h4z3x04's profile picture. i use arch linux btw...!!

Jayesh Thakur

@h4z3x04

i use arch linux btw...!!

Jayesh Thakur reposted

Somebody asked me recently if you can exploit an XSS scenario like this: x.y(1,INJECT); where x and y are not defined. You cannot break out of the script tag, but you can break out of the function call. I tried everything I could think of to abuse error handling and hoisting…


Jayesh Thakur reposted

If you're a beginner in #infosec, amidst the AI FOMO, some tips :- - Learn JavaScript!! (I can't stress this enough) - Expose yourself to a variety of technologies. - Read a lot of writeups(helps build pattern-matching skill) - Try to do hard things and Don't get comfortable.


Jayesh Thakur reposted

Hello everyone ♥ a little bit write-up of #bugbountytip #bugbountytips I am going to write here ..... Title: getting unauthorized access on 3rd party's/workspaces & and building your checklist for quickly locating bugs there via massive recon we know that its helpful to look…

GodfatherOrwa's tweet image. Hello everyone ♥
a little bit write-up of #bugbountytip #bugbountytips I am going to write here ..... 

Title:
getting unauthorized access on 3rd party's/workspaces & and building your checklist for quickly locating bugs there via massive recon

we know that its helpful to look…
GodfatherOrwa's tweet image. Hello everyone ♥
a little bit write-up of #bugbountytip #bugbountytips I am going to write here ..... 

Title:
getting unauthorized access on 3rd party's/workspaces & and building your checklist for quickly locating bugs there via massive recon

we know that its helpful to look…

Jayesh Thakur reposted

.@gr3pme's threat modelling methodology when approaching new targets. The goal is to list every possible attack vector, regardless of likelihood, as a reference for future exploration. This is a powerful yet extremely underrated skill for bug hunters! Take note!

ctbbpodcast's tweet image. .@gr3pme's threat modelling methodology when approaching new targets. 

The goal is to list every possible attack vector, regardless of likelihood, as a reference for future exploration.

This is a powerful yet extremely underrated skill for bug hunters! Take note!

Jayesh Thakur reposted

What’s the current best cli based tech/stack identification / fingerprinting tooling out there today? Used to love github.com/urbanadventure… are there any newer and better tools?


Jayesh Thakur reposted

Yesterday, I tried to find out where the Deepseek servers are located, but I couldn't because they are Cloudflare-protected. Just now, someone randomly sent me a link to: "CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of…

tom_doerr's tweet image. Yesterday, I tried to find out where the Deepseek servers are located, but I couldn't because they are Cloudflare-protected. Just now, someone randomly sent me a link to: "CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of…

Jayesh Thakur reposted

How to find SQL Injection at scale, targeting URLs 👇🔥 Credits: @0x3n0 #recontips #bugbountytips #bugbounty #AttackSurface #sqli #sqlmap

ReconOne_bk's tweet image. How to find SQL Injection at scale, targeting URLs 👇🔥

Credits: @0x3n0 

#recontips #bugbountytips #bugbounty #AttackSurface #sqli #sqlmap

Jayesh Thakur reposted
bountywriteups's tweet image.

Jayesh Thakur reposted

Just released my blog post "Bidding Like a Billionaire - Stealing NFTs With 4-Char CSTIs"! It's about a very impactful and technically interesting client-side bug I found in a major NFT site. matanber.com/blog/4-char-cs…


Jayesh Thakur reposted

Understanding EVERY Token in Entra ID 🔎 Not all tokens are equal. There are many different types with different uses and benefits. In this blog, I break down each token and what they are used for and which tokens are the most "valuable" for an attacker to obtain. Full blog…

inversecos's tweet image. Understanding EVERY Token in Entra ID 🔎

Not all tokens are equal. There are many different types with different uses and benefits.

In this blog, I break down each token and what they are used for and which tokens are the most "valuable" for an attacker to obtain.

Full blog…

Jayesh Thakur reposted

Learn how to conceal payloads in URL credentials and abuse them for DOM XSS and DOM Clobbering. portswigger.net/research/conce…


Jayesh Thakur reposted

🚨Ilya Sutskever finally confirmed > scaling LLMs at the pre-training stage plateaued > the compute is scaling but data isn’t and new or synthetic data isn’t moving the needle What’s next > same as human brain, stopped growing in size but humanity kept advancing, the agents and…

johnrushx's tweet image. 🚨Ilya Sutskever finally confirmed

> scaling LLMs at the pre-training stage plateaued
> the compute is scaling but data isn’t and new or synthetic data isn’t moving the needle

What’s next
> same as human brain, stopped growing in size but humanity kept advancing, the agents and…
johnrushx's tweet image. 🚨Ilya Sutskever finally confirmed

> scaling LLMs at the pre-training stage plateaued
> the compute is scaling but data isn’t and new or synthetic data isn’t moving the needle

What’s next
> same as human brain, stopped growing in size but humanity kept advancing, the agents and…

Jayesh Thakur reposted

Almost 700 hours into bug bounties. Out of 40 programs I spent time on, I only got paid on 5. There's a pattern I noticed and I think it's worth sharing. Here's my analysis: (a thread - 1/x) #bugbounty #bugbountytips

shreyas_chavhan's tweet image. Almost 700 hours into bug bounties. Out of 40 programs I spent time on, I only got paid on 5. 
There's a pattern I noticed and I think it's worth sharing.

Here's my analysis: (a thread - 1/x)

#bugbounty #bugbountytips

Jayesh Thakur reposted

Ever wonder why some people succeed while others don't? 🙋 It all comes down to taking action. 🙄 Most people have ambitions and goals, but very few actually take the necessary steps to achieve them. Let's dive into this concept 🧵👇

hakluke's tweet image. Ever wonder why some people succeed while others don't? 🙋

It all comes down to taking action. 

🙄 Most people have ambitions and goals, but very few actually take the necessary steps to achieve them. 

Let's dive into this concept 🧵👇

Jayesh Thakur reposted

Becoming a pro in finding client-side bugs is simple. Not easy, but simple. 1. Go through a JS tutorial and understand the basics. 2. Ready everything on this blog 8x until you understand it: ysamm.com 3. Read JS for Hackers by @garethheyes 4x Then go hack stuff


Jayesh Thakur reposted

Just released the write-up for CVE-2024-4367, a bug I found recently in PDF.js (and hence in Firefox), resulting in arbitrary JavaScript execution when opening a malicious PDF. codeanlabs.com/blog/research/…


United States Trends

Loading...

Something went wrong.


Something went wrong.