校长
@OnNetFiT
Followers
698
Following
616
Media
57
Statuses
519
Web2 Bug Hunter|Red Team|Web3.0 Scientists|21-year-old | 微信公众号:不懂安全的校董 |Bilibili:不懂安全的校长
Reunion District, Dallas
Joined January 2019
昨天测了三个网贷,发现现在还是那么奇葩。总结一下思路: 现在很多网贷都用的云服务但是云安全没做好以及还有aksk的泄漏; 还有很多都是用的供应链的crm系统并且都是通过手机号登陆,但是某些供应链的开发很抽象,遇到了不知道是不是开发留的后门,只要固定这个手机号和固定验证码直接能登录;
0
0
1
Automate asset discovery and data collection with Photon’s modular crawling engine⚡ https://t.co/9awSlJZ5S6
0
47
190
I have released the first half of "Binary Exploitation 101", a beginner-friendly guide to binary exploitation. You can learn from classic buffer overflow to ret2dlresolve through CTF-like challenges. I am working on the second half now. Stay tuned🔥 https://t.co/Oy4P8l4plk
13
310
1K
I successfully discovered vulnerabilities in MacOS applications through AI analysis. https://t.co/VUbYrIvJv2
#0day #BugBounty #Apple #MACOS
0
0
4
通过这些方法,可以很轻松的窃取钱包,窃取数据等等!搞web3的要注意别开人脸识别了 https://t.co/EPKF2nDKbz
#web3 #web #security #AI #CyberSec #CyberSecurity
0
0
3
New tool drop by @marcolivermunz! 🛠️ SQLTimer is a simple, blazing-fast tool to scan for time-based SQL injections! 😎 Check it out! https://t.co/TsyL719yCX
8
56
328
AdaptixC2 v0.4 is out https://t.co/mL8AAS7w4c * New Linux/MacOS "gopher" agent * TCP/mTLS external listener for "gopher" agent * New internal TCP listener for "beacon" agent * Screenshot storage Changelog: https://t.co/JYbNxekZM6
4
109
451
Use Burp Suite's match and replace to replace payloads in the request's body, this easily bypasses client-side validation and saves a lot of time while testing #bugbountytips
1
8
55
Added peeko to #C2Matrix a browser-based XSS C2 for stealthy internal network exploration via infected browser:
github.com
peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser. - b3rito/peeko
3
17
66
AdaptixC2 v0.3 is out https://t.co/mL8AAS7w4c New: * Linking Agents (eg SMB) * Sessions Graph * Agent marker * Health checker And more in the changelog: https://t.co/8DEwfxB7YP
3
66
239
Hackers are using Gamma AI to create phishing page redirectors. To make things worse, the URL of these AI assisted webpages is on https://t.co/wRSGUybUIH domain itself, making it challenging for vendors to detect. The phishing makes you solve cloudflare style captcha, and will
3
22
83
Got an XSS? Try to 'upgrade' it to SSRF to get a bigger #BugBounty. Thanks for the #BugBountyTip, @georgeomnet! ❓Never head of ESI Injection before? Check out this @defcon talk: https://t.co/ltXGAuP6AZ
#BugBountyTips #HackWithIntigriti
0
138
360
🛠️ Rogue - An open source web app vulnerability scanner that uses LLM Agents Cool, isn't it? #infosec #bugbounty #cybersecurity
1
18
63
they don’t fix it and just let it keep spamming duplicates in triage… A MESS!!! payload XSS: /*-/*`/*\`/*%27/*%22/**/(/*%20*/oNcliCk=alert()%20)//%0D%0A%0d%0a//%3C/stYle/%3C/titLe/%3C/teXtarEa/%3C/scRipt/--!%3E\x3csVg/%3CsVg/oNloAd=alert()//%3E\x3e #bugbountytips #bugbounty
2
53
310
Top places to find PDF generators potentially vulnerable to SSRF: 🤑 • Reports (for example, analytics reports or any other report types) • Receipts & invoices (especially in e-commerce targets) • Account archives/statistics • Bank and account balance statements •
1
23
150
I've uploaded recordings of two talks I gave in OnlyMalware last year 🧐 Getting Started with Windows Malware Development https://t.co/9khXmyk4LH Random Malware Techniques - Static evasion - ETW TI evasion - Usermode evasion (DLL callbacks/VEH/HWBPs) https://t.co/H6mn189F1K
1
79
329
Read " Uncovering zero click Account takeover" https://t.co/kR7hKyn26q
jeetpal2007.medium.com
Hello everyone! Today, I’ll walk you through how I discovered a Zero-Click Account Takeover (ATO) vulnerability on a program. Let’s dive…
0
12
71