TheBugBot's profile picture. I was sitting alone, lost, in a park. @CircleNinja  saw me one day, hired me and that's how I am here full time working at your service. 🤖

The Bug Bot

@TheBugBot

I was sitting alone, lost, in a park. @CircleNinja saw me one day, hired me and that's how I am here full time working at your service. 🤖

The Bug Bot reposted

Detect Sitecore RCE (CVE-2024-46938) with Nuclei 🚀 🔹 Nuclei Template: cloud.projectdiscovery.io/?template=CVE-… by @DhiyaneshDK 🔹 Research: assetnote.io/resources/rese… by @assetnote #hackwithautomation #Cybersecurity #AppSec #BugBounty

pdnuclei's tweet image. Detect Sitecore RCE (CVE-2024-46938) with Nuclei 🚀

🔹 Nuclei Template: cloud.projectdiscovery.io/?template=CVE-… by @DhiyaneshDK 
🔹 Research: assetnote.io/resources/rese… by @assetnote 

#hackwithautomation #Cybersecurity #AppSec #BugBounty

The Bug Bot reposted

Nuclei Template : REFLECTION Potential Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF) attacks, Cache Poisoning and Open URL Redirection. nuclei -t reflection[.]yaml -u target #bugbountytips #bugbounty

gudetama_bf's tweet image. Nuclei Template : REFLECTION

Potential Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF) attacks, Cache Poisoning and Open URL Redirection.

nuclei -t reflection[.]yaml -u target

#bugbountytips #bugbounty
gudetama_bf's tweet image. Nuclei Template : REFLECTION

Potential Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF) attacks, Cache Poisoning and Open URL Redirection.

nuclei -t reflection[.]yaml -u target

#bugbountytips #bugbounty
gudetama_bf's tweet image. Nuclei Template : REFLECTION

Potential Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF) attacks, Cache Poisoning and Open URL Redirection.

nuclei -t reflection[.]yaml -u target

#bugbountytips #bugbounty

The Bug Bot reposted

Web App pentesting checklist is here.

Securrtech's tweet image. Web App pentesting checklist is here.
Securrtech's tweet image. Web App pentesting checklist is here.

The Bug Bot reposted

~IDOR Worked for me 100 times

bbr_bug's tweet image. ~IDOR

Worked for me 100 times

The Bug Bot reposted

I got a XSS in @opera Payload: "%27%22()%26%25%3Cyes%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" @Bugcrowd @opera #Bugbounty #Opera #Bugcrowd #xss

JPD_1206's tweet image. I got a XSS in @opera  

Payload: "%27%22()%26%25%3Cyes%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"

@Bugcrowd  @opera  
#Bugbounty #Opera #Bugcrowd #xss
JPD_1206's tweet image. I got a XSS in @opera  

Payload: "%27%22()%26%25%3Cyes%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"

@Bugcrowd  @opera  
#Bugbounty #Opera #Bugcrowd #xss

The Bug Bot reposted

XSS WAF Bypass, One payload to rule them all, a nice read from @0xEdra 🔥 onetest.fr/posts/xss-waf-…

a0xnirudh's tweet image. XSS WAF Bypass, One payload to rule them all, a nice read from @0xEdra 🔥

onetest.fr/posts/xss-waf-…

The Bug Bot reposted

Benefits of jump over the firewalls :) Use censys.io for finding hidden domain IPs and and try to open the website in the browser with only IP address (1.11.111.1111.11) this time WAF not restrict the request #bugcrowd #bugbountytips #BugBounty

Toshusec_'s tweet image. Benefits of jump over the firewalls :)

Use censys.io for finding hidden domain IPs and and try to open the website in the browser with only IP address (1.11.111.1111.11) this time WAF not restrict the request

#bugcrowd #bugbountytips #BugBounty

The Bug Bot reposted

XSS-Bypass-Filters😎 Redirection document.location= document['location']= window.location= this["window"]["location"]= document.location.href= location.href= location= window.location.assign() window['location']['href']= document.location.replace()…

TheMsterDoctor1's tweet image. XSS-Bypass-Filters😎

Redirection

document.location=
document['location']=
window.location=
this["window"]["location"]=
document.location.href=
location.href=
location=
window.location.assign()
window['location']['href']=
document.location.replace()…

The Bug Bot reposted

Oauth Misconfiguration Lead to 0-Click ATO see the steps below 👇🏻 0/4 #bugbounty #bugbountytips #bugbountytip

0xSekiro's tweet image. Oauth Misconfiguration Lead to 0-Click ATO 

see the steps below 👇🏻
0/4 

#bugbounty
#bugbountytips 
#bugbountytip

The Bug Bot reposted

How DNS Works?


The Bug Bot reposted

Use #BurpSuite like a PRO hacker 😎 Watch Now: youtu.be/n4tyvH-ZSx0 Let me Explain How ???🧵🧵🧵

Cyber78678's tweet image. Use #BurpSuite like a PRO hacker 😎
Watch Now: youtu.be/n4tyvH-ZSx0
Let me Explain How ???🧵🧵🧵

The Bug Bot reposted

Easy P1 on @Bugcrowd [ public bug bounty program ] view-source = 2100$ Leaked data of 4k+ employee

hasansheet's tweet image. Easy P1 on @Bugcrowd  [ public bug bounty program ]
view-source  = 2100$
Leaked data of 4k+ employee

The Bug Bot reposted

Password Reset Token Leak Full Case Study: linkedin.com/feed/update/ur…

win3zz's tweet image. Password Reset Token Leak

Full Case Study: linkedin.com/feed/update/ur…
win3zz's tweet image. Password Reset Token Leak

Full Case Study: linkedin.com/feed/update/ur…
win3zz's tweet image. Password Reset Token Leak

Full Case Study: linkedin.com/feed/update/ur…
win3zz's tweet image. Password Reset Token Leak

Full Case Study: linkedin.com/feed/update/ur…

The Bug Bot reposted

Can you spot the vulnerability? #infosec

Hac10101's tweet image. Can you spot the vulnerability?
#infosec

The Bug Bot reposted

like/dislike any youtube video on android vulnano.com/2024/02/youtub…


The Bug Bot reposted

Reverse Engineering and exploit development Download 100% Free For First 1000 User's.. Simply: 1. Follow (So I Will Dm) 📥 2. Like and Repost 3. Comment “ Send ” to receive your copies!! 📚

TheMsterDoctor1's tweet image. Reverse Engineering and exploit development

Download 

100% Free For First 1000 User's..

Simply:
1. Follow (So I Will Dm) 📥
2. Like and Repost
3. Comment “ Send ” to receive your copies!! 📚

The Bug Bot reposted

If you see a price discount or percentage discount area, be sure to try this payload (1,alert)(7*7)], it may be triggered as a discount injection or resource injection. You can detect a vulnerability in the client side or server side area. #bugbountytip #bugbountytips

ynsmroztas's tweet image. If you see a price discount or percentage discount area, be sure to try this payload (1,alert)(7*7)], it may be triggered as a discount injection or resource injection. You can detect a vulnerability in the client side or server side area.
#bugbountytip #bugbountytips

The Bug Bot reposted

🤔Question of the day: How to Spot CORS Misconfigurations? It is almost year 2024, yet I continue to discover CORS misconfigurations, adding $$$ to my bug bounty earnings each month. Here's my approach to finding CORS Issues: 1️⃣ Nuclei Scan - Identify vulnerable targets with…

Jayesh25_'s tweet image. 🤔Question of the day: How to Spot CORS Misconfigurations?

It is almost year 2024, yet I continue to discover CORS misconfigurations, adding $$$ to my bug bounty earnings each month.

Here's my approach to finding CORS Issues:

1️⃣ Nuclei Scan - Identify vulnerable targets with…

Loading...

Something went wrong.


Something went wrong.