javanoscript:(function(){var noscripts=document.getElementsByTagName("noscript"),regex=/(?<=(\"|\'|\`))\/[a-zA-Z0–9_?&=\/\-\#\.]*(?=(\"|\'|\`))/g;const results=new Set;for(var i=0;i<noscripts.length;i++){var t=noscripts[i].src;""!=t&&fetch(t).then(function(t){return t.text()}).then(function(t){var e=t.matchAll(regex);for(let r of e)results.add(r[0])}).catch(function(t){console.log("An error occurred: ",t)})}var pageContent=document.documentElement.outerHTML,matches=pageContent.matchAll(regex);for(const match of matches)results.add(match[0]);function writeResults(){results.forEach(function(t){document.write(t+"<br>")})}setTimeout(writeResults,3e3);})();Please open Telegram to view this post
VIEW IN TELEGRAM
10👍7❤6🔥5🤝2
grep-backURLs - Automated way to extract juicy info with subfinder and waybackurls
https://github.com/gigachad80/grep-backURLs
https://github.com/gigachad80/grep-backURLs
1🔥12👍4
templates/processed/syslog-tcp-forward.conf
templates/processed/config.ini
Credit- Suyash Sharma
Please open Telegram to view this post
VIEW IN TELEGRAM
👍18🔥9❤2
https://github.com/iamunixtz/Lazy-Hunter
Please open Telegram to view this post
VIEW IN TELEGRAM
👍17🔥8❤3🗿1
Need an extensive SQL injection cheat sheet for bug bounty hunting and pentesting in general? 🧐
Check out @0xTib3rius' SQL Injection cheat sheet, it provides payloads for the 5 most popular databases such as MySQL, PostgreSQL, Oracle, etc.! 😎
🔗 buff.ly/3WeSO5X
Check out @0xTib3rius' SQL Injection cheat sheet, it provides payloads for the 5 most popular databases such as MySQL, PostgreSQL, Oracle, etc.! 😎
🔗 buff.ly/3WeSO5X
👏13👍6
🤝6
This media is not supported in your browser
VIEW IN TELEGRAM
urlhunter: A recon tool that allows searching on URLs that are exposed via shortener services
Link: https://github.com/utkusen/urlhunter
Link: https://github.com/utkusen/urlhunter
🔥18👍3❤2🤝2
Brut Security
From The Author https://www.youtube.com/watch?v=qY6Zl43hMko
YouTube
EpicGames - Live Bug Bounty Hunting on Hackerone (hunting cves)
EpicGames - Live Bug Bounty Hunting on HackerOne (Hunting CVEs) | Using Lazy-Hunter
Tool: https://github.com/iamunixtz/Lazy-Hunter
Join us as we dive into live bug bounty hunting on HackerOne, specifically targeting EpicGames vulnerabilities! In this session…
Tool: https://github.com/iamunixtz/Lazy-Hunter
Join us as we dive into live bug bounty hunting on HackerOne, specifically targeting EpicGames vulnerabilities! In this session…
🔥23👍7
CVE-2025-26794: SQL Injection in Exim 4.98, 7.5 rating❗️
A vulnerability in the Exim mail transfer agent could allow a remote attacker to perform SQL injection.
Search at Netlas.io:
👉 Link: https://nt.ls/ge4Iy
👉 Dork: smtp.banner:"Exim 4.98"
Vendor's advisory: https://www.exim.org/static/doc/security/CVE-2025-26794.txt
A vulnerability in the Exim mail transfer agent could allow a remote attacker to perform SQL injection.
Search at Netlas.io:
👉 Link: https://nt.ls/ge4Iy
👉 Dork: smtp.banner:"Exim 4.98"
Vendor's advisory: https://www.exim.org/static/doc/security/CVE-2025-26794.txt
🔥35👍10🐳1
Please open Telegram to view this post
VIEW IN TELEGRAM
👍14🔥3🐳1🗿1
CVE-2025-1128: RCE in Everest Forms WordPress Plugin, 9.8 rating 🔥
The vulnerability allows an unauthenticated attacker to perform a wide range of actions with the site: upload arbitrary files, RCE, delete config files.
Search at Netlas.io:
👉 Link: https://nt.ls/q6pgJ
👉 Dork: http.body:"plugins/everest-forms"
Read more: https://www.wordfence.com/blog/2025/02/100000-wordpress-sites-affected-by-arbitrary-file-upload-read-and-deletion-vulnerability-in-everest-forms-wordpress-plugin/
The vulnerability allows an unauthenticated attacker to perform a wide range of actions with the site: upload arbitrary files, RCE, delete config files.
Search at Netlas.io:
👉 Link: https://nt.ls/q6pgJ
👉 Dork: http.body:"plugins/everest-forms"
Read more: https://www.wordfence.com/blog/2025/02/100000-wordpress-sites-affected-by-arbitrary-file-upload-read-and-deletion-vulnerability-in-everest-forms-wordpress-plugin/
🔥11👍1
𝗚𝗮𝗺𝗲 𝗼𝗳 𝗔𝗰𝘁𝗶𝘃𝗲 𝗗𝗶𝗿𝗲𝗰𝘁𝗼𝗿𝘆
👻 👻 GOAD is a pentest active directory LAB project. This lab aims to give pentesters a vulnerable AD environment ready to use to practice usual attack techniques.
🔥 https://github.com/Orange-Cyberdefense/GOAD
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥17👍7❤2
🔗 BApp Store: https://portswigger.net/bappstore/a321360c6e114b3dab6f2c67d68c241a
💻 Source Code: https://github.com/portswigger/spoofproof
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥20❤6👍4🤨2