HackerOne
@HackerOne
11K
subscribers
644
photos
31
videos
79
files
2.74K
links
Community :
@Sec0x01
@Bug0x
Download Telegram
Join
HackerOne
11K subscribers
HackerOne
#fun
HackerOne
https://hackerone.com/reports/1622449
HackerOne
HackerOne disclosed on HackerOne: June 2022 Incident Report
# Intro
Since the founding of HackerOne, we have kept a steadfast commitment to disclosing security incidents because we believe that sharing security information far and wide is essential to...
HackerOne
https://h4ms1k.github.io/Red_Team_Active_Directory/
The power of the mind
Red Teaming Active Directory
Introduction
HackerOne
https://infosecwriteups.com/i-have-1-chance-to-hack-this-company-1044879f41a9
Medium
I have 1% chance to hack this company
Today I will share with you the first vulnerability I found on SerpApi, LLC.
HackerOne
HackerOne
https://twitter.com/1rpwn/status/1545689030930878464
X (formerly Twitter)
Adel (@1rpwn) on X
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
https://t.co/BYOJgT0eIk
#linux #kernel #eBPF #backdoor #c2
HackerOne
Forwarded from
Bug Bounty
(
Amir Kiani
)
https://ahmdhalabi.medium.com/pii-disclosure-of-apple-users-10k-d1e3d29bae36
Medium
PII Disclosure of Apple Users ($10k)
How I hacked Apple and was able to Disclose Apple Users Private Shipping Information and Mobile Numbers.
HackerOne
https://destevez.net/2016/09/decoding-gomx-1-telemetry/
HackerOne
Forwarded from
Amir Kiani
https://blog.sonarsource.com/horde-webmail-rce-via-email/
Sonarsource
Horde Webmail - Remote Code Execution via Email
We discovered vulnerabilities in Horde Webmail that allow an attacker to execute arbitrary code on Horde instances by having a victim open an email
HackerOne
Forwarded from
Amir Kiani
https://blog.sonarsource.com/wordpress-object-injection-vulnerability/
Sonarsource
WordPress < 5.8.3 - Object Injection Vulnerability
We discovered an interesting code vulnerability that could be used to bypass hardening mechanisms in the popular WordPress CMS.
HackerOne
Forwarded from
Amir Kiani
https://blog.sonarsource.com/nodebb-remote-code-execution-with-one-shot/
Sonarsource
NodeBB 1.18.4 - Remote Code Execution With One Shot
We recently discovered three interesting code vulnerabilities in NodeBB 1.18.4, allowing attackers to compromise servers. Find out about the details in this article!
❤
1
HackerOne
https://learnfrida.info/
learnfrida.info
Frida HandBook
Frida handbook, resource to learn the basics of binary instrumentation in desktop systems (Windows, Linux, MacOS) with real-world examples.
HackerOne
We can do serious things
💀
HackerOne
HackerOne
https://cyber.bgu.ac.il/advanced-cyber/airgap
HackerOne
https://github.com/epsylon/fuzzssh
GitHub
GitHub - epsylon/fuzzssh: FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.
FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities. - GitHub - epsylon/fuzzssh: FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.
HackerOne
https://www.randorisec.fr/crack-linux-firewall/
HackerOne
https://www.youtube.com/watch?v=gfZRaftYKrk
YouTube
php 8.1 remote code execution
In this video we are going to solve one of the vulnmachines lab zero is cool.
PHP verion 8.1.0 backdoor was released with a backdoor on March 28th 2021, but the #backdoor was quickly discovered and removed. If this version of #php runs on a server, an #attackers…
HackerOne
https://shabarkin.medium.com/gsuite-domain-takeover-through-delegation-9d6664c91142
Medium
GSuite domain takeover through delegation
By exploiting a broken business logic of a web app, it can be possible to retrieve even Google service account credentials integrated through the OAuth flow and compromise all GSuite users by delegating specific permissions in the GSuite domain.
HackerOne
https://docs.google.com/presentation/d/1cMSRVlJJ5de6Pyv-09YgzOGS0OYrP6p7ggGl0f42wmw/edit
Google Docs
(pub)TBHM App v1
The Bug Hunter’s Methodology Application Hacking v1
HackerOne
https://github.com/hktalent/scan4all
GitHub
GitHub - GhostTroops/scan4all: Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints;…
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)... - ...
TWeb.init({scrollToPost:'HackerOne/3379'});