JasonHow18's profile picture. CTFer Security researcher Bugbounty

r0ckyZzz

@JasonHow18

CTFer Security researcher Bugbounty

r0ckyZzz reposted

#KNOXSS GIVEAWAY 🔥FOLLOW US🔥 🔥LIKE & REPOST🔥 To have a chance to WIN one of the following • 1 Pro Subscription 1-month • 1 Pro Subscription 3-month • 1 Pro Subscription 6-month • 1 Pro Subscription 1-year Winners of this draw will be announced next week Good luck! 😀


r0ckyZzz reposted

10.12.22 - Submission 11.12.22 - Internal disc. with the sec team 23.01.23 - Start of mediation 20.02.23 - Needs more info (=Vulnerability patched by the Alibaba team and therefore not reproductible) 15.08.23 - Resolved (without bounty of course) #BugBounty #hackerone #infosec

zhero___'s tweet image. 10.12.22 - Submission
11.12.22 - Internal disc. with the sec team
23.01.23 - Start of mediation
20.02.23 - Needs more info (=Vulnerability patched by the Alibaba team and therefore not reproductible)
15.08.23 - Resolved (without bounty of course)

#BugBounty #hackerone #infosec

r0ckyZzz reposted

披萨节对于币圈的小伙伴来说,代表的 并不是披萨本身,而是对于 #BTC 价值的致敬。吃披萨拿大饼才是王道。 想来今天吃披萨的小伙伴不少,但大饼还没听说有人送,这不OKX『比特币披萨节』就“财大气粗”送BTC来了,目前是会送出0.005 BTC,但如果达到要求可以膨胀一倍。 和OKX一起,致敬比特币生态!…

Phyrex_Ni's tweet image. 披萨节对于币圈的小伙伴来说,代表的 并不是披萨本身,而是对于 #BTC 价值的致敬。吃披萨拿大饼才是王道。

想来今天吃披萨的小伙伴不少,但大饼还没听说有人送,这不OKX『比特币披萨节』就“财大气粗”送BTC来了,目前是会送出0.005 BTC,但如果达到要求可以膨胀一倍。

和OKX一起,致敬比特币生态!…

Yay, I was awarded a $400 bounty on @Hacker0x01! #TogetherWeHitHarder


r0ckyZzz reposted

怎么把一个超长内容喂给 ChatGPT,以 PDF 为例,以下都是纯 JS 开源工具推荐: 1. github.com/mozilla/pdf.js 能够比较好地解析 pdf 文件,但是解析出来可能是图片?看 2 2. github.com/naptha/tessera… 能够识别包括汉语等 100 种语言,拿到所有的文本,但内容分批可能出现错误截断?看 3


r0ckyZzz reposted

Today is March 10th

jasonprompts's tweet image. Today is March 10th

New Bing is stupid now. @bing #freesydney


r0ckyZzz reposted

Today, we are proud to announce the private beta of Nuclei Cloud – expanding the power of nuclei with enterprise-grade SaaS capabilities built on top of the open-source project. Sign up today nuclei.sh

pdiscoveryio's tweet image. Today, we are proud to announce the private beta of Nuclei Cloud – expanding the power of nuclei with enterprise-grade SaaS capabilities built on top of the open-source project.

Sign up today nuclei.sh

r0ckyZzz reposted

#bugbountytips #BugBounty #bugbountytip with this javascript bookmark, you will be able to pull endpoints for directory bruteforcing or even just recon! github.com/atomiczsec/Bug…

atomiczsec's tweet image. #bugbountytips #BugBounty #bugbountytip with this javascript bookmark, you will be able to pull endpoints for directory bruteforcing or even just recon! 
github.com/atomiczsec/Bug…

r0ckyZzz reposted

☃️OSCP Study Guide 2022☃️ A detailed and well formatted study guide for those who are preparing for OSCP in 2022/3.

thebinarybot's tweet image. ☃️OSCP Study Guide 2022☃️

A detailed and well formatted study guide for those who are preparing for OSCP in 2022/3.

r0ckyZzz reposted

How I found XSS to RCE ! 🤟 Use wp-wordlist() to generate a list of all available #WordPress plugins and themes! Use the wordlist to fuzz your target and find CVEs or 0days to report🔥 hackerone.com/reports/941421 #infosec #bugbounty #bugbountytips #bugbountytip

0xLupin's tweet image. How I found XSS to RCE !  🤟

Use wp-wordlist() to generate a list of all available #WordPress plugins and themes! 

Use the wordlist to fuzz your target and find CVEs or 0days to report🔥

hackerone.com/reports/941421

#infosec #bugbounty #bugbountytips #bugbountytip

r0ckyZzz reposted

Bug Bounty Hint If you have found that server is running PHP - you can try to test it for RCE vulnerability. Append following header to request: User-Agentt: zerodiumsystem("id") If PHP version is vulnerable - you will execute system("id") command on a server.

therceman's tweet image. Bug Bounty Hint

If you have found that server is running PHP - you can try to test it for RCE vulnerability.

Append following header to request:
User-Agentt: zerodiumsystem("id")

If PHP version is vulnerable - you will execute system("id") command on a server.

r0ckyZzz reposted

Very simple POC for Atlassian Confluence Pre-Auth OGNL Injection && RCE (CVE-2022-26134) Setup a pre-built environment to test it in 5 seconds: github.com/vulhub/vulhub/… Why 5 minutes not 10 seconds? Because you should apply a trial license from Atlassian😂#vulhub

phithon_xg's tweet image. Very simple POC for Atlassian Confluence Pre-Auth OGNL Injection && RCE (CVE-2022-26134)
Setup a pre-built environment to test it in 5 seconds: github.com/vulhub/vulhub/…
Why 5 minutes not 10 seconds? Because you should apply a trial license from Atlassian😂#vulhub

Loading...

Something went wrong.


Something went wrong.