Sharo_k_h's profile picture. Junior Hunter🙂
My Github: https://github.com/SharokhAtaie

Sharo K h

@Sharo_k_h

Junior Hunter🙂 My Github: https://github.com/SharokhAtaie

Pinned

I submitted my first critical vulnerability and awarded $3500 on @Hacker0x01 Bug: Default WordPress Installation lead to RCE Tip: cat subdomains.txt | httpx -title -fr Result: [WordPress > Installation] Watch on your Targets🙂 Thanks to @voorivex and @dollarisho_com

Sharo_k_h's tweet image. I submitted my first critical vulnerability and awarded $3500 on @Hacker0x01

Bug: Default WordPress Installation lead to RCE

Tip:
cat subdomains.txt | httpx -title -fr
Result: [WordPress > Installation]
Watch on your Targets🙂

Thanks to @voorivex and @dollarisho_com

🚀 New Tool Alert! Easily parse _buildManifest.js files from Next.js web apps 🔍 🛠 Try it online: sharokhataie.github.io/build-manifest… 💻 Source code: github.com/SharokhAtaie/b… #BugBounty #JS #NextJS #WebSecurity

Sharo_k_h's tweet image. 🚀 New Tool Alert!
Easily parse _buildManifest.js files from Next.js web apps 🔍

🛠 Try it online: sharokhataie.github.io/build-manifest…
💻 Source code: github.com/SharokhAtaie/b…

#BugBounty #JS #NextJS #WebSecurity

۳ تا cve ساده که قبلا زده بودم اگه دوست داشتید حتما بخونید t.me/gotocvechat/27… مرسی از علی جان بابت وقتی که برا ما میذاره🙏❤️ @soltanali0


Sharo K h reposted

🧵 Bug Bounty Methodology 🧵 After reading countless write-ups and checklists, I created my own methodology that has helped me find vulnerabilities effectively. #BugBounty #Infosec #Cybersecurity #ethicalhacking #bugbountytip #bugbountytips #methodology


I have created a chrome extension for extract endpoints and urls from js files. You can use it for modern web app which this tool watch for new js files that loaded (lazyload). github.com/SharokhAtaie/e… #BugBounty #tools #PenTest


JsFuck ❌ FuckJS ✅ We also bypassed a very strict Cloudflare WAF with @ehsan_nkd @0xb0hl00l . Hint: When you face a WAF that allows you to use `javascript:` scheme but blocks every payload that you know, DEFINE variables! #HiveCommunity #BugBounty #hackerone #XSS

Sharo_k_h's tweet image. JsFuck ❌
FuckJS ✅

We also bypassed a very strict Cloudflare WAF with @ehsan_nkd @0xb0hl00l .

Hint: When you face a WAF that allows you to use `javascript:` scheme but blocks every payload that you know, DEFINE variables!

#HiveCommunity
#BugBounty #hackerone #XSS

Discovered an XSS vulnerability but Imperva WAF blocked it? Try this XSS payload to bypass Imperva's protection. <details x=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx:2 open ontoggle=&#x0000000000061;lert&#x000000028;origin&#x000029;> #bugbounty #bypass_imperva #xss #hacking

Sharo_k_h's tweet image. Discovered an XSS vulnerability but Imperva WAF blocked it?
Try this XSS payload to bypass Imperva&apos;s protection.

&amp;lt;details x=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx:2 open ontoggle=&amp;amp;#x0000000000061;lert&amp;amp;#x000000028;origin&amp;amp;#x000029;&amp;gt;

#bugbounty #bypass_imperva #xss #hacking
Sharo_k_h's tweet image. Discovered an XSS vulnerability but Imperva WAF blocked it?
Try this XSS payload to bypass Imperva&apos;s protection.

&amp;lt;details x=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx:2 open ontoggle=&amp;amp;#x0000000000061;lert&amp;amp;#x000000028;origin&amp;amp;#x000029;&amp;gt;

#bugbounty #bypass_imperva #xss #hacking

XSS Tip: If you have two parameter reflections in a JavaScript context and can't close the script tag or break the string with ( " ), you can use a backslash ( \ ) to escape the ( " ) of the first reflection and inject your JavaScript payload in the second reflection.

Sharo_k_h's tweet image. XSS Tip:

If you have two parameter reflections in a JavaScript context and can&apos;t close the script tag or break the string with ( &quot; ), you can use a backslash ( \ ) to escape the ( &quot; ) of the first reflection and inject your JavaScript payload in the second reflection.
Sharo_k_h's tweet image. XSS Tip:

If you have two parameter reflections in a JavaScript context and can&apos;t close the script tag or break the string with ( &quot; ), you can use a backslash ( \ ) to escape the ( &quot; ) of the first reflection and inject your JavaScript payload in the second reflection.
Sharo_k_h's tweet image. XSS Tip:

If you have two parameter reflections in a JavaScript context and can&apos;t close the script tag or break the string with ( &quot; ), you can use a backslash ( \ ) to escape the ( &quot; ) of the first reflection and inject your JavaScript payload in the second reflection.

Loading...

Something went wrong.


Something went wrong.