https://x.com/wtf_brut/status/1863893133379150234
Do Follow Me On🐣
Have Shared Almost 2000+ Bug Bounty Tips.😱 🇷🇺 🇺🇸
Do Follow Me On
Have Shared Almost 2000+ Bug Bounty Tips.
Please open Telegram to view this post
VIEW IN TELEGRAM
What Browser Do You Use?
Anonymous Poll
37%
Chrome
52%
FireFox
2%
Arc
28%
Brave
3%
Safari
3%
Opera GX
👍7❤2
🎉 Unlock That 20% Pro Labs Discount! 🎉
Alright, hackers, here’s the deal: Hack The Box Pro Labs just got REAL! 💥 If you’re ready to leave the beginner stuff in the dust and dive into legit red team missions, I’ve got an exclusive 20% off waiting for you. But here’s the catch – only 100 of you can snag this deal. 👀
💥 Use code:
at checkout for 20% off the annual Pro Labs subnoscription! It’s high-level hacking in real enterprise environments. Ready to go pro? 🕶️
🔗Checkout Here - https://hackthebox.com/hacker/pro-labs
Jump on this quick – or you might miss the boat. 🚤💨 #HackTheBox #LevelUp #ProLabs
Alright, hackers, here’s the deal: Hack The Box Pro Labs just got REAL! 💥 If you’re ready to leave the beginner stuff in the dust and dive into legit red team missions, I’ve got an exclusive 20% off waiting for you. But here’s the catch – only 100 of you can snag this deal. 👀
💥 Use code:
brutsecurityprolabs20
🔗Checkout Here - https://hackthebox.com/hacker/pro-labs
Jump on this quick – or you might miss the boat. 🚤💨 #HackTheBox #LevelUp #ProLabs
👍5❤1
This media is not supported in your browser
VIEW IN TELEGRAM
🔍 gitlab-subdomains - A Go-based tool to uncover subdomains via GitLab searches.
🔗https://github.com/gwen001/gitlab-subdomains
🔗https://github.com/gwen001/gitlab-subdomains
❤7👍2
Zzl scans IP ranges and extracts subdomains from SSL certificates, making it an essential tool for thorough reconnaissance and security research.
Please open Telegram to view this post
VIEW IN TELEGRAM
1❤13
By @ofjaaah
echo "tesla.com" | waybackurls | httpx -silent -timeout 2 -threads 100 | gf redirect | anew
1. Collect all URLs of the target domain from the Wayback Machine
2. Attempt to download all the URLs quickly in 100 parallel threads in order to identify working URLs
3. For all working URLs, match any potentially vulnerable parameters to open redirect
4. Print out only unique, potentially vulnerable URLs
Please open Telegram to view this post
VIEW IN TELEGRAM
❤13👍4🔥2
It's a request to everyone, do give reaction on the post, it helped me to stay motivated and to post content like this.🥸
For queries do reach me out from channel bio. Thanks Everyone!🚫
For queries do reach me out from channel bio. Thanks Everyone!
Please open Telegram to view this post
VIEW IN TELEGRAM
👍36❤11🔥8
appsettings.jsont to your wordlist, and you might discover some juicy data. Enjoy! Please open Telegram to view this post
VIEW IN TELEGRAM
👍13
🔖 JShunter - A command-line tool for analyzing JavaScript files and extracting valuable endpoints.
✨ Key Features:
JShunter specializes in uncovering sensitive data like API endpoints and spotting potential security vulnerabilities, making it indispensable for developers and security researchers.
🔗 https://github.com/cc1a2b/jshunter
✨ Key Features:
JShunter specializes in uncovering sensitive data like API endpoints and spotting potential security vulnerabilities, making it indispensable for developers and security researchers.
🔗 https://github.com/cc1a2b/jshunter
👍12❤1🔥1
🚨CVE-2024-35286 & CVE-2024-41713:Critical Mitel MiCollab Flaw Exposes Systems to Unauthorized File and Admin Access
🔥PoC: https://github.com/watchtowrlabs/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713
👇Dorks
HUNTER:/product.name="Mitel MiCollab"
SHODAN: http.favicon.hash:-1922044295
FOFA: app="Mitel-Network-Products"
🔥PoC: https://github.com/watchtowrlabs/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713
👇Dorks
HUNTER:/product.name="Mitel MiCollab"
SHODAN: http.favicon.hash:-1922044295
FOFA: app="Mitel-Network-Products"
👍15
🚨Free Bug Bounty Complete Course!
✅Learn Bug Bounty to identify and report System vulnerabilities.
🔗https://drive.google.com/drive/mobile/folders/1t-hTqg0-02t0cnc5SypHnb8t3CfE3bXU
✅Learn Bug Bounty to identify and report System vulnerabilities.
🔗https://drive.google.com/drive/mobile/folders/1t-hTqg0-02t0cnc5SypHnb8t3CfE3bXU
❤22👍6🔥5🗿4
CVE-2024-55579, -55580: RCE and Broken Access Control in Qlik Sense, 7.5 - 8.8 rating❗️
Vulnerabilities discovered in Qlik Sense allow attackers to run EXE files on the server, as well as remotely execute commands, potentially affecting confidentiality and integrity.
Search at Netlas.io:
👉 Link: https://nt.ls/9ok2E
👉 Dork: http.noscript:"Qlik Sense"
Vendor's advisory: https://community.qlik.com/t5/Official-Support-Articles/High-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows-CVEs/tac-p/2496004
Vulnerabilities discovered in Qlik Sense allow attackers to run EXE files on the server, as well as remotely execute commands, potentially affecting confidentiality and integrity.
Search at Netlas.io:
👉 Link: https://nt.ls/9ok2E
👉 Dork: http.noscript:"Qlik Sense"
Vendor's advisory: https://community.qlik.com/t5/Official-Support-Articles/High-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows-CVEs/tac-p/2496004
👍8
CENT Tool
Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place.
📱 CENT Tool 📱
Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place.
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥6❤4👍4