For Tryhackme and Hackthebox Vip+ Vouchers DM me.
Available For India Only. Dm @wtf_yodhha
Available For India Only. Dm @wtf_yodhha
This media is not supported in your browser
VIEW IN TELEGRAM
Keyfinder 📱 is a tool that let you find keys while surfing the web!
📎 https://github.com/momenbasel/keyFinder
#bugbountytips #bugbounty
#bugbountytips #bugbounty
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥2❤1
Please open Telegram to view this post
VIEW IN TELEGRAM
👍5
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
🚨cloud_enum🚨
👉Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.
🔗https://github.com/initstring/cloud_enum
#bugbounty #bugbountytips
👉Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.
🔗https://github.com/initstring/cloud_enum
#bugbounty #bugbountytips
GitHub
GitHub - initstring/cloud_enum: Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.
Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud. - initstring/cloud_enum
👍2
This media is not supported in your browser
VIEW IN TELEGRAM
Hey everyone📣 ,
⚠️ Can you believe it's already June? We've covered six months, but have we really dived into cybersecurity or web penetration testing yet? Have any of us snagged our first bug bounty or made it into a Hall of Fame?
📌 Let's use the next six months to change that. Dedicate yourself fully to learning and practicing. Imagine where you could be by the end of the year—skilled, confident, and maybe even recognized in the cybersecurity world.
🔥 Let’s go all in and fight for our freedom through knowledge and skills. Who’s ready to take on this challenge?
Cheers,
The Brut Security Team☄️
Cheers,
The Brut Security Team
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥10👍1💯1🗿1
Please open Telegram to view this post
VIEW IN TELEGRAM
YouTube
Find Hidden Subdomains & IPs | RSEScan | RSECloud | Bug Bounty Recon | Brut Security
📢RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a given domain or organization.
🚨 Registration Open for July 1st Batch: Extreme Web Application Penetration Testing 🚨
☎️Registration…
🚨 Registration Open for July 1st Batch: Extreme Web Application Penetration Testing 🚨
☎️Registration…
👍3🔥1
Brut Security pinned «⌛ RSEScan⌛ 📣 A command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a given domain or organization. A command-line utility for interacting with the RSECloud. It allows you to fetch subdomains…»
Reconnaissance- Phase1.pdf
1.5 MB
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥1
#bugbounty #bugbountytips
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - YA551N3/Bug-Bounty-Wordlists
Contribute to YA551N3/Bug-Bounty-Wordlists development by creating an account on GitHub.
👍6
💥Bug Bounty Tip: Don't Overlook Image Endpoints!💥
👉Did you know 95% of hunters remove image files from their endpoint scans? Here's how Orwa found sensitive information by focusing on them:
1. Gather All Target Endpoints: Collect endpoints from your target.
2. Filter for Image Extensions: Use a simple command to isolate image URLs.
cat endpoints.txt | egrep 'jpg|jpeg|png' > results.txt
3. Check for Live URLs: Ensure the filtered image URLs are active.
4. Use a Screenshot Tool: Automate the process of taking screenshots of these URLs to quickly spot sensitive information.
ℹ️ Success Story by GodfatherOrwa:
-He found a passport image at
- Visiting
- The result? Tons of exposed PII!
👌Always check image file endpoints (.jpg, .jpeg, .png, etc.). You might find more than you expect!
Happy hunting, everyone! ♥
Credit: @godfatherorwa
#bugbountytips #bugbountytip #bugbounty
👉Did you know 95% of hunters remove image files from their endpoint scans? Here's how Orwa found sensitive information by focusing on them:
1. Gather All Target Endpoints: Collect endpoints from your target.
2. Filter for Image Extensions: Use a simple command to isolate image URLs.
cat endpoints.txt | egrep 'jpg|jpeg|png' > results.txt
3. Check for Live URLs: Ensure the filtered image URLs are active.
4. Use a Screenshot Tool: Automate the process of taking screenshots of these URLs to quickly spot sensitive information.
ℹ️ Success Story by GodfatherOrwa:
-He found a passport image at
app[.]com/xxxx/cdn/file/xxx.jpg.- Visiting
app[.]com/xxxx/cdn/ revealed an open directory listing.- The result? Tons of exposed PII!
👌Always check image file endpoints (.jpg, .jpeg, .png, etc.). You might find more than you expect!
Happy hunting, everyone! ♥
Credit: @godfatherorwa
#bugbountytips #bugbountytip #bugbounty
👍5
Media is too big
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
🤯6❤1