Roberto Nunes(@0x_Akoko) 's Twitter Profileg
Roberto Nunes

@0x_Akoko

24 y/o | Application Security Enthusiast |BugBounty Hunter | he/him | 🇹🇱

ID:1152164426235072512

linkhttp://hackerone.com/Roberto99 calendar_today19-07-2019 10:33:00

827 Tweets

1,7K Followers

208 Following

Emad Shanab - أبو عبد الله(@Alra3ees) 's Twitter Profile Photo

formcrawler:-

This script Crawls the website and finds the URLs that contain html forms. You can set the depth of crawling inside the script.

github.com/dirtycoder0124…

formcrawler:- This script Crawls the website and finds the URLs that contain html forms. You can set the depth of crawling inside the script. github.com/dirtycoder0124…
account_circle
ProjectDiscovery.io(@pdiscoveryio) 's Twitter Profile Photo

Now quickly fetch endpoints of your target passively using latest release of katana v1.10

Checkout GitHub release for more details - github.com/projectdiscove…

Now quickly fetch endpoints of your target passively using latest release of katana v1.10 Checkout GitHub release for more details - github.com/projectdiscove… #hackwithautomation #crawling #passive #osint #discovery
account_circle
Amr Mustafa(@Amr_MustafaAA) 's Twitter Profile Photo

Don't Forget when you use FFUF to add `.old` after the endpoint,it maybe let you find some backup files and extract some private/internal data

Ex: ffuf -u https://{domain}/FUZZ.old -w php_wordlist.txt -mc 200

Happy Hunting!

tips

Don't Forget when you use FFUF to add `.old` after the endpoint,it maybe let you find some backup files and extract some private/internal data Ex: ffuf -u https://{domain}/FUZZ.old -w php_wordlist.txt -mc 200 Happy Hunting! #bugbountytips #hackerone #bugbounty #CyberSecurity
account_circle
𐰚𐰼𐰇𐱅(@ynsmroztas) 's Twitter Profile Photo

Many people have often asked me how to search for 'ivanti', for shodan you can search as title:'Ivanti Connect' hostname:'target.*'
tip

Many people have often asked me how to search for 'ivanti', for shodan you can search as title:'Ivanti Connect' hostname:'target.*' #bugbountytip #bugbounty
account_circle
Mahmoud Hamed(@7odamoo) 's Twitter Profile Photo

I wrote a new writeup about chaining Out-of-Scope XSS on a single target.

7odamoo.medium.com/how-i-got-5-00…

account_circle
Vikas Anand(@kingcoolvikas) 's Twitter Profile Photo

Cloudflare WAF Bypass Leads to Reflected XSS

Payload Used : '><img src=x onerror=alert(1)> [Blocked By Cloudflare]

Payload Used : '><img src=x onerrora=confirm() onerror=confirm(1)> [XSS Popup]

Cloudflare WAF Bypass Leads to Reflected XSS Payload Used : '><img src=x onerror=alert(1)> [Blocked By Cloudflare] Payload Used : '><img src=x onerrora=confirm() onerror=confirm(1)> [XSS Popup] #bugbounty #infosec #xss
account_circle
Masonhck357(@Masonhck3571) 's Twitter Profile Photo

bugcrowd To clean this up a bit you can also do:

ffuf -w ~/http:FUZZ1 -w ~/subdomainwordlist:FUZZ2 -u FUZZ1://FUZZ2.canva.com/ -t 300 -c -r

FUZZ1 is a wordlist containing http and https
FUZZ 2 is your subdomain bruteforce list

@Bugcrowd To clean this up a bit you can also do: ffuf -w ~/http:FUZZ1 -w ~/subdomainwordlist:FUZZ2 -u FUZZ1://FUZZ2.canva.com/ -t 300 -c -r FUZZ1 is a wordlist containing http and https FUZZ 2 is your subdomain bruteforce list
account_circle
Roberto Nunes(@0x_Akoko) 's Twitter Profile Photo

Yay, I was awarded a $1,500 bounty on HackerOne! hackerone.com/roberto99

Bug : Swagger XSS
Tips : I mostly use fofa.info with favicon filter to find Swagger UI.

tips

Yay, I was awarded a $1,500 bounty on @Hacker0x01! hackerone.com/roberto99 Bug : Swagger XSS Tips : I mostly use fofa.info with favicon filter to find Swagger UI. #TogetherWeHitHarder #bugbounty #bugbountytips #swagger
account_circle
Root Moksha(@RootMoksha) 's Twitter Profile Photo

Bypass Cloudflare WAF (XSS without parentheses) inside an anchor tag

javascript:var{a:onerror}={a:alert};throw%20document.domain
portswigger.net/research/xss-w…
By:rizal.
tips

Bypass Cloudflare WAF (XSS without parentheses) inside an anchor tag javascript:var{a:onerror}={a:alert};throw%20document.domain portswigger.net/research/xss-w… By:@rizalchoirur_ #bugbountytips #bugbounty
account_circle
Abdelrahman Yousef(@B0d4___) 's Twitter Profile Photo

And yes, Jenkins CVE-2024-23897 was accepted !
Tip: Always use shodan to search for CVES.
here is the shodan query -> product:Jenkins -'2.442'-'2.426.3' then use H4x0r.DZ🇩🇿 POC

tip

And yes, Jenkins CVE-2024-23897 was accepted ! Tip: Always use shodan to search for CVES. here is the shodan query -> product:Jenkins -'2.442'-'2.426.3' then use @h4x0r_dz POC #BugBounty #vulnerabilities #rce #bugcrowed #bugbountytip #bugbounty #CVE #security #Jenkins
account_circle
𐰚𐰼𐰇𐱅(@ynsmroztas) 's Twitter Profile Photo

Sometimes Websites do not accept XSS due to waf, so I suggest you inject your XSS payload via Android App, it can be triggered on the website without any waf blocking

tip

Sometimes Websites do not accept XSS due to waf, so I suggest you inject your XSS payload via Android App, it can be triggered on the website without any waf blocking #bugbounty #bugbountytip #Xss
account_circle