Bug Bounty Tools & Writeups | Hide Club


Kanal geosi va tili: Eron, Inglizcha


🔻 Welcome to HideClub!
🐞 Bug Bounty tools & tips
💉 Vulnerability exploits
💻 Web App Security
🔐 Hunting insights & Write-up analysis

Связанные каналы  |  Похожие каналы

Kanal geosi va tili
Eron, Inglizcha
Statistika
Postlar filtri


🔖Bypass Cloudflare's /h/b/jsd challenge using 100% Python

The script automatically gets the fingerprint and replaces the timestamp with %timestamp% for your convenience

📱 Github: 🔗Link

#CyberSecurity #bugbountyTools #bugbounty #reconnaissance #infosec #bugbountytips
🔹 Share & Support Us 🔹
💬 Channel : @Hide_Club


🔖Udemy – Web Security & Bug Bounty: Learn Penetration Testing

This course is focused on learning by doing. We are going to teach you how penetration testing works, by actually practicing the techniques and methods used by bug bounty hunters today. We will start off by creating our virtual hacking lab to make sure we keep your computers safe throughout the course, as well as doing things legally, and having our computers set up for penetrations testing.


⬇️Syllabus
Our Virtual Lab Setup
Website Enumeration & Information Gathering
Introduction To Burpsuite
HTML Injection
Command Injection/Execution
Broken Authentication
Bruteforce Attacks
Sensitive Data Exposure
Broken Access Control
Security Misconfiguration
Cross Site Scripting – XSS
SQL Injection
XML, XPath Injection, XXE
Components With Known Vulnerabilities
Insufficient Logging And Monitoring
Monetizing Bug Hunting
Extra – Web Developer Fundamentals
Extra – Linux Terminal
Extra – Networking


🖥 Description: 🔗 Link
📥 Download:    🔗 Link

⚠️This banner will be deleted within 24 hours, but the files will still be accessible at @HideClubFiles.

#InfoSec #CyberSecurity #Hacking #Course #BugBounty #Pentest
🔹 Share & Support Us 🔹
📱 Channel : @Hide_Club


Cybersecurity - Bug Bounty Write-Ups:
@Daily_Writeups ✍️

Bug Bounty Notes:
@Spider_Crew 🕷




🔴Replace subdomains.txt with the filename of your subdomains list.

#!/bin/bash

go install -v github.com/tomnomnom/anew@latest
subdomain_list="subdomains.txt"

for sub in $( ( cat $subdomain_list | rev | cut -d '.' -f 3,2,1 | rev | sort | uniq -c | sort -nr | grep -v '1 ' | head -n 10 && cat subdomains.txt | rev | cut -d '.' -f 4,3,2,1 | rev | sort | uniq -c | sort -nr | grep -v '1 ' | head -n 10 ) | sed -e 's/^[[:space:]]*//' | cut -d ' ' -f 2);do
subfinder -d $sub -silent -max-time 2 | anew -q passive_recursive.txt
assetfinder --subs-only $sub | anew -q passive_recursive.txt
amass enum -timeout 2 -passive -d $sub | anew -q passive_recursive.txt
findomain --quiet -t $sub | anew -q passive_recursive.txt
done
🔹 Share & Support Us 🔹
💬 Channel : @Hide_Club


🔖Subdomain Enumeration - Recursive

💡Note:
This technique is only useful when your target has a large number of multi-level subdomains(not effective for small & medium scope targets). Execute this technique as the final step.


🧑‍💻Workflow:

🔴Step-1
Read the list of subdomains from the file "subdomains.txt".

🔴Step-2
Process the subdomains in two steps:
a) Find the Top-10 most frequent occuring Second-Level Domain names with the help of tools like cut, sort, rev, uniq, etc.
b) Find the Top-10 most frequent occuring Third-Level domains.

🔴Step-3
Now run passive subdomain enumeration on these 10 Second-level domain names and 10 Third-level domain names using tools like amass, subfinder, assetfinder, findomain.

🔴Step-4
Keep appending the results to passive_recursive.txt file.

🔴Step-5
Now after finding out the a list of domain names, run puredns to DNS resolve them and find the alive subdomains.
Replace subdomains.txt with the filename of your subdomains list.


👇🏻Check the Example Script on the next post.

#CyberSecurity #bugbountyTools #bugbounty #reconnaissance #infosec #bugbountytips
🔹 Share & Support Us 🔹
💬 Channel : @Hide_Club


Which course or book do you want? Comment it down here; you can also mention the topic. For example, I need resources for learning API security. 👇


🔖JSA - Javascript security analysis (JSA) is a program for monitoring javascript files during the web application security assessment.

📱 Github: 🔗Link

#CyberSecurity #bugbountyTools #bugbounty #Nuclei #reconnaissance #infosec #bugbountytips
🔹 Share & Support Us 🔹
💬 Channel : @Hide_Club


🔖Collection of write-ups, blog posts and papers related to cybersecurity, reverse engineering and exploitation

📱 CyberSecurity
📱 Exploitation
📱 Linux Kernel
📱 OT/IoT/ICS Security
📱 Red Team
📱 Web3
📱 Wireless

#CyberSecurity #bugbounty #infosec
🔹 Share & Support Us 🔹
💬 Channel : @Hide_Club


🔖Nuclei templates for #drupal vulnerabilities

📱 Github: 🔗Link

How to use Nuclei templates?
nuclei -t ./nuclei-drupal-sa/templates/ --target https://www.example.com

#CyberSecurity #bugbountyTools #bugbounty #Nuclei #reconnaissance #infosec #bugbountytips
🔹 Share & Support Us 🔹
💬 Channel : @Hide_Club


🔖Directory-Traversal-Payloads

A Complete List of Directory Traversal/LFI Payloads Scraped from the Internet


📱 Github: 🔗Link

#CyberSecurity #bugbountyTools #bugbounty #payloads #reconnaissance #infosec #bugbountytips
🔹 Share & Support Us 🔹
💬 Channel : @Hide_Club


Spider Crew | Bug Bounty Tips, Tools, Writeups & Exploits dan repost
🕷Network+ (Network+ N10-008 book by Mike Myers) Summery Part-13

📱 Chapter-13 WAN Connectivity: 🔗 Link

🔗 Previous Chapter

💡Stay tuned for the next chapter—I’ll post it next Friday!

#CyberSecurity #bugbounty #Network #infosec
🔸🔸🔸🔸🔸🔸🔸🔸
Boost The Channel
🕷 T.me/Spider_Crew
🔸🔸🔸🔸🔸🔸🔸🔸


🔖 I’ve added a new feature to 📱 Robofinder—you can now extract old parameters from archived robots.txt files! This is a powerful addition to your recon process, as it helps uncover hidden or deprecated parameters that other tools might miss.

(New🔥) You can use this command to extract parameters and save them to a file:
robofinder -u https://example.com -p

#CyberSecurity #bugbountyTools #bugbounty #Recon #reconnaissance #infosec #Archive #bugbountytips
🔹 Share & Support Us 🔹
💬 Channel : @Hide_Club


🔖Hacking GraphQL APIs

GraphQL pentesting focuses on identifying security vulnerabilities in applications that use GraphQL for data querying. Unlike REST APIs, GraphQL allows clients to request specific data, which can expose underlying issues if not properly secured. Key areas of concern include improper authorization checks, excessive data exposure, and insufficient input validation. Pentesters should look for flaws such as introspection queries revealing sensitive schema details, or complex queries leading to denial of service. Ensuring robust input validation, implementing strict authorization checks, and limiting query complexity are essential practices to secure GraphQL endpoints.


🖥 Articles and Blog Posts
🔗 Hacktricks - GraphQL and Security
🔗 Five easy ways to hack GraphQL targets
🔗 Portswigger - Graphql
🔗 ApiSecurity


⬇️ GitHub Resources
📱 PayloadsAllTheThings
📱 hacking graphql
📱 Awesome Graphql Security
📱 Hack-graphql


⬇️Videos
🖤  NahamCon2024: GraphQL is the New PHP
🖤  Finding Your Next Bug: GraphQL
🖤  GraphQL API Pentesting


⬇️Books
📕 Black Hat GraphQL
📕 Hacking APIs - Breaking Web Application ...
📕 API Security in Action


#BugBounty #Recon #BugBountyTips #CyberSecurity #Infosec #Reconnaissance #graphql
🔹 Share & Support Us 🔹
💬 Channel : @Hide_Club


Cybersecurity - Bug Bounty Write-Ups:
@Daily_Writeups ✍️

Bug Bounty Notes:
@Spider_Crew 🕷


🔖Essential Browser Extensions for Bug Bounty Hunters

⬇️FireFox
🔍 Link Gopher
🔍 Adblock Plus
🔍 FoxyProxy Standard
🔍 Video Speed Controller
🔍 Check XSS
🔍 HackTools
🔍 Bulk URL Opener
🔍 Temp Mail
🔍 JS Beautify CSS HTML
🔍 Multi-Account Containers


⬇️Chrome
🌐 TruffleHog
🌐 Code Formatter
🌐 Freedium Extension
🌐 BuiltWith
🌐 Wappalyzer
🌐 WhatRuns
🌐 Retire.js
🌐 Cookie Extractor
🌐 Wayback Machine
🌐 EXIF Data Viwer
🌐 Shodan
🌐 S3 Bucket List
🌐 Ublock Origin
🌐 Resources Saver
🌐 Dot Git
🌐 EndPointer


#BugBounty #Recon #BugBountyTips #CyberSecurity #Infosec #Reconnaissance
🔹 Share & Support Us 🔹
💬 Channel : @Hide_Club


Thank you so much for donating stars ⭐️
I truly appreciate each one of you ♥️


🔖All You Need to Master IDOR: A Complete Resource Guide

⬇️GitHub Repositories
All these GitHub Repositories contains 1000+ Hackerone reports to read from which you can learn how bug bounty hunters did recon to find IDOR Vulnerability, I suggest read atleast 300 reports to get your own unique perspective on IDOR Vulnerability.

📱 Awesome-Bugbounty-Writeups - IDOR
📱 HackerOne Reports - Top IDOR
📱 HackerOneReports - IDOR

⬇️Critical/Highest bounty through IDOR Vulnerability
🖤 IDOR - how to predict an identifier? Bug bounty case study
🖤 $5,000 YouTube IDOR - Bug Bounty Reports Explained
🖤 $28k IDOR that broke Apple Shortcuts - Apple bug bounty

⬇️All possible parameters for IDOR and real life examples of each
🖤 Bug Bounty Hunting for IDORs - Part-I
🖤 Bug Bounty Hunting for IDORs - Part-II
🖤 Bug Bounty Hunting for IDORs - Part-III

⬇️Book
📕 Bug Bounty Bootcamp - By Vickie Li

#BugBounty #Recon #BugBountyTips #CyberSecurity #Infosec #Reconnaissance #IDOR
🔹 Share & Support Us 🔹
💬 Channel : @Hide_Club


Do you enjoy these kinds of posts?


Google-Drive-@Hide_Club.txt
893bayt
🔖Sensitive Files Exposure via Google Dorking

Check out this critical bug report submitted to the DoD (Department of Defense):
👉 HackerOne Report #2926447

🤔What happened?
An attacker discovered sensitive military files on Google Drive containing PII (Personally Identifiable Information), including names, Social Security Numbers (SSNs), and more.

🧐How to find similar leaks using Google Dorks?
You can use these dorks for Google Drive/Docs:
site:drive.google.com inurl:folder
site:drive.google.com inurl:open
site:docs.google.com inurl:d
site:drive.google.com "confidential"
site:docs.google.com inurl:d filetype:docx


✖️ Want more dorks? Check the file I’ve attached to this post.

#BugBounty #Recon #dork #BugBountyTips #CyberSecurity #Infosec #Reconnaissance
🔹 Share & Support Us 🔹
💬 Channel : @Hide_Club

3.3k 0 101 1 28
20 ta oxirgi post ko‘rsatilgan.