exploitio's profile picture. مشاور امنیت استارتاپ، کسب و کار و سازمان

exploitio

@exploitio

مشاور امنیت استارتاپ، کسب و کار و سازمان

Ghim

🗃️قسمت ۵ نرم افزار اتومیشن #باگ_بانتی🗃️ - اضافه شدن مدل web برای وبسایت 👨‍💻 - توضیحات بیشتر در ادامه 👇 #امنیت #bugbountytips

exploitio's tweet image. 🗃️قسمت ۵ نرم افزار اتومیشن #باگ_بانتی🗃️

- اضافه شدن مدل web برای وبسایت 👨‍💻

- توضیحات بیشتر در ادامه 👇

#امنیت #bugbountytips

🗃️قسمت ۴ اتومیشن #باگ_بانتی🗃️ - مدل سازی داده‌ها (هنوز خیلی مونده تا تکمیل بشه) - برنامه نویسی کد در سطوح مختلف برای عملیات CRUD - کلا api برای تعامل کاربره، نرم افزارها از یه راه دیگه دیتا توی دیتابیس ادد میکنن که بعدا مفصل مینویسم. 👇ادامه👇 #امنیت #bugbountytips

exploitio's tweet image. 🗃️قسمت ۴ اتومیشن #باگ_بانتی🗃️

- مدل سازی داده‌ها (هنوز خیلی مونده تا تکمیل بشه)
- برنامه نویسی کد در سطوح مختلف برای عملیات CRUD
- کلا api برای تعامل کاربره، نرم افزارها از یه راه دیگه دیتا توی دیتابیس ادد میکنن که بعدا مفصل مینویسم.

👇ادامه👇

#امنیت #bugbountytips


exploitio đã đăng lại

Unc has totally FREE API labs on which you can try my own custom API hacking tool: Hackxpert-brute labs.hackxpert.com/APIs/index.html github.com/The-XSS-Rat/ha… With over 140 stars, it is clear you guys love to use it - maybe even on CAPIE? thexssrat.podia.com/capie-lesson-m… thexssrat.podia.com/voucher-materi…

theXSSrat's tweet image. Unc has totally FREE API labs on which you can try my own custom API hacking tool: Hackxpert-brute

labs.hackxpert.com/APIs/index.html

github.com/The-XSS-Rat/ha…

With over 140 stars, it is clear you guys love to use it - maybe even on CAPIE? 
thexssrat.podia.com/capie-lesson-m…

thexssrat.podia.com/voucher-materi…

exploitio đã đăng lại

Useful WAF Bypass Techniques for React2Shell. for more you can check the updated article: coffinxp.medium.com/from-recon-to-…

coffinxp7's tweet image. Useful WAF Bypass Techniques for React2Shell. for more you can check the updated article:
coffinxp.medium.com/from-recon-to-…

exploitio đã đăng lại

Slides for "ToolShell Patch Bypass and the AI That Might Have Seen It Coming" at @NDC_Conferences {Manchester} 2025. github.com/irsdl/sharepoi… Bonus: WAF & workarounds bypass! #AppSec #SharePoint #TolShell

irsdl's tweet image. Slides for "ToolShell Patch Bypass and the AI That Might Have Seen It Coming" at @NDC_Conferences {Manchester} 2025.

github.com/irsdl/sharepoi…

Bonus: WAF & workarounds bypass!
#AppSec #SharePoint #TolShell
irsdl's tweet image. Slides for "ToolShell Patch Bypass and the AI That Might Have Seen It Coming" at @NDC_Conferences {Manchester} 2025.

github.com/irsdl/sharepoi…

Bonus: WAF & workarounds bypass!
#AppSec #SharePoint #TolShell
irsdl's tweet image. Slides for "ToolShell Patch Bypass and the AI That Might Have Seen It Coming" at @NDC_Conferences {Manchester} 2025.

github.com/irsdl/sharepoi…

Bonus: WAF & workarounds bypass!
#AppSec #SharePoint #TolShell

exploitio đã đăng lại

A very good xss payload. <sCriPt x>(((confirm)))``</scRipt x> #bugbountytips #xss #bugbounty

dirtycoder0124's tweet image. A very good xss payload.
&amp;lt;sCriPt x&amp;gt;(((confirm)))``&amp;lt;/scRipt x&amp;gt;
#bugbountytips #xss #bugbounty

exploitio đã đăng lại

I just got a $15,000 #BugBounty for a UUID-based IDOR that led to an account takeover 🥷 Interestingly, the application used some fixed UUIDs like 00000000-0000-0000-0000-000000000000 and 11111111-1111-1111-1111-111111111111 for some _administrative_ users 🤷‍♂️


exploitio đã đăng lại

this one is brilliant! you may have seen GIS OAuth during hunting (I have, many times), XSS + ATO. I recommend reading and studying this write-up (author does not have X acc)✌🏻 blog.voorivex.team/not-so-dirty-d…


exploitio đã đăng lại

Curious how AutoVader works in practice? The demo video is up. See automated client side bug hunting in action. 🎥


Loading...

Something went wrong.


Something went wrong.