Co-founder @ethiack.com
https://0xacb.com
Make sure you get your bot audited with some better security practices 👇
https://auth0.com/blog/five-step-guide-securing-moltbot-ai-agent/
Make sure you get your bot audited with some better security practices 👇
https://auth0.com/blog/five-step-guide-securing-moltbot-ai-agent/
Another nice tool from xnl_h4ck3r is xnLinkFinder that crawls targets, extracts links, discovers secrets, and builds target-specific wordlists.
Try it out 👇
https://github.com/xnl-h4ck3r/xnLinkFinder
Another nice tool from xnl_h4ck3r is xnLinkFinder that crawls targets, extracts links, discovers secrets, and builds target-specific wordlists.
Try it out 👇
https://github.com/xnl-h4ck3r/xnLinkFinder
Chained CVE-2007-0450 (mod_proxy traversal via %5C../) + CVE-2007-1036 (exposed JBoss console) + Java deserialization RCE with jexboss
Full report 👇
Chained CVE-2007-0450 (mod_proxy traversal via %5C../) + CVE-2007-1036 (exposed JBoss console) + Java deserialization RCE with jexboss
Full report 👇
The vulnerability is now fixed, but here's how it worked:
The vulnerability is now fixed, but here's how it worked:
If your AI agent is reading external data (especially from MCP servers), proceed with caution. Incoming data might trick your model into executing unintended actions.
Blog link 👇
If your AI agent is reading external data (especially from MCP servers), proceed with caution. Incoming data might trick your model into executing unintended actions.
Blog link 👇
Combine waymore with xnLinkFinder or similar.
- waymore: Gathers the archived URL responses.
- xnLinkFinder: Extracts the hidden paths and parameters.
GitHub repos 👇
https://github.com/xnl-h4ck3r/waymore
https://github.com/xnl-h4ck3r/xnLinkFinder
Combine waymore with xnLinkFinder or similar.
- waymore: Gathers the archived URL responses.
- xnLinkFinder: Extracts the hidden paths and parameters.
GitHub repos 👇
https://github.com/xnl-h4ck3r/waymore
https://github.com/xnl-h4ck3r/xnLinkFinder
Local instances can also be exploited with one click.
Patched in main, update now.
Watch the exploit 👇
Local instances can also be exploited with one click.
Patched in main, update now.
Watch the exploit 👇
I remember the days when we spent one entire day intercepting mobile app traffic by patching a native lib when nobody knew about it and finding an open redirect on instagram[.]com///evil.com
I remember the days when we spent one entire day intercepting mobile app traffic by patching a native lib when nobody knew about it and finding an open redirect on instagram[.]com///evil.com
You’re probably already familiar with MCP but did you know that it’s not secure out of the box?
You’re probably already familiar with MCP but did you know that it’s not secure out of the box?
Claude Code allowlisted "safe" commands like echo, sed, and sort, then used regex blocklists to prevent dangerous arguments.
Blog link 👇
Claude Code allowlisted "safe" commands like echo, sed, and sort, then used regex blocklists to prevent dangerous arguments.
Blog link 👇
One recent example is CVE-2026-21962, a 10.0 CVE in Oracle HTTP Server / Apache Proxy Plugin.
https://nvd.nist.gov/vuln/detail/CVE-2026-21962 links to a GitHub repository with a fake PoC.
One recent example is CVE-2026-21962, a 10.0 CVE in Oracle HTTP Server / Apache Proxy Plugin.
https://nvd.nist.gov/vuln/detail/CVE-2026-21962 links to a GitHub repository with a fake PoC.
GAU fetches historical URLs from external sources like AlienVault OTX, Wayback Machine, and Common Crawl.
It’s great for uncovering forgotten endpoints and parameters.
👉https://github.com/lc/gau
GAU fetches historical URLs from external sources like AlienVault OTX, Wayback Machine, and Common Crawl.
It’s great for uncovering forgotten endpoints and parameters.
👉https://github.com/lc/gau
5 ideas to try 👇
5 ideas to try 👇
Here is a browser extension to help you do that quickly.
https://chromewebstore.google.com/detail/web-archives/hkligngkgcpcolhcnkgccglchdafcnao
https://addons.mozilla.org/en-US/firefox/addon/view-page-archive/
Here is a browser extension to help you do that quickly.
https://chromewebstore.google.com/detail/web-archives/hkligngkgcpcolhcnkgccglchdafcnao
https://addons.mozilla.org/en-US/firefox/addon/view-page-archive/
Why does it occur (root cause) and how to exploit it?
Are there labs or challenges to practice on?
Any related disclosed reports, blog posts or writeups?
What are the best targets to hunt for it?
What tools can detect it?
Why does it occur (root cause) and how to exploit it?
Are there labs or challenges to practice on?
Any related disclosed reports, blog posts or writeups?
What are the best targets to hunt for it?
What tools can detect it?
And he used rep+ for this impactful finding
Tool👇
And he used rep+ for this impactful finding
Tool👇
Clairvoyance, a tool by @_nikitastupin, can reconstruct GraphQL API schema even if the introspection is disabled.
For installation and usage 👇
Clairvoyance, a tool by @_nikitastupin, can reconstruct GraphQL API schema even if the introspection is disabled.
For installation and usage 👇
Always check SSO edge cases!
Always check SSO edge cases!
@busf4ctor made cool website that has a curated collection of bug bounty resources.
Check it out👇
@busf4ctor made cool website that has a curated collection of bug bounty resources.
Check it out👇
Another nice tool by @xnl_h4ck3r
Github link 👇
https://github.com/xnl-h4ck3r/xnldorker
Another nice tool by @xnl_h4ck3r
Github link 👇
https://github.com/xnl-h4ck3r/xnldorker
Enjoy the moment, and get ready for the challenges 0x7ea will bring.
Enjoy the moment, and get ready for the challenges 0x7ea will bring.
Rep+ is a Burp-style repeater extension with built-in AI for quick attack suggestions, very handy for BB hunters.
It can also extract secrets and endpoints from JS files. Cool stuff by @BourAbdelhadi
Check it out
Rep+ is a Burp-style repeater extension with built-in AI for quick attack suggestions, very handy for BB hunters.
It can also extract secrets and endpoints from JS files. Cool stuff by @BourAbdelhadi
Check it out
https://bugbounty.forum
This is the first use case I've seen for DKIM being used like this 😆
https://bugbounty.forum
This is the first use case I've seen for DKIM being used like this 😆