
πΊππππππ πΊππππππ
@xalgord
Followers
331
Following
107
Media
94
Statuses
314
Penetration tester | eJPTv2 | Bug Bounty Hunter
India
Joined January 2020
Checkout "How to Rotate Your IP Address & Stay Anonymous System-Wide on Windows (2025 Guide)" #BugBounty #cybersecurity #Hacking.
0
0
0
An SQL dump file (mysql.sql) was exposed at "http:// SUB.REDACTED .net/ wp-content/mysql.sql", revealing sensitive information like user credentials and API keys. Tip: Create a custom wordlist instead of using common ones. #bugbounty #CyberSecurity #hacking
0
0
0
Made a POC for How I was able to access AWS metadata service from outside the EC2 Instance. #bugbounty #CyberSecurity.
0
0
1
I just published Comprehensive Bug Bounty Hunting Methodology (2024 Edition) . #bugbountytip #bugbounty #Hacking #CyberSecurity.
0
0
2
RT @therceman: Bug Bounty Tip. List of localhost addresses for SSRF bypass. πΉ http://localhost.πΉhttp://127.1.πΉhttp://127.0.0.0.πΉhttp://127.0β¦.
0
217
0
Found a stored XSS in 15 minutes. Payload used: "></div><a/href="j	a	v	asc	ri	pt:alert(document.cookie)">. #bugbounty #cybersecurity #penetrationtesting
0
1
3
XSS via Comment Bypass. The reflected payload was commented out in the source code like this: <!-- <h1>test</h1> -->. So, I used this payload to uncomment the code: --><h1>test</h1>. Now the source code becomes this: <!----><h1>test</h1> and it works. #bugbounty #xss #Pentesting
0
0
2
Thanks dude.
π₯ Website of the day: XALGORD. π€© I like how blog posts are neatly organised by category and tags. π οΈ I think the bottom navigation is great for mobile but doesn't work very well on desktops. What do YOU think of @xalgord's site? π₯
1
0
1