یکی از تیم های ایرانی در حال توسعه یک پلتفرمی هستش که آنلاین این فیچر هارو تست میکنه و خروجی خیلی خوبی میده، این پلتفرم بتا و درحال تغییره و بنظرم پروژه خوبیه حتما ازش استفاده کنید.
Recon
Vulnerability Detection
Github Detective
URL Crawler
همراه با خروجی مناسب
پیشنهاد میشه سر بزنید و نظرتونو بگید زیر همین پست، توی چنل هستن نظراتو میخونن و مطابق با نیازها مشکل هارو فیکس میکنند و کیفیت رو ارتقا میدند.
https://hackerium.io
For more join to channel (:
https://yangx.top/rootdr_research
#bugbounty
#web
#Pentest
Recon
Vulnerability Detection
Github Detective
URL Crawler
همراه با خروجی مناسب
پیشنهاد میشه سر بزنید و نظرتونو بگید زیر همین پست، توی چنل هستن نظراتو میخونن و مطابق با نیازها مشکل هارو فیکس میکنند و کیفیت رو ارتقا میدند.
https://hackerium.io
For more join to channel (:
https://yangx.top/rootdr_research
#bugbounty
#web
#Pentest
👍13❤3
Forwarded from Bug Bounty Tools & Writeups | Hide Club
It crawls a target website, extracts GET parameters, and tests them for reflected input. The tool helps bug bounty hunters and penetration testers quickly identify potential reflected #XSS flaws, offering fast and reliable results.
🔴 Crawls a target domain to discover all pages and GET parameters.🔴 Tests each parameter to check if it's reflected in the response.🔴 Outputs a list of reflected parameters for further exploitation.🔴 Fast and optimized for bug bounty hunters.🔴 Easy to use with minimal setup.
#infosec #cybersecurity #bugbounty #pentest #bugbountyTips #bugbountyTools
Please open Telegram to view this post
VIEW IN TELEGRAM
❤8
Bugbounty Tips
Photo
🚨 Introducing XSS-Finder: Automated XSS & Reflected Parameter Finder Tool! 🚨
Hey everyone! I'm excited to share a powerful new tool I've developed for penetration testing and web application security enthusiasts – XSS-Finder. 🎯
🔍 What does it do?
Automates the process of detecting XSS vulnerabilities and reflected input parameters on websites.
Crawls domains to gather URLs and identifies GET parameters that are vulnerable to XSS attacks.
Saves the crawled URLs in a text file and checks them for potential XSS vulnerabilities.
Provides a detailed report with the found vulnerabilities to help you secure your web applications.
💻 Features:
🚀 Fast and efficient scanning.
🧑💻 Works with both GET parameters and reflected XSS payloads.
🗂 Saves results and crawled URLs for review.
🌐 Supports both public and private domains.
🔧 How to use it?
Clone the repo and run the tool in just a few easy steps!
Supports Python 3.x, and all dependencies are listed in the requirements.txt.
🔗 Get started:
Clone the repository: git clone https://github.com/rootDR/xss-finder.git
Install dependencies: pip install -r requirements.txt
Run the script: python xss-finder.py -t http://example.com
📝 Check it out here: XSS-Finder GitHub Repository
For more join to channel :
https://yangx.top/rootdr_research
#web
#bugbounty
#tools
#pentest
Hey everyone! I'm excited to share a powerful new tool I've developed for penetration testing and web application security enthusiasts – XSS-Finder. 🎯
🔍 What does it do?
Automates the process of detecting XSS vulnerabilities and reflected input parameters on websites.
Crawls domains to gather URLs and identifies GET parameters that are vulnerable to XSS attacks.
Saves the crawled URLs in a text file and checks them for potential XSS vulnerabilities.
Provides a detailed report with the found vulnerabilities to help you secure your web applications.
💻 Features:
🚀 Fast and efficient scanning.
🧑💻 Works with both GET parameters and reflected XSS payloads.
🗂 Saves results and crawled URLs for review.
🌐 Supports both public and private domains.
🔧 How to use it?
Clone the repo and run the tool in just a few easy steps!
Supports Python 3.x, and all dependencies are listed in the requirements.txt.
🔗 Get started:
Clone the repository: git clone https://github.com/rootDR/xss-finder.git
Install dependencies: pip install -r requirements.txt
Run the script: python xss-finder.py -t http://example.com
📝 Check it out here: XSS-Finder GitHub Repository
For more join to channel :
https://yangx.top/rootdr_research
#web
#bugbounty
#tools
#pentest
🔥9❤3👍1
نکته مهم در تستهای امنیتی API
وقتی دارید روی یک برنامه باگبانتی یا پروژه تست نفوذ کار میکنید، مخصوصاً برای کشف آسیبپذیریهای:
- IDOR (Insecure Direct Object Reference)
- BAC (Broken Access Control)
- Authorization Issues
حتماً به این نکته توجه کنید:
همهی اندپوینتها رو تست کنید!
مهم نیست اگر ۹۹ تا از ۱۰۰ اندپوینت امن بودن، فقط همون یک مورد آسیبپذیر ممکنه کل سیستم رو به خطر بندازه.
همیشه با انواع ورودیها تستتونو تکمیل کنین مثل:
-
-
-
-
-
-
-
-
-
📌 حتی اگر پلتفرم ایرانی باشه یا خارجی، تجربه ثابت کرده که با تست خلاقانه و روشهای مختلف، آسیبپذیری پیدا میشه!
Golden Tip for API Security Testing
When you're working on a bug bounty program or a penetration testing project, especially for discovering vulnerabilities like:
- IDOR (Insecure Direct Object Reference)
- BAC (Broken Access Control)
- Authorization Issues
Pay close attention to this tip:
Test every endpoint!
It doesn't matter if 99 out of 100 endpoints seem secure — that one vulnerable endpoint could compromise the entire system.
🧪 Always test with different input types such as:
-
-
-
-
-
-
-
-
-
📌 Whether you're dealing with an Iranian or international platform, experience shows that creative and diverse testing often reveals vulnerabilities.
#bugbounty #pentest #websecurity #IDOR #Authorization
وقتی دارید روی یک برنامه باگبانتی یا پروژه تست نفوذ کار میکنید، مخصوصاً برای کشف آسیبپذیریهای:
- IDOR (Insecure Direct Object Reference)
- BAC (Broken Access Control)
- Authorization Issues
حتماً به این نکته توجه کنید:
همهی اندپوینتها رو تست کنید!
مهم نیست اگر ۹۹ تا از ۱۰۰ اندپوینت امن بودن، فقط همون یک مورد آسیبپذیر ممکنه کل سیستم رو به خطر بندازه.
همیشه با انواع ورودیها تستتونو تکمیل کنین مثل:
-
null
-
0
-
-1
-
9999999
-
true / false
-
""
(رشته خالی)-
[]
(آرایه)-
{}
(آبجکت)-
float / int
📌 حتی اگر پلتفرم ایرانی باشه یا خارجی، تجربه ثابت کرده که با تست خلاقانه و روشهای مختلف، آسیبپذیری پیدا میشه!
Golden Tip for API Security Testing
When you're working on a bug bounty program or a penetration testing project, especially for discovering vulnerabilities like:
- IDOR (Insecure Direct Object Reference)
- BAC (Broken Access Control)
- Authorization Issues
Pay close attention to this tip:
Test every endpoint!
It doesn't matter if 99 out of 100 endpoints seem secure — that one vulnerable endpoint could compromise the entire system.
🧪 Always test with different input types such as:
-
null
-
0
-
-1
-
9999999
-
true / false
-
""
(empty string)-
[]
(array)-
{}
(object)-
float / int
📌 Whether you're dealing with an Iranian or international platform, experience shows that creative and diverse testing often reveals vulnerabilities.
#bugbounty #pentest #websecurity #IDOR #Authorization
🔥23❤11👍6🤣4👏1