
0 day exploit
@0day_exploit_
Followers
3K
Following
421
Media
36
Statuses
343
Security Researcher | Crypto auditor and malware analyst π₯°
Joined May 2022
Top google Dorking . Thread π§΅:π Here is how to find sensitive data issues:. 1) publicly exposed documents :- site:ext:doc | ext:docx | ext:odt | ext:rtf | ext:sxw | ext:psw | ext:ppt | ext:pptx | ext:pps | ext:csv. #BugBounty #bugbountytips #infosec.
31
200
570
5) exploit using jsleak . cat test.txt | jsleaks -s -l -k. 6) expoit by nuclei . cat test.txt | nuclei -t credentials-disclosure-all.yaml -c 30.
github.com
jsleak is a tool to find secret , paths or links in the source code during the recon. - byt3hx/jsleak
0
0
2
Top JS Bugs. Thread π§΅:π Here is how to find Exposed :. 1) collect all the js endpoint by lazyegg. - using automatic tools find sensitive data . #BugBounty #bugbountytips #infosec.
chromewebstore.google.com
An endpoint parser and extractor with many flexible features
1
6
16
7) Hidden S3 URLs with Extensions. ( all urls parsing ). 8) nahamsec tool for bruteforce . 9) public finding sites.
osint.sh
Find public buckets on AWS S3 & Azure Blob by a keyword
1
0
1
5) Check for the misconfiguration by S3BucketMisconf . cewl -d 3 -w file.txt. s3scanner -bucket-file file.txt -enumerate -threads 10 | grep -aE 'AllUsers: \[.*(READ|WRITE|FULL).*]'.
salesforce.com
Salesforce is the #1 AI CRM, where humans with agents drive customer success together with AI, data, and Customer 360 apps on one unified platform.
1
0
1
Top AWS S3 Bugs. Thread π§΅:π Here is how to find Exposed . 1) Misconfigured AWS S3 buckets that may expose sensitive data we can manually check by %c0 on the XML error page or Wappalyzer AWS technology . #BugBounty #bugbountytips #infosec.
4
3
16
Thanks, if you get difficulty finding tools Dm for link Bonus: causion This extension are only used for educational purposes and contain js injection, so don't use them on personal browsers . 30) Hackbar - used for advanced payload.
chromewebstore.google.com
A browser extension for Penetration Testing
0
0
2
13) FindSomething β Hidden Parameter Finder. - 14) .git Finder β Information Disclosure. 15) Open Multiple URLs β Bulk URL Opener. 16) Dark Reader β Eye Protection.
chromewebstore.google.com
ε¨η½ι‘΅ηζΊδ»£η ζjsδΈζΎε°δΈδΊζθΆ£ηδΈθ₯Ώ
1
0
1
8) β Finding Emails on Websites. 9) HackTools β Payload Generator. - 10) EditThisCookie β Advanced Cookie Editor. 11) WebRTC Protect β Protect IP Leak. 12) Link Gopher β Extract All Links.
chromewebstore.google.com
The all in one Red team extension for web pentester
1
0
2
4) Freedium Extension - Read premium medium post for free . 5) FoxyProxy β Proxy Management for Burp Suite. 6) Wappalyzer , Buildwith β Technology Detector. 7) Temp-Mail β Disposable Email Service.
addons.mozilla.org
Download Freedium for Firefox. Freedium does not remove the paywall on Medium.com, allowing access to premium articles. Instead, it removes premium articles from your feed.
1
0
2
2) ParamScan -> find reflected parameters. 3) TruffleHog β Finding Hidden API Keys.
github.com
ParamScan is a chrome extension for finding reflected parameters in a webpage. - ch1y0w0/ParamScan
1
0
2
Top Browser Extensions . Thread π§΅:π Here is 30 Best extension used for attackers:. 1) nuclei-ai-extension -> Browser Extension for Rapid Nuclei Template Generation. #BugBounty #bugbountytips #infosec.
github.com
Nuclei AI - Browser Extension for Rapid Nuclei Template Generation - projectdiscovery/nuclei-ai-extension
3
3
12