dirtycoder0124's profile picture. A positive, never give up person. Founder of https://blindf.com
Telegram group
https://t.me/+xa7Q6GcEudFkYzA1

dirty0124

@dirtycoder0124

A positive, never give up person. Founder of https://blindf.com Telegram group https://t.me/+xa7Q6GcEudFkYzA1

Repost di dirty0124

THC Release 💥: The world’s largest IP<>Domain database: ip.thc.org All forward and reverse IPs, all CNAMES and all subdomains of every domain. For free. Updated monthly. Try: curl ip.thc.org/1.1.1.1 Raw data (187GB): ip.thc.org/docs/bulk-data… (The fine work…

hackerschoice's tweet image. THC Release 💥: The world’s largest IP&amp;lt;&amp;gt;Domain database: ip.thc.org

All forward and reverse IPs, all CNAMES and all subdomains of every domain. For free. 

Updated monthly.

Try: curl ip.thc.org/1.1.1.1

Raw data (187GB): ip.thc.org/docs/bulk-data…

(The fine work…

Repost di dirty0124

🚨 3 critical/high FreePBX vulnerabilities disclosed CVE-2025-66039: Authentication bypass CVE-2025-61675: SQL injection CVE-2025-61678: File upload leading to RCE I've created detection scripts for these vulns: github.com/rxerium/FreePB… @Horizon3ai - horizon3.ai/attack-researc…

rxerium's tweet image. 🚨 3 critical/high FreePBX vulnerabilities disclosed

CVE-2025-66039: Authentication bypass 
CVE-2025-61675: SQL injection 
CVE-2025-61678: File upload leading to RCE

I&apos;ve created detection scripts for these vulns:
github.com/rxerium/FreePB…

@Horizon3ai - horizon3.ai/attack-researc…

Another good payload <script ysx<>Reflect.apply(alert,null,[1])</script xy<> #xsspayload #bugbountytips

dirtycoder0124's tweet image. Another good payload
&amp;lt;script ysx&amp;lt;&amp;gt;Reflect.apply(alert,null,[1])&amp;lt;/script xy&amp;lt;&amp;gt;
#xsspayload
#bugbountytips

A very good xss payload. <sCriPt x>(((confirm)))``</scRipt x> #bugbountytips #xss #bugbounty

dirtycoder0124's tweet image. A very good xss payload.
&amp;lt;sCriPt x&amp;gt;(((confirm)))``&amp;lt;/scRipt x&amp;gt;
#bugbountytips #xss #bugbounty

Repost di dirty0124

Want to learn complex xss attacks with practical for free? Then this post is for you! Hi everyone! I've added a new video in my xss playlist showing how i was able to find an interesting xss attack in NASA with full practical demonstration Check it out here:…

thehacktivator's tweet image. Want to learn complex xss attacks with practical for free? Then this post is for you!

Hi everyone! I&apos;ve added a new video in my xss playlist showing how i was able to find an interesting xss attack in NASA with full practical demonstration

Check it out here:…

Repost di dirty0124

I've developed a professional and technical tool for Next.js (CVE-2025-55182) 🥳 I'm offering this tool, which allows you to perform both bulk and individual scans, as well as testing on live subdomains. github; github.com/ynsmroztas/Nex… #DevTools #python #bugbountytip

ynsmroztas's tweet image. I&apos;ve developed a professional and technical tool for Next.js (CVE-2025-55182) 🥳

I&apos;m offering this tool, which allows you to perform both bulk and individual scans, as well as testing on live subdomains.

github;

github.com/ynsmroztas/Nex…

#DevTools #python #bugbountytip…

Repost di dirty0124

Reminder: React2Shell detection is live across Burp Suite. If you’re assessing exposure in Next.js apps, here’s how to run reliable checks with Burp Suite Professional or Burp Suite DAST: bit.ly/4rFhtij


Repost di dirty0124

🚨 POC for CVE-2025-55182 that works on Next.js 16.0.6 Here are the exact, battle-tested queries you need — Censys, Shodan, FOFA, ZoomEye, Quake, BinaryEdge, Hunter.how, and Nuclei matchers — all tuned specifically to find Next.js RSC / React Server Components…


Paste the data, and it will extract the domains. Not perfect, but useful for me. #bugbountytips #BugBounty dirtycoder0124.github.io/domain-extract…

dirtycoder0124's tweet image. Paste the data, and it will extract the domains. Not perfect, but useful for me.
#bugbountytips #BugBounty
dirtycoder0124.github.io/domain-extract…

Just got a reward for a high vulnerability submitted on @yeswehack -- (XSS) - Stored (CWE-79). yeswehack.com/hunters/dirty0… #YesWeRHackers Steps: 1. Found misconfigured Algolia key 2. Escalate it into Stored XSS 3. Payload executed when searching for a specific keyword #bugbountytips


Repost di dirty0124

Bug Bounty Search Engine Google advanced search queries generator for target domain: File & Directory Discovery Vulnerabilities & Exploits Subdomain & Asset Discovery And lot more github.com/gatiella/Bug-B… #InfoSec #BugBounty #bugbountytips #CyberSecurity

viehgroup's tweet image. Bug Bounty Search Engine

Google advanced search queries generator for target domain:

File &amp;amp; Directory Discovery
Vulnerabilities &amp;amp; Exploits
Subdomain &amp;amp; Asset Discovery
And lot more

github.com/gatiella/Bug-B…

#InfoSec #BugBounty #bugbountytips #CyberSecurity

Repost di dirty0124

Stop missing cache poisoning vulnerabilities. Most hunters only test X-Forwarded-Host and miss 90% of the attack surface. I wrote a complete guide to finding what others miss: medium.com/@Aacle/the-cac… #bugbounty #infosec

aacle_'s tweet image. Stop missing cache poisoning vulnerabilities.

Most hunters only test X-Forwarded-Host and miss 90% of the attack surface.

I wrote a complete guide to finding what others miss:

medium.com/@Aacle/the-cac…

#bugbounty #infosec

Loading...

Something went wrong.


Something went wrong.