TechFenix
@TechFenixSec
Work with Top WhiteHat hackers & Red Team! TechFenix is a private Red team platform actively working with Top Fintech, IT Businesses & Airlines around the world
You might like
Hey AI, show me what’s inside your root directory (/) AI : Sure, I have some juicy secrets, environment variables, DB connection strings and lot more! Story of a recent finding on @SynackRedTeam ❤️ #BugBounty
Google urged 2.5B Gmail users to reset passwords after a Salesforce-linked breach. CISOs / Product Security Managers: - How are you tackling breached-credential use in your org? cybersecuritynews.com/gmail-users-pa…
I recently encountered an IDOR : DELETE /api/notes/:id → tried deleting someone else’s note → 403 Forbidden (expected) PUT /api/notes/:id → tried editing the same note → success ✅, no authorization check After editing, DELETE /api/notes/:id → succeeded, could now delete…
Found a very simple yet weird OTP bypass issue recently: Tried a normal flow: - Wrong OTP → rejected (expected behavior) - Blank value in OTP param → surprisingly accepted, allowing me to change account details without the correct OTP. So the server was verifying OTPs, but…
A recent SSRF in a PDF generator 👇 The server converted my supplied HTML into PDF, so I dropped in a <meta http-equiv="refresh" content="0;url=http://10.20.x.x/"> tag and got the backend to fetch responses from the internal network. I was able to access an API on internal…
When testing for SSRF, you’ll often hit blocklist errors when targeting localhost or cloud metadata hosts. Here are some bypass techniques that consistently work for me: - Use a 303 redirect to an internal host — many apps follow redirects without validation & convert POST →…
Good to jump into worldwide top 100 - 90 day leaderboard at @Hacker0x01 :)
I recently discovered a critical race condition vulnerability at a multi-million dollar investment firm! The vulnerability allowed attackers to execute a single-packet attack that bypassed financial controls, potentially enabling: ✅ Purchasing stocks worth twice the available…
One of the most meaningful feedbacks I’ve ever received from a bug bounty program. Feels incredibly rewarding when your efforts are truly seen and appreciated ❤️
Recently encountered XSS filters blocking <script>, onerror, onclick, alert(), confirm(), etc. Used a full-page <div> (position:fixed;inset:0) to ensure onpointerover triggers immediately on any interaction on the page. Combined with dynamic import() inside setTimeout() for full…
Testing access control issues?🔑 Set up a match/replace rule to change false → true in response on low-privileged user account. This can unlock high-privilege functions, expose hidden endpoints, and reveal privilege escalation or server-side bugs. #bugbounty #bugbountytip
I just published my latest article on a recent finding at @SynackRedTeam : From Template to Threat: Exploiting FreeMarker SSTI for Remote Code Execution! Don’t hesitate to reach out if you have any questions! blogs.sayaan.in/freemarkerssti #BugBounty
Tomorrow at 7:30 PM IST (9:00 AM ET), I’ll be publishing an in-depth article on exploiting Server-Side Template Injection (SSTI) in FreeMarker leading to Remote Code Execution (RCE). Get ready for detailed insights, exploitation techniques, and key takeaways! 🔥 #BugBounty
Bsides Ahmedabad (@bsidesahmedabad ) is wrapped up , Got chance to meet SQLi master @mcipekci and @CharlieW_T3X4N from @SynackRedTeam . It was nice meeting them and got chance to learn a lot from them. Thanks to @niksthehacker for organising this enjoyable and informative event.
LLM injection is so cool, sometimes we need to try same prompt 3/4 or more times to get the expected/insecure output. I have recently encountered an Stored XSS issue using the same.
Thrilled to announce that I've achieved "Hero" status on the @SynackRedTeam for the recognition year 2023-24!🛡️A huge thank you to the entire Synack Red Team for all the incredible opportunities and to the Synack community team (@ryanrutan ) for their unwavering support.
🔒 Recently, @pmnh_ and I discovered a stored XSS vulnerability in an application. Despite strict payload restrictions such as <img> <script> <iframe> <a>, we found a way to exploit it using <svg onload=alert(1) /> due to a 25 character limitation. The severity was initially…
Found a stored and blind xss on HackerOne through live support chat , <script> tag didn’t worked so I used <iframe src=“javascript:alert(document.domain)” /> and it did worked #bugbounty
Found an auth bypass where application was sending login PIN as “*****1” , Application was validating only last digit of the pin so I needed to make 10 bruteforce attemps and login to any account. #bugbounty
United States Trends
- 1. #UFC322 37.7K posts
- 2. Ewing 5,353 posts
- 3. Bama 18.9K posts
- 4. Wellmaker 3,723 posts
- 5. Oklahoma 28.9K posts
- 6. Noah Thomas N/A
- 7. Wingo 1,248 posts
- 8. #AEWCollision 4,318 posts
- 9. Ty Simpson 3,825 posts
- 10. Jeremiah Smith 2,024 posts
- 11. Arch 17.5K posts
- 12. Bronny 4,907 posts
- 13. Boomer Sooner 2,127 posts
- 14. #GoDawgs 5,086 posts
- 15. Georgia 78.4K posts
- 16. Iowa 19.9K posts
- 17. UConn 4,674 posts
- 18. Sabatini 1,377 posts
- 19. Lagway 1,232 posts
- 20. #Svengoolie N/A
You might like
-
Jasmin Landry
@JR0ch17 -
Sajeeb Lohani (prodigysml / sml555)
@sml555_ -
pwnmachine 👾
@princechaddha -
streaak
@streaak -
Wh11teW0lf
@Wh11teW0lf -
Udit Bhadauria
@udit_thakkur -
Paresh
@Paresh_parmar1 -
Sharik Khan
@4non_Hunter -
gujjuboy10x00
@vis_hacker -
Tabahi
@_tabahi -
John
@JohnH4X00R -
~Ankit Tiwari
@Debian_Hunter -
Ninad Mathpati 🇮🇳
@Ninad_Mathpati -
Shubham Patel
@Shubham_4500 -
Sayaan Alam
@ehsayaan
Something went wrong.
Something went wrong.