Telegram Web Link
Forwarded from RedBlueTM Hit (𒆜҉️҉ ҉₮҉Ⱨ҉𝟛҉ ҉₲҉Ⱨ҉𝟘҉₴҉₮҉ ҉҉️҉𒆜)
How_Web_Hackers_Make_Big_Money_Remote_Code_Execution_@redbluehit.zip
168.6 MB
Password: @redbluehit

@Hide01 📰
@RedBlueHit 💀👀
@RedBlueTM 🔒
🗒 Subdomain Takeover leading to Full Account Takeover

https://hacktus.tech/subdomain-takeover-leading-to-full-account-takeover


@PenTest_Tm
@PenTest_Tm.pdf
88 KB
🗒 Bypassing XSS Detection Mechanisms


@PenTest_Tm
Media is too big
VIEW IN TELEGRAM
🗒 How to Bypass Adminpanel by SQL injection


@PenTest_Tm
🗒 Bypass admin login with SQL Injections (sqlmap)

https://link.medium.com/wfrrQlTg7Bb

@PenTest_Tm
burpsuite_pro_v2023.9.1.zip
622.9 MB
🗒 Burp Suite Professional v2023.9.1 + JDK 18

NOTE - Run this version With Java SE JDK 18


@PenTest_Tm
Forwarded from RedBlue (Root)
TCM - Practical Web Application Security & Testing 2022

Link: rizy.ir/EsLQ
🗒 CRLF to XSS & Open Redirection

https://hackerone.com/reports/2012519


@PenTest_Tm
Media is too big
VIEW IN TELEGRAM
🗒 Live Recon and Automation on Shopify's Bug Bounty


@PenTest_Tm
HTTP Request Splitting vulnerabilities exploitation.pdf
912.6 KB
🗒 HTTP Request Splitting vulnerabilities exploitation



@PenTest_Tm
🗒 Tips Rxss : --><svg onload=alert(document.domain)>

https://t.co/VxseOgZE3u


@PenTest_Tm
بچها 6k شدیم 😁❤️
فعالیت رو بیشتر میکنم...
image.zip
1.4 MB
یه Roadmap متشکل از تکنیک های مختلف برای یافتن آسیب پذیری های IDOR میتونید استفاده کنید.


@PenTest_Tm
🗒 Bug Bounty Hunter — Let’s Understand and Recognize IDOR Vulnerability


- Part 1

- Part 2


@PenTest_Tm
🗒 Cloudflare bypass WAF

Payload:
<inpuT autofocus oNFocus="setTimeout(function() { /*\*/top['al'+'\u0065'+'rt']([!+[]+!+[]]+[![]+[]][+[]])/*\*/ }, 5000);"></inpuT%3E&lT;/stYle&lT;/titLe&lT;/teXtarEa&lT;/scRipt&gT;


@PenTest_Tm
2025/07/06 06:45:11
Back to Top
HTML Embed Code: