0day_exploit_ Profile Banner
0 day exploit Profile
0 day exploit

@0day_exploit_

Followers
3K
Following
421
Media
36
Statuses
343

Security Researcher | Crypto auditor and malware analyst πŸ₯°

Joined May 2022
Don't wanna be here? Send us removal request.
@0day_exploit_
0 day exploit
3 years
Top google Dorking . Thread 🧡:πŸ‘‡ Here is how to find sensitive data issues:. 1) publicly exposed documents :- site:ext:doc | ext:docx | ext:odt | ext:rtf | ext:sxw | ext:psw | ext:ppt | ext:pptx | ext:pps | ext:csv. #BugBounty #bugbountytips #infosec.
31
200
570
@0day_exploit_
0 day exploit
6 months
5) exploit using jsleak . cat test.txt | jsleaks -s -l -k. 6) expoit by nuclei . cat test.txt | nuclei -t credentials-disclosure-all.yaml -c 30.
Tweet card summary image
github.com
jsleak is a tool to find secret , paths or links in the source code during the recon. - byt3hx/jsleak
0
0
2
@0day_exploit_
0 day exploit
6 months
2) katana. katana -u -d 5 -jc | grep '\.js$' | tee alljs.txt. 3) Crawling with GAU. echo | gau | grep '\.js$' | anew alljs.txt. 4)Refining Results with HTTPX. cat alljs.txt | httpx-toolkit -mc 200 -o test.txt.
1
0
1
@0day_exploit_
0 day exploit
6 months
Top JS Bugs. Thread 🧡:πŸ‘‡ Here is how to find Exposed :. 1) collect all the js endpoint by lazyegg. - using automatic tools find sensitive data . #BugBounty #bugbountytips #infosec.
Tweet card summary image
chromewebstore.google.com
An endpoint parser and extractor with many flexible features
1
6
16
@0day_exploit_
0 day exploit
6 months
join our bug bounty community for additional resource and support
0
0
0
@0day_exploit_
0 day exploit
6 months
10) continue.aws s3 ls s3://[bucketname] --no-sign-request.aws s3 rm s3://[bucketname]/file.txt --no-sign-request.aws s3 cp s3://[bucketname]/ ./ --recursive --no-sign-request.
0
0
1
@0day_exploit_
0 day exploit
6 months
9) public searching . GitHub ;- org:target "amazonaws" ,"bucket_name" ,"aws_access_key" , "aws_access_key_id" , "aws_key" ,"aws_secret" , "aws_secret_key" , "S3_BUCKET" .10) Check the access control bugs. aws s3 cp file.txt s3://[bucketname] --no-sign-request.--> used for copy.
1
0
1
@0day_exploit_
0 day exploit
6 months
7) Hidden S3 URLs with Extensions. ( all urls parsing ). 8) nahamsec tool for bruteforce . 9) public finding sites.
osint.sh
Find public buckets on AWS S3 & Azure Blob by a keyword
1
0
1
@0day_exploit_
0 day exploit
6 months
6) Extracting S3 URLs from JavaScript Files using katana . katana -u site. com/ -d 5 -jc | grep '\.js$' | tee alljs.txt.cat alljs.txt | xargs -I {} curl -s {} | grep -oE 'http[s]?://[^"]*\.s3\.amazonaws\.com[^" ]*' | sort -u.
1
1
1
@0day_exploit_
0 day exploit
6 months
5) Check for the misconfiguration by S3BucketMisconf . cewl -d 3 -w file.txt. s3scanner -bucket-file file.txt -enumerate -threads 10 | grep -aE 'AllUsers: \[.*(READ|WRITE|FULL).*]'.
Tweet card summary image
salesforce.com
Salesforce is the #1 AI CRM, where humans with agents drive customer success together with AI, data, and Customer 360 apps on one unified platform.
1
0
1
@0day_exploit_
0 day exploit
6 months
3) Auto dorking with Dorkeye . 4) What about nuclei and subfinder. subfinder -d -all -silent | nuclei -t /home/bratwork/.local/nuclei-templates/http/technologies/s3-detect.yaml.
1
0
1
@0day_exploit_
0 day exploit
6 months
:) i have personally used and earned 2500$+ bounty also netherland site have a lot of similar bugs . 2) Google Dorking for AWS S3 Buckets - (site:*.s3.amazonaws.com OR site:*.s3-external-1.amazonaws.com OR site:*.s3.dualstack.us-east-1.amazonaws.com) "target . com".
1
0
1
@0day_exploit_
0 day exploit
6 months
Top AWS S3 Bugs. Thread 🧡:πŸ‘‡ Here is how to find Exposed . 1) Misconfigured AWS S3 buckets that may expose sensitive data we can manually check by %c0 on the XML error page or Wappalyzer AWS technology . #BugBounty #bugbountytips #infosec.
4
3
16
@0day_exploit_
0 day exploit
6 months
Thanks, if you get difficulty finding tools Dm for link Bonus: causion This extension are only used for educational purposes and contain js injection, so don't use them on personal browsers . 30) Hackbar - used for advanced payload.
Tweet card summary image
chromewebstore.google.com
A browser extension for Penetration Testing
0
0
2
@0day_exploit_
0 day exploit
6 months
24) S3BucketList β€” AWS Bucket Finder. 25) D3coder β€” Encode/Decode Tool. 26) Mitaka β€” OSINT Search Tool. 27) Vortimo OSINT Tool. 28) knoxss community - find advance xss. 29) APKCombo - find android bugs and informatio.
1
0
1
@0day_exploit_
0 day exploit
6 months
17) UA Switcher β€” User-Agent Spoofer. 18) EXIF Viewer Pro β€” Extract Image Metadata. 19) WaybackURL β€” Fetch Archived URLs. 20) Shodan β€” Website Intelligence Tool. 21) EndPointer β€” Find Sensitive URLs. 22) YesWeHack VDP Finder. 23) Proton vpn - for hiding your ip and advance use.
1
0
1
@0day_exploit_
0 day exploit
6 months
13) FindSomething β€” Hidden Parameter Finder. - 14) .git Finder β€” Information Disclosure. 15) Open Multiple URLs β€” Bulk URL Opener. 16) Dark Reader β€” Eye Protection.
Tweet card summary image
chromewebstore.google.com
εœ¨η½‘ι‘΅ηš„ζΊδ»£η ζˆ–jsδΈ­ζ‰Ύεˆ°δΈ€δΊ›ζœ‰θΆ£ηš„δΈœθ₯Ώ
1
0
1
@0day_exploit_
0 day exploit
6 months
8) β€” Finding Emails on Websites. 9) HackTools β€” Payload Generator. - 10) EditThisCookie β€” Advanced Cookie Editor. 11) WebRTC Protect β€” Protect IP Leak. 12) Link Gopher β€” Extract All Links.
Tweet card summary image
chromewebstore.google.com
The all in one Red team extension for web pentester
1
0
2
@0day_exploit_
0 day exploit
6 months
4) Freedium Extension - Read premium medium post for free . 5) FoxyProxy β€” Proxy Management for Burp Suite. 6) Wappalyzer , Buildwith β€” Technology Detector. 7) Temp-Mail β€” Disposable Email Service.
addons.mozilla.org
Download Freedium for Firefox. Freedium does not remove the paywall on Medium.com, allowing access to premium articles. Instead, it removes premium articles from your feed.
1
0
2
@0day_exploit_
0 day exploit
6 months
2) ParamScan -> find reflected parameters. 3) TruffleHog β€” Finding Hidden API Keys.
Tweet card summary image
github.com
ParamScan is a chrome extension for finding reflected parameters in a webpage. - ch1y0w0/ParamScan
1
0
2
@0day_exploit_
0 day exploit
6 months
Top Browser Extensions . Thread 🧡:πŸ‘‡ Here is 30 Best extension used for attackers:. 1) nuclei-ai-extension -> Browser Extension for Rapid Nuclei Template Generation. #BugBounty #bugbountytips #infosec.
Tweet card summary image
github.com
Nuclei AI - Browser Extension for Rapid Nuclei Template Generation - projectdiscovery/nuclei-ai-extension
3
3
12