Bug Bounty Tools & Writeups | Hide Club


Channel's geo and language: Iran, English
Category: Technologies


πŸ”» Welcome to HideClub!
🐞 Bug Bounty tools & tips
πŸ’‰ Vulnerability exploits
πŸ’» Web App Security
πŸ” Hunting insights & Write-up analysis

Related channels  |  Similar channels

Channel's geo and language
Iran, English
Statistics
Posts filter


πŸ”– I’ve added a new feature to πŸ“± Robofinderβ€”you can now extract old parameters from archived robots.txt files! This is a powerful addition to your recon process, as it helps uncover hidden or deprecated parameters that other tools might miss.

(NewπŸ”₯) You can use this command to extract parameters and save them to a file:
robofinder -u https://example.com -p

#CyberSecurity #bugbountyTools #bugbounty #Recon #reconnaissance #infosec #Archive #bugbountytips
πŸ”Ή Share & Support Us πŸ”Ή
πŸ’¬ Channel : @Hide_Club


πŸ”–Hacking GraphQL APIs

GraphQL pentesting focuses on identifying security vulnerabilities in applications that use GraphQL for data querying. Unlike REST APIs, GraphQL allows clients to request specific data, which can expose underlying issues if not properly secured. Key areas of concern include improper authorization checks, excessive data exposure, and insufficient input validation. Pentesters should look for flaws such as introspection queries revealing sensitive schema details, or complex queries leading to denial of service. Ensuring robust input validation, implementing strict authorization checks, and limiting query complexity are essential practices to secure GraphQL endpoints.


πŸ–₯ Articles and Blog Posts
πŸ”— Hacktricks - GraphQL and Security
πŸ”— Five easy ways to hack GraphQL targets
πŸ”— Portswigger - Graphql
πŸ”— ApiSecurity


⬇️ GitHub Resources
πŸ“± PayloadsAllTheThings
πŸ“± hacking graphql
πŸ“± Awesome Graphql Security
πŸ“± Hack-graphql


⬇️Videos
πŸ–€Β  NahamCon2024: GraphQL is the New PHP
πŸ–€Β  Finding Your Next Bug: GraphQL
πŸ–€Β  GraphQL API Pentesting


⬇️Books
πŸ“• Black Hat GraphQL
πŸ“• Hacking APIs - Breaking Web Application ...
πŸ“• API Security in Action


#BugBounty #Recon #BugBountyTips #CyberSecurity #Infosec #Reconnaissance #graphql
πŸ”Ή Share & Support Us πŸ”Ή
πŸ’¬ Channel : @Hide_Club


Cybersecurity - Bug Bounty Write-Ups:
@Daily_Writeups ✍️

Bug Bounty Notes:
@Spider_Crew πŸ•·


πŸ”–Essential Browser Extensions for Bug Bounty Hunters

⬇️FireFox
πŸ” Link Gopher
πŸ” Adblock Plus
πŸ” FoxyProxy Standard
πŸ” Video Speed Controller
πŸ” Check XSS
πŸ” HackTools
πŸ” Bulk URL Opener
πŸ” Temp Mail
πŸ” JS Beautify CSS HTML
πŸ” Multi-Account Containers


⬇️Chrome
🌐 TruffleHog
🌐 Code Formatter
🌐 Freedium Extension
🌐 BuiltWith
🌐 Wappalyzer
🌐 WhatRuns
🌐 Retire.js
🌐 Cookie Extractor
🌐 Wayback Machine
🌐 EXIF Data Viwer
🌐 Shodan
🌐 S3 Bucket List
🌐 Ublock Origin
🌐 Resources Saver
🌐 Dot Git
🌐 EndPointer


#BugBounty #Recon #BugBountyTips #CyberSecurity #Infosec #Reconnaissance
πŸ”Ή Share & Support Us πŸ”Ή
πŸ’¬ Channel : @Hide_Club


Thank you so much for donating stars ⭐️
I truly appreciate each one of you β™₯️


πŸ”–All You Need to Master IDOR: A Complete Resource Guide

⬇️GitHub Repositories
All these GitHub Repositories contains 1000+ Hackerone reports to read from which you can learn how bug bounty hunters did recon to find IDOR Vulnerability, I suggest read atleast 300 reports to get your own unique perspective on IDOR Vulnerability.

πŸ“± Awesome-Bugbounty-Writeups - IDOR
πŸ“± HackerOne Reports - Top IDOR
πŸ“± HackerOneReports - IDOR

⬇️Critical/Highest bounty through IDOR Vulnerability
πŸ–€ IDOR - how to predict an identifier? Bug bounty case study
πŸ–€ $5,000 YouTube IDOR - Bug Bounty Reports Explained
πŸ–€ $28k IDOR that broke Apple Shortcuts - Apple bug bounty

⬇️All possible parameters for IDOR and real life examples of each
πŸ–€ Bug Bounty Hunting for IDORs - Part-I
πŸ–€ Bug Bounty Hunting for IDORs - Part-II
πŸ–€ Bug Bounty Hunting for IDORs - Part-III

⬇️Book
πŸ“• Bug Bounty Bootcamp - By Vickie Li

#BugBounty #Recon #BugBountyTips #CyberSecurity #Infosec #Reconnaissance #IDOR
πŸ”Ή Share & Support Us πŸ”Ή
πŸ’¬ Channel : @Hide_Club


Do you enjoy these kinds of posts?


Google-Drive-@Hide_Club.txt
893b
πŸ”–Sensitive Files Exposure via Google Dorking

Check out this critical bug report submitted to the DoD (Department of Defense):
πŸ‘‰ HackerOne Report #2926447

πŸ€”What happened?
An attacker discovered sensitive military files on Google Drive containing PII (Personally Identifiable Information), including names, Social Security Numbers (SSNs), and more.

🧐How to find similar leaks using Google Dorks?
You can use these dorks for Google Drive/Docs:
site:drive.google.com inurl:folder
site:drive.google.com inurl:open
site:docs.google.com inurl:d
site:drive.google.com "confidential"
site:docs.google.com inurl:d filetype:docx


βœ–οΈ Want more dorks? Check the file I’ve attached to this post.

#BugBounty #Recon #dork #BugBountyTips #CyberSecurity #Infosec #Reconnaissance
πŸ”Ή Share & Support Us πŸ”Ή
πŸ’¬ Channel : @Hide_Club


391315812-42a22b8e-a8da-40d7-b65f-275c09ec5484.png
85.7Kb
πŸ”–Bystander - Passive Web Vulnerability Detection Tool

Bystander is a chrome extension which monitors the network request and detect the potential web vulnerabilities, all on the user's browser. So, browse as usual and bystander will notify you if it detects any potential web vulnerabilities.


⬇️Features
πŸ”΄Detect Actual Web Vulnerabilities like CSRF, Clickjacking, etc.
πŸ”΄Detect Potential Code Sink's like NoSQLi, SSTI, SSI etc.
πŸ”΄Detect API token leakage
πŸ”΄Detect Other Important PII leakage like PAN Number, Hash disclosure, etc.
πŸ”΄Look for Insights like staging domain, admin dashboard in frontend code and network traffic.


πŸ“± Github: πŸ”—Link

#BugBounty #Recon #Automation #BugBountyTips #CyberSecurity #Infosec #Reconnaissance
πŸ”Ή Share & Support Us πŸ”Ή
πŸ’¬ Channel : @Hide_Club


If you'd like to support Hide Club,
Please give this repository a star on πŸ“± GitHub: https://github.com/Spix0r/writeup-miner

Thank you all! I'll be back tomorrow with more content. ❀️


πŸ”–119 Vulnerabilities In LTE/5G Core Infrastructure

A team was discovered 119 vulnerabilities in LTE/5G core infrastructure, each of which could lead to persistent denial of cell service for an entire metropolitan area or city. Some of these vulnerabilities may also be exploited to remotely compromise and access the cellular core. Their research encompasses seven LTE implementations (Open5GS, Magma, OpenAirInterface, Athonet, SD-Core, NextEPC, srsRAN) and three 5G implementations (Open5GS, Magma, OpenAirInterface). They found vulnerabilities in every single LTE/5G implementation tested.


πŸ‘‰For more information, you can check πŸ”— this paper and πŸ”— this blog.

#infosec #hacking #cybersecurity
πŸ”Ή Share & Support Us πŸ”Ή
πŸ“± Channel : @Hide_Club


Forward from: Spider Crew | Bug Bounty Tips, Tools, Writeups & Exploits
πŸ•·Network+ (Network+ N10-008 book by Mike Myers) Summery Part-12

πŸ“± Chapter-12 IPv6: πŸ”— Link

πŸ”— Previous Chapter

πŸ’‘Stay tuned for the next chapterβ€”I’ll post it next Friday!

#CyberSecurity #bugbounty #Network #infosec
πŸ”ΈπŸ”ΈπŸ”ΈπŸ”ΈπŸ”ΈπŸ”ΈπŸ”ΈπŸ”Έ
⚑ Boost The Channel
πŸ•· T.me/Spider_Crew
πŸ”ΈπŸ”ΈπŸ”ΈπŸ”ΈπŸ”ΈπŸ”ΈπŸ”ΈπŸ”Έ


I’m not sure why Telegram has banned some channels from the "Similar Channels" section, and our channel has been affected as well. I reached out to Telegram support, but I haven’t received any response. Does anyone know how we can fix this issue?


πŸ”–Hacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panel

That was an amazing write-up! I highly recommend you read it.πŸ‘‡πŸ»
Write-Up: πŸ”—Link

#infosec #bugbounty #bugbountytips #hacking #cybersecurity
πŸ”Ή Share & Support Us πŸ”Ή
πŸ“± Channel : @Hide_Club


πŸ”–xss0rRecon

xss0rRecon is a versatile bash script designed to facilitate domain enumeration, URL filtering, parameter discovery, and XSS detection. It is not mandatory to use xss0rRecon alongside xss0r, but doing so provides a significant boost to your scanning efficiency and accuracy. The tool is highly customizable and can be tailored to meet individual user requirements.


πŸ“± Github: πŸ”—Link
πŸ“± Tool Overview: πŸ”—Link

#BugBounty #Recon #Automation #BugBountyTips #CyberSecurity #Xss #Infosec #Reconnaissance
πŸ”Ή Share & Support Us πŸ”Ή
πŸ’¬ Channel : @Hide_Club


πŸ”–Stealing HttpOnly cookies with the cookie sandwich technique

In this post, Researcher will introduces the "cookie sandwich" technique which lets you bypass the HttpOnly flag on certain servers. This research follows on from Bypassing WAFs with the phantom $Version cookie. Careful readers may have noticed that legacy cookies allow special characters to be included inside the cookie value. In this post, we're going to abuse that.


πŸ–₯Write-Up: πŸ”—Link

#InfoSec #CyberSecurity #Hacking #BugBounty #bugbountyTools #bugbountytips #Pentest
πŸ”Ή Share & Support Us πŸ”Ή
πŸ“± Channel : @Hide_Club


πŸ”–Discover Sensitive Files by Fuzzing Key .git Paths:

/.git
/.gitkeep
/.git-rewrite
/.gitreview
/.git/HEAD
/.gitconfig
/.git/index
/.git/logs
/.svnignore
/.gitattributes
/.gitmodules
/.svn/entries

#InfoSec #CyberSecurity #Hacking #BugBounty #bugbountyTools #bugbountytips #Pentest #Fuzzing
πŸ”Ή Share & Support Us πŸ”Ή
πŸ“± Channel : @Hide_Club


-298226_temp.jpg
120.8Kb
-298229_temp.jpg
116.3Kb
-298223_temp.jpg
114.5Kb
The challenge has concluded! Thank you all for participating! β™₯️ If you didn't win this time, don't worryβ€”more challenges are coming soon!


No one has submitted the flag yet!
Hint: Use Rockyou.txt


Challenge.zip
59.6Kb
πŸ”” The challenge has startedπŸ––

Instructions:
Download the challenge file and dive in. Inside, you'll find everything you need to know. πŸ”

✍️ Note: Once you successfully solve the challenge, send me the flag! πŸƒ Be quick, the first 3 people to submit the correct flag will win!

Good luck 🀞

20 last posts shown.