
My skills is cybersecurity specialist, bug bounty hunter,penetration tester
4 Followers
Type: Request header Match: Host: origin IP Replace: Host: vuln host 4 sqlmap -r X.txt -p X --force-ssl --level 5 --risk 3 --dbs ---random-agent --test-filter="MySQL >= 5.0.12 AND time-based blind (query SLEEP)" --proxy http://127.0.0.1:8080 #BugBountytips #bugbountytip
https://github.com/ayadim/Nuclei-bug-hunter/blob/main/file/web/js/js-analyse.yaml
CVE-2024-21501 I discovered a quirky vulnerability in sanitize-html When used on the backend with the style attribute allowed, it enables file system enumeration. Handy for uncovering a project's dependencies. https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-6256334 #Security #Vulnerability #Javascript
Yay, I was awarded a $150 bounty on @Hacker0x01 ! https://hackerone.com/pku010 #TogetherWeHitHarder