noob_labs's profile picture.

0xWizard

@noob_labs

0xWizard reposted

1. Dev exposed .env in a mp4; was only able to partially use the secrets. 2. In 2FA flow, correct OTP request was validated by server, blocking manual entry via frontend. By directly browsing the URL from correct OTP response made successful login into the account. #BugBounty

rahul0x01's tweet image. 1. Dev exposed .env in a mp4; was only able to partially use the secrets.
2. In 2FA flow, correct OTP request was validated by server, blocking manual entry via frontend. By directly browsing the URL from correct OTP response made successful login into the account.

#BugBounty
rahul0x01's tweet image. 1. Dev exposed .env in a mp4; was only able to partially use the secrets.
2. In 2FA flow, correct OTP request was validated by server, blocking manual entry via frontend. By directly browsing the URL from correct OTP response made successful login into the account.

#BugBounty
rahul0x01's tweet image. 1. Dev exposed .env in a mp4; was only able to partially use the secrets.
2. In 2FA flow, correct OTP request was validated by server, blocking manual entry via frontend. By directly browsing the URL from correct OTP response made successful login into the account.

#BugBounty

Who are buying iphone in bigbillon days on emi #Flipkart #Amazon #BigBillionDays #bigboss


How many are watching OG in benifit show #OGTrailer #OG #pavankalyan #Trending


0xWizard reposted

Seriously amazing....

fuxksniper's tweet image. Seriously amazing....

0xWizard reposted

I'm 24 hours into my first bug bounty program, but seeing the source code in scope and devs fixing bugs publicly(pushing in github) makes me feel discouraged—should I keep going toward my 100-hour goal, or change the target, source code review seems overwhelming


0xWizard reposted

10 hacking tools I've developed over the years 👇

hakluke's tweet image. 10 hacking tools I've developed over the years 👇

0xWizard reposted

This 👇

I just hacked multiple @lovable_dev 'top launched' sites Wait—what? In less time than it took me to finish my lunch (47 mins), I extracted from live production apps: 💰Personal debt amounts 🏠Home Addresses 🗝️API keys (admin access) 🔥Spicy Prompts Screenshots in thread…



0xWizard reposted

Use fast and simple Google Dorks during recon. They can 𝐫𝐞𝐯𝐞𝐚𝐥 𝐬𝐞𝐧𝐬𝐢𝐭𝐢𝐯𝐞 𝐢𝐧𝐟𝐨 𝐥𝐢𝐤𝐞 .𝐞𝐧𝐯 𝐟𝐢𝐥𝐞𝐬, 𝐃𝐁 𝐝𝐮𝐦𝐩𝐬, 𝐜𝐨𝐧𝐟𝐢𝐠 𝐟𝐢𝐥𝐞𝐬, 𝐚𝐧𝐝 𝐛𝐚𝐜𝐤𝐮𝐩𝐬. Follow me 👉🏼 DarkShadow 😁 #bugbountytip #recon #infosec #dork

darkshadow2bd's tweet image. Use fast and simple Google Dorks during recon.
They can 𝐫𝐞𝐯𝐞𝐚𝐥 𝐬𝐞𝐧𝐬𝐢𝐭𝐢𝐯𝐞 𝐢𝐧𝐟𝐨 𝐥𝐢𝐤𝐞 .𝐞𝐧𝐯 𝐟𝐢𝐥𝐞𝐬, 𝐃𝐁 𝐝𝐮𝐦𝐩𝐬, 𝐜𝐨𝐧𝐟𝐢𝐠 𝐟𝐢𝐥𝐞𝐬, 𝐚𝐧𝐝 𝐛𝐚𝐜𝐤𝐮𝐩𝐬.

Follow me 👉🏼 DarkShadow 😁 
#bugbountytip #recon #infosec #dork
darkshadow2bd's tweet image. Use fast and simple Google Dorks during recon.
They can 𝐫𝐞𝐯𝐞𝐚𝐥 𝐬𝐞𝐧𝐬𝐢𝐭𝐢𝐯𝐞 𝐢𝐧𝐟𝐨 𝐥𝐢𝐤𝐞 .𝐞𝐧𝐯 𝐟𝐢𝐥𝐞𝐬, 𝐃𝐁 𝐝𝐮𝐦𝐩𝐬, 𝐜𝐨𝐧𝐟𝐢𝐠 𝐟𝐢𝐥𝐞𝐬, 𝐚𝐧𝐝 𝐛𝐚𝐜𝐤𝐮𝐩𝐬.

Follow me 👉🏼 DarkShadow 😁 
#bugbountytip #recon #infosec #dork

0xWizard reposted

Great research here this technique leverages Rust’s capabilities to compile to WASM for HTML smuggling (lrqa.com/en/cyber-labs/…) - Next Level Smuggling with WebAssembly. However, my extension "SmuggleShield" prevents such crafted file by default. #infosec #redteam #blueteam

RandomDhiraj's tweet image. Great research here this technique leverages Rust’s capabilities to compile to WASM for HTML smuggling (lrqa.com/en/cyber-labs/…) -  Next Level Smuggling with WebAssembly. However, my extension "SmuggleShield"  prevents such crafted file by default.
#infosec #redteam #blueteam

0xWizard reposted

Awesome Wordlists A curated list of wordlists for bruteforcing and fuzzing. github.com/n0kovo/awesome… #infosec #bugbounty #pentesting t.me/hackgit/8096


0xWizard reposted

💡 Quick tip! When testing WordPress targets, always make sure to check for exposed backup files! These are sometimes saved in the web root path of the server and accessible to anyone! 🤠 Here's a list of common file names to look for! 👇

intigriti's tweet image. 💡 Quick tip!

When testing WordPress targets, always make sure to check for exposed backup files! These are sometimes saved in the web root path of the server and accessible to anyone! 🤠 

Here's a list of common file names to look for! 👇

Some bugbounty stuff @nullhyd at @Microsoft office

noob_labs's tweet image. Some bugbounty stuff @nullhyd at  @Microsoft office

I'm planning to report as many bugs as I can till I reach 100 bugs in total #100bugs


0xWizard reposted

⚠️ Giveaway ⚠️ Want to learn modern reconnaissance and hacking skills? Join The Bug Hunter's Methodology Cohort 5! October 2nd, 3rd, 4th - jhaddix.gumroad.com/l/kihwd Like and retweet this post for a chance to win a free seat! Five winners will be announced on Sept 1st!


0xWizard reposted

Aws pentesting Testing checklist by @wtf_brut #bugbounty #bugbountytips

RootMoksha's tweet image. Aws pentesting Testing checklist by @wtf_brut 

#bugbounty #bugbountytips

0xWizard reposted

All those guys who expect Ambanis to help poor people instead of spending Lavishly on wedding are the same guys who spend 500-600 per plate on their wedding where they invite 1000+ guests !! Its all Jealousy and nothing else!! 😂😂 #Ambani #weddings #Jio


Loading...

Something went wrong.


Something went wrong.