs/regex-for…


HackTheBridge reposted

Preventing OS command injection is simpler than patching a breach. But many devs still make the same critical mistakes. 5 ways to prevent OS command injection👇 1️⃣ Avoid Calling OS Commands from App Code Never rely on exec(), system(), or similar to handle logic from user…

WebSecAcademy's tweet image. Preventing OS command injection is simpler than patching a breach.

But many devs still make the same critical mistakes.

5 ways to prevent OS command injection👇

1️⃣ Avoid Calling OS Commands from App Code

Never rely on exec(), system(), or similar to handle logic from user…

HackTheBridge reposted

5 ways to bypass path traversal filters👇


HackTheBridge reposted

Define the depth of your crawl with katana's -d flag. The higher the depth, the more recursive crawls and juicy data you get! 🤤 ⚠️ Higher depths can lead to long crawl times against large web applications.

pdiscoveryio's tweet image. Define the depth of your crawl with katana's -d flag.

The higher the depth, the more recursive crawls and juicy data you get! 🤤

⚠️ Higher depths can lead to long crawl times against large web applications.

HackTheBridge reposted

This one-liner by @tomnomnom finds all Git repos, creates a git-objects/ folder for each one and dumps every object (commits, trees, blobs, tags) into files named by their hash. Effectively exporting the raw Git database into human-readable files, repo by repo!

0xacb's tweet image. This one-liner by @tomnomnom finds all Git repos, creates a git-objects/ folder for each one and dumps every object (commits, trees, blobs, tags) into files named by their hash.

Effectively exporting the raw Git database into human-readable files, repo by repo!

HackTheBridge reposted

Learn the basics of Cross Site Scripting with @nahamsec! Start the 5 week program now 👉 app.hackinghub.io/hubs/nahamsec-…


HackTheBridge reposted

Your payload won’t fire if it lands in the wrong place. Here’s why understanding JS context is critical for XSS👇

hackinghub_io's tweet image. Your payload won’t fire if it lands in the wrong place.

Here’s why understanding JS context is critical for XSS👇

HackTheBridge reposted

What is OS command injection? In this video, we explore how OS command injection vulnerabilities are discovered, exploited, and mitigated. You’ll learn: 🔸 What OS command injection is and why it’s dangerous 🔸 Practical techniques attackers use for both visible and blind…

WebSecAcademy's tweet card. What is command injection? - Web Security Academy

youtube.com

YouTube

What is command injection? - Web Security Academy


HackTheBridge reposted

How to extract a list of enpoints from JS files with katana! 👇 #hacking #cybersecurity #hackwithautomation #bugbounty

pdiscoveryio's tweet image. How to extract a list of enpoints from JS files with katana! 👇

#hacking #cybersecurity #hackwithautomation #bugbounty

HackTheBridge reposted

How to create a basic CSRF PoC (with @NahamSec)👇


HackTheBridge reposted

Put your recon skills to the test with a mystery lab! 🔮 We'll hide the lab title and description o you can put your recon skills to the test! You won't even know what vulnerability you're looking for! Get your mystery lab now 👇 portswigger.net/web-security/m…

WebSecAcademy's tweet image. Put your recon skills to the test with a mystery lab! 🔮

We'll hide the lab title and description o you can put your recon skills to the test!

You won't even know what vulnerability you're looking for!

Get your mystery lab now 👇
portswigger.net/web-security/m…

HackTheBridge reposted

APPRENTICE Lab: Stored XSS into anchor href attribute with double quotes HTML-encoded In this lab, you'll learn how to: 1. Discover Stored XSS Vulnerabilities Identify how user input (like a commenter's website) can be stored and rendered insecurely. 2. Analyze Reflected HTML…


HackTheBridge reposted

Path traversal bugs let attackers access sensitive files on your server. Most apps don’t need to allow this (yet many do). 5 steps to preventing traversal attacks👇 1️⃣ Avoid filesystem access from user input The safest solution is simply not using user-supplied paths in file…

WebSecAcademy's tweet image. Path traversal bugs let attackers access sensitive files on your server.

Most apps don’t need to allow this (yet many do).

5 steps to preventing traversal attacks👇

1️⃣ Avoid filesystem access from user input

The safest solution is simply not using user-supplied paths in file…

Loading...

Something went wrong.


Something went wrong.