socalledhacker's profile picture. CEH V12 || Penetration Tester || Bug Hunter

Nikhil Kumar

@socalledhacker

CEH V12 || Penetration Tester || Bug Hunter

Pinned

Check this out. I know this is not perfect but i will try my best in future. This script scan whole cloud based infra.. and grep subdomains from ssl crt . This script use CloudRecon tool by @G0LDEN_infosec . github.com/s0calledhacker…


Nikhil Kumar reposted

2FA bypass: 1. 2FA activated on main domain 2. Found subdomain : embed.<target>.com 3. Logged in to subdomain with same creds 4. After login to subdomain option to redirect to main domain. 5. Full access to main domain without entering 2FA #bugbountytips #BugBounty #2fabypass

sunilyedla2's tweet image. 2FA bypass:
1. 2FA activated on main domain
2. Found subdomain : embed.&amp;lt;target&amp;gt;.com
3. Logged in to subdomain with same creds
4. After login to subdomain option to redirect to main domain. 
5. Full access to main domain without entering 2FA

#bugbountytips #BugBounty #2fabypass

Nikhil Kumar reposted

How Ethical Hackers ACTUALLY Use ChatGPT With Real Examples 👉🏼 youtu.be/0lq-CokNjSI

NahamSec's tweet image. How Ethical Hackers ACTUALLY Use ChatGPT With Real Examples 👉🏼 youtu.be/0lq-CokNjSI

Nikhil Kumar reposted

OAuth Client Confusion is an easy-to-overlook vulnerability that can lead to account takeovers. If an app doesn’t verify that an Access Token was generated for its specific Client ID, an attacker can hijack accounts. Here’s how it works:


Nikhil Kumar reposted

🔥 XSS Filter Bypass Cheatsheet 🔥 🚀 Basic Payloads: 🟢 <script>prompt(1)</script> 🟢 "><script>prompt(1)</script> 🟢 <img src=x onerror=prompt(1)> 🟢 <svg/onload=prompt(1)> 🟢 <body onload=prompt(1)> 🟢 <iframe src="javascript:prompt(1)"></iframe> 🟢 <a…


Nikhil Kumar reposted

How the NSA (Equation Group) allegedly hacked into China's Polytechnical University 👀 I analysed intelligence reports from Chinese cyber firms (360, Pangu, CVERC) to aggregate TTPs attributed to Equation Group. 🔗inversecos.com/2025/02/an-ins…

inversecos's tweet image. How the NSA (Equation Group) allegedly hacked into China&apos;s Polytechnical University 👀

I analysed intelligence reports from Chinese cyber firms (360, Pangu, CVERC) to aggregate TTPs attributed to Equation Group.

🔗inversecos.com/2025/02/an-ins…

Nikhil Kumar reposted

🚨Alert🚨 CVE-2024-49113 : Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability 🔥PoC :github.com/SafeBreach-Lab… 📊 302.9m+ Services are found on hunter.how yearly. 🔗Hunter Link: hunter.how/list?searchVal… 👇Query HUNTER…

HunterMapping's tweet image. 🚨Alert🚨 CVE-2024-49113 : Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
🔥PoC :github.com/SafeBreach-Lab…
📊 302.9m+ Services are found on hunter.how yearly.
🔗Hunter Link: hunter.how/list?searchVal…
👇Query
HUNTER…

Nikhil Kumar reposted

All my current bug bounty knowledge is gone. Here's how I get it back and make $100k in the first year: First, I've got to learn the basics. For this, I will make sure I understand at a high level how the components I'm working with function. I'll need to understand...

Rhynorater's tweet image. All my current bug bounty knowledge is gone. 

Here&apos;s how I get it back and make $100k in the first year:

First, I&apos;ve got to learn the basics. For this, I will make sure I understand at a high level how the components I&apos;m working with function. 

I&apos;ll need to understand...

Nikhil Kumar reposted

⚡Nice Resource to learn OTP Bypass for Bug Hunting ✅kathan19.gitbook.io/howtohunt/auth… #bugbounty #bugbountytips

wtf_brut's tweet image. ⚡Nice Resource to learn OTP Bypass for Bug Hunting 
✅kathan19.gitbook.io/howtohunt/auth…

#bugbounty #bugbountytips

Nikhil Kumar reposted

Bug Bounty Tips💰: Easy $2000 bounty via enabled "PUT" method! Here’s the nuclei template I used to identify this vulnerability: 🔗 github.com/projectdiscove… The key question: If it’s a public nuclei template, why wasn’t it flagged as a duplicate, and how come no one else found…


United States Trends

Loading...

Something went wrong.


Something went wrong.