netfuzzer's profile picture. ...

Cássio Gomes

@netfuzzer

...

Cássio Gomes reposted

If you found a package.json file in the wild, you might find some internal packages vulnerable to a dependency confusion attack 👀 Check for it quicker using this cool new tool by JSMon: app.jsmon.sh/tools/npm-vali… 👇


Cássio Gomes reposted

I think the top bug hunters should be rewarded by the bug bounty platforms with DATA. I want to know which projects are actually worth my time to audit, not waste hours on trial and error. Give us a transparent list of projects that actually care about security. It’d save a…


Cássio Gomes reposted

REGEXSS: How .* Turned Into over $6k in Bounties Overly-greedy regex replacements can break HTML sanitisation & lead to XSS. Includes a live demo you can try exploiting it yourself! sec.stealthcopter.com/regexss #BugBounty #BugBountyTips #XSS #AppSec


Cássio Gomes reposted

I discovered how to use CSS to steal attribute data without selectors and stylesheet imports! This means you can now exploit CSS injection via style attributes! Learn how below: portswigger.net/research/inlin…

garethheyes's tweet image. I discovered how to use CSS to steal attribute data without selectors and stylesheet imports! This means you can now exploit CSS injection via style attributes! Learn how below:

portswigger.net/research/inlin…

Cássio Gomes reposted

Reporting reflected XSS as critical.

Michael1026H1's tweet image. Reporting reflected XSS as critical.

Cássio Gomes reposted

This #NahamCon2025 talk has generated over $50,000 in bounties for @YShahinzadeh and a few other hackers: Puny-Code, 0-Click Account Takeover. 🎥👉🏼youtu.be/4CCghc7eUgI

NahamSec's tweet image. This #NahamCon2025 talk has generated over $50,000 in bounties for @YShahinzadeh and a few other hackers: Puny-Code, 0-Click Account Takeover. 

🎥👉🏼youtu.be/4CCghc7eUgI

Cássio Gomes reposted

Full-Width Symbols, a useful cheatsheet to bypass WAF by @therceman

XssPayloads's tweet image. Full-Width Symbols, a useful cheatsheet to bypass WAF by @therceman

Cássio Gomes reposted

We've updated our URL validation bypass cheat sheet with this shiny Domain allow list bypass payload contributed by @dyak0xdb!

zakfedotkin's tweet image. We've updated our URL validation bypass cheat sheet with this shiny Domain allow list bypass payload contributed by @dyak0xdb!

Cássio Gomes reposted

Discover blocklist bypasses via unicode overflows using the latest updates to ActiveScan++, Hackvertor & Shazzer! Thanks to @ryancbarnett and @thecyberneh for sharing this technique. Writeup 👇

garethheyes's tweet image. Discover blocklist bypasses via unicode overflows using the latest updates to ActiveScan++, Hackvertor & Shazzer! Thanks to @ryancbarnett and @thecyberneh for sharing this technique. Writeup 👇

Cássio Gomes reposted

Bug Bounty Tip Don't forget to check for the /_wpeprivate/config.json endpoint on a website (usually with WordPress) for information disclosure. Google Dork 👉 Site: *.example.com inurl:"_wpeprivate" Cheers!

therceman's tweet image. Bug Bounty Tip

Don't forget to check for the /_wpeprivate/config.json endpoint on a website (usually with WordPress) for information disclosure.

Google Dork
👉 Site: *.example.com inurl:"_wpeprivate"

Cheers!

Cássio Gomes reposted

Successfully bypassed a SSRF WAF by using a combination of IPV6 + Unicode. Payload for Metadata instances: http://[::ⓕⓕⓕⓕ:①⑥⑨。②⑤④。⑯⑨。②⑤④]:80 Check images for response difference between 169.254.169.254 and the above payload I shared 🔥 #bugbounty #infosec #waf

HusseiN98D's tweet image. Successfully bypassed a SSRF WAF by using a combination of IPV6 + Unicode. Payload for Metadata instances:
http://[::ⓕⓕⓕⓕ:①⑥⑨。②⑤④。⑯⑨。②⑤④]:80
Check images for response difference between 169.254.169.254 and the above payload I shared 🔥

#bugbounty #infosec #waf
HusseiN98D's tweet image. Successfully bypassed a SSRF WAF by using a combination of IPV6 + Unicode. Payload for Metadata instances:
http://[::ⓕⓕⓕⓕ:①⑥⑨。②⑤④。⑯⑨。②⑤④]:80
Check images for response difference between 169.254.169.254 and the above payload I shared 🔥

#bugbounty #infosec #waf

Cássio Gomes reposted

I found 2 Blind time-based SQL Injections in X-Forwarded-For: header just using Burp Intruder. Made a list of 500+ HTTP request and tested one by one for 3+ hours, here is the result.. X-Forwarded-For: 0'XOR(if(now()=sysdate(),sleep(6),0))XOR'Z #BugBounty

nav1n0x's tweet image. I found 2 Blind time-based SQL Injections in X-Forwarded-For: header just using Burp Intruder. Made a list of 500+ HTTP request and tested one by one for 3+ hours, here is the result..

X-Forwarded-For: 0'XOR(if(now()=sysdate(),sleep(6),0))XOR'Z

#BugBounty
nav1n0x's tweet image. I found 2 Blind time-based SQL Injections in X-Forwarded-For: header just using Burp Intruder. Made a list of 500+ HTTP request and tested one by one for 3+ hours, here is the result..

X-Forwarded-For: 0'XOR(if(now()=sysdate(),sleep(6),0))XOR'Z

#BugBounty

Cássio Gomes reposted

☃️ Bug Bounty Reference ☃️ A repository that contains huge list of bug bounty writeups categorized by the bug nature such as ➡️ SQLi ➡️ XSS ➡️ RCE and more ...

thebinarybot's tweet image. ☃️ Bug Bounty Reference ☃️

A repository that contains huge list of bug bounty writeups categorized by the bug nature such as

➡️ SQLi
➡️ XSS
➡️ RCE

and more ...

Cássio Gomes reposted

GitHub - EmperialX/XSS-Automation-Tool: "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persistent XSS. Customize request headers, cookies, proxies, and auth github.com/EmperialX/XSS-…


Cássio Gomes reposted

GitHub - 0xTeles/jsleak: a Go code to detect leaks in JS files via regex patterns github.com/0xTeles/jsleak


Cássio Gomes reposted

I created a repository to keep track of cool XSS payloads github.com/terjanq/Tiny-X… Check this out! credit:@terjanq #xss #bugbountytips

NinadMishra5's tweet image. I created a repository to keep track of cool XSS payloads github.com/terjanq/Tiny-X…

Check this out! 

credit:@terjanq

#xss #bugbountytips

Cássio Gomes reposted

I use this tool regularly! It's very simple, it does reverse DNS lookups as fast as possible. It's a great way of discovering domains and subdomains owned by a company when you know their IP address range(s). github.com/hakluke/hakrev…

hakluke's tweet image. I use this tool regularly!

It's very simple, it does reverse DNS lookups as fast as possible. It's a great way of discovering domains and subdomains owned by a company when you know their IP address range(s).

github.com/hakluke/hakrev…

Cássio Gomes reposted

when you are looking for bugs like SSRF & Open Redirect. and there is a blacklisted character. try to bypassed using other Unicode characters. I found Open Redirect Bypass Using (。) Chinese dot "%E3%80%82". poc: redirect_to=////evil%E3%80%82com credit:@h4x0r_dz #bugbountytip

NinadMishra5's tweet image. when you are looking for bugs like SSRF & Open Redirect.
and there is a blacklisted character. 
try to bypassed using other Unicode characters.
I found Open Redirect Bypass Using (。) Chinese dot "%E3%80%82".
poc: redirect_to=////evil%E3%80%82com
credit:@h4x0r_dz
#bugbountytip

Cássio Gomes reposted

Updates & Fixes: 1. Increased the sleeping time between the requests 2. made a checking for the status code == 200 (( that would avoid faking the XSS alerts )) 3. Removed the saving for the nothing results, It's useless option github.com/SirBugs/Xssor.…


Loading...

Something went wrong.


Something went wrong.