drak3hft7's Avatar

drak3hft7

@drak3hft7

OSCP | eCPPT | CRTP | Bug Hunter & Penetration Tester | Synack Red Team Member | Top 15 Yeswehack

12
Followers
20
Following
6
Posts
01.12.2024
Joined
Posts Following

Latest posts by drak3hft7 @drak3hft7

Preview
Shadow Repeater:AI-enhanced manual testing Have you ever wondered how many vulnerabilities you've missed by a hair's breadth, due to a single flawed choice? We've just released Shadow Repeater, which enhances your manual testing with AI-powere

portswigger.net/research/sha...

20.02.2025 14:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

40+ Google Dorks For Low Hanging Fruits

https://bitpanic.medium.com/40-google-dorks-for-low-hanging-fruits-d8fc3d5d7a8d?source=rss------bug_bounty-5

20.01.2025 17:06 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

Amazing swag 🀠 thanks @yeswehack.bsky.social #bugbounty

22.12.2024 17:20 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
β€˜My best attribute? Persistence’: drak3hft7’s Bug Bounty story Drak3hft7 on the value of soft skills in Bug Bounty, his journey to becoming an ethical hacker, his best bug find so far and his favourite hacking tools.

@yeswehack.bsky.social #bugbounty #cybersecurity

11.12.2024 15:02 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection Introduction Hello, I’m RyotaK (@ryotkak ), a security engineer at Flatt Security Inc. A few days ago, I was upgrading my home lab network, and I decided to upgrade the OpenWrt on my router.1 After ac...

Articles worth reading discovered last week:

πŸ—ž flatt.tech/research/pos...
πŸ—ž snyk.io/articles/rem...
πŸ—ž nastystereo.com/security/rub...
πŸ—ž blog.doyensec.com/2024/12/03/c...
πŸ—ž nastystereo.com/security/r-s...
πŸ—ž satoooon1024.hatenablog.com/entry/2024/1...
πŸ—ž portswigger.net/research/byp...

08.12.2024 22:48 πŸ‘ 5 πŸ” 5 πŸ’¬ 0 πŸ“Œ 1
Preview
Bypassing WAFs with the phantom $Version cookie HTTP cookies often control critical website features, but their long and convoluted history exposes them to parser discrepancy vulnerabilities. In this post, I'll explore some dangerous, lesser-known

Did you know you can use an ancient magic cookie to downgrade parsers and bypass WAFs?! Hope you enjoy this quality bit of RFC-diving from @d4d89704243.bsky.social!
portswigger.net/research/byp...

04.12.2024 15:17 πŸ‘ 73 πŸ” 27 πŸ’¬ 1 πŸ“Œ 5
Preview
PentesterLab Blog: CORS Vulnerabilities in Go: Vulnerable Patterns and Lessons Dive into common CORS vulnerabilities found in Go codebases, with real-world examples of flawed origin validation. Understand how these mistakes occur and why Go developers need robust solutions to se...

🚨 CORS vulnerabilities in Go 🚨

Misusing strings.HasSuffix, Contains, or HasPrefix? You might be leaving the door wide open! πŸ”“

Learn how these patterns lead to bypasses πŸ›πŸ‘‡

πŸ‘‰ pentesterlab.com/blog/golang-...

02.12.2024 21:50 πŸ‘ 17 πŸ” 10 πŸ’¬ 2 πŸ“Œ 0
A mindmap with the following text https://tl.gd/n_1ss2vji

A mindmap with the following text https://tl.gd/n_1ss2vji

What is an API? What makes them special? And what kind of APIs are out there? #apisecurity #apis #bugbountytips #BugBounty

30.11.2024 08:00 πŸ‘ 34 πŸ” 5 πŸ’¬ 1 πŸ“Œ 0
Preview
drak3hft7 hunter profile - YesWeHack drak3hft7 hunter profile

Just got a reward for a high vulnerability submitted on @yeswehack.bsky.social -- Violation of Secure Design Principles (CWE-657). yeswehack.com/hunters/drak... #YesWeRHackers #bugbounty

02.12.2024 10:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
NIS 2 guide: CTEM, CVD and cost-effective compliance With just four months left until the NIS 2 Directive is mandated to come into force EU-wide, we’ve answered some FAQs about the cyber-resilience legislation.

www.yeswehack.com/security-bes...

02.12.2024 09:08 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
GitHub - drak3hft7/Cheat-Sheet---Active-Directory: This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell. This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell. - drak3hft7/Cheat-Sheet---Active-Directory

github.com/drak3hft7/Ch... #cybersecurity #offensivesec #activedirectory

01.12.2024 08:13 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
PentesterLab Blog: Encoding Is Not Magic When talking with aspiring hackers, bug bounty hunters, or application security engineers, it often feels that there’s some misunderstanding around encoding. ...

Encoding isn't magic ✨: It doesn’t bypass filters or hack systems unless something decodes it.

Learn how to avoid this common security misconception:

pentesterlab.com/blog/encodin...

#AppSec #CyberSecurity #BugBounty

01.12.2024 00:31 πŸ‘ 9 πŸ” 4 πŸ’¬ 1 πŸ“Œ 0