🔥 Burn Fat Fast. Discover How! 💪

Techpanther

Logo of telegram channel hackwithtechpanther — Techpanther T
Logo of telegram channel hackwithtechpanther — Techpanther
Channel address: @hackwithtechpanther
Categories: Technologies
Language: English
Subscribers: 268
Description from channel

This is the official channel of https://youtube.com/techpanther

Ratings & Reviews

2.00

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

1

3 stars

0

2 stars

0

1 stars

2


The latest Messages 2

2021-01-06 15:51:14 1. A CLI tool for building simple to complex IAM policies
https://github.com/mhlabs/iam-policies-cli

2. Security Architecture Review Of A Cloud Native Environment
https://notsosecure.com/security-architecture-review-of-a-cloud-native-environment

1. New CloudFlare XSS Bypass


2. A collection of awesome one-liner scripts especially for bug bounty tips
https://github.com/dwisiswant0/awesome-oneliner-bugbounty

3. A quick inventory and launcher for hacking programs
https://github.com/Orange-Cyberdefense/arsenal

1. Multi-platform skimmer hits Shopify, Bigcommerce, Zencart, Woocommerce
https://sansec.io/research/skimmer-dynamic-exfiltration-shopify-bigcommerce

2. Phorpiex - Insecure permissions EoP (PoC)
https://seclists.org/fulldisclosure/2021/Jan/4

3. Backdoor.Win32.Zombam.j - Remote Stack Buffer Overflow (PoC)
https://seclists.org/fulldisclosure/2021/Jan/7

"unCaptcha: A Low-Resource Defeat of reCaptcha’s Audio Challenge", 2018.
]-> Defeating the latest version of ReCaptcha with 91% accuracy:
https://github.com/ecthros/uncaptcha2

]-> Breaking the Google Audio reCAPTCHA with Google's own Speech to Text API (PoC)
https://incolumitas.com/2021/01/02/breaking-audio-recaptcha-with-googles-own-speech-to-text-api

]-> reCAPTCHA v3:
https://developers.google.com/recaptcha/docs/v3
181 views12:51
Open / Comment
2021-01-06 15:50:52 *Hackerone Hacktivity Updates*


Description: Other misconfiguration on Slack Server
By: ex1st4nc3_
link: https://hackerone.com/reports/1039325
to: ImpressCMS
State: Resolved
Severity: critical
Reward: -

Description: Sending thousands of notifications with single request
By: batuhan
link: https://hackerone.com/reports/957829
to: New Relic
State: Resolved
Severity: medium
Reward: 500.05 USD

Description: Read-only application can publish/delete fleets
By: ryotak
link: https://hackerone.com/reports/1032468
to: Twitter
State: Resolved
Severity: medium
Reward: 7700 USD

Description: email spoofing on doppler.team
By: ibrahimauwal
link: https://hackerone.com/reports/1071521
to: Doppler
State: Resolved
Severity: low
Reward: -

Description: Incomplete fix for CVE-2020-12673 : Specially crafted NTML message leads to buffer over read
By: catenacyber
link: https://hackerone.com/reports/966834
to: Open-Xchange
State: Resolved
Severity: medium
Reward: 400 USD

Description: Buffer overread off by one in rpa_read_buffer, incomplete fix for CVE-2020-12674
By: catenacyber
link: https://hackerone.com/reports/967457
to: Open-Xchange
State: Resolved
Severity: medium
Reward: 400 USD

Description: Node.js: use-after-free in TLSWrap
By: fwilhelm
link: https://hackerone.com/reports/988103
to: Node.js
State: Resolved
Severity: high
Reward: -

Description: No rate limiting - Create data
By: ofjaaaah
link: https://hackerone.com/reports/1047100
to: Stripo Inc
State: Resolved
Severity: medium
Reward: -

Description: No rate limiting - Create Plug-ins
By: ofjaaaah
link: https://hackerone.com/reports/1047119
to: Stripo Inc
State: Resolved
Severity: medium
Reward: -

Description: A specially crafted message sent to the local delivery agent (LMTP) causes the LMTP child process to issue a panic (call i_panic)
By: rumata
link: https://hackerone.com/reports/978515
to: Open-Xchange
State: Resolved
Severity: medium
Reward: -

Description: [Java] CWE-555: Query to detect password in Java EE configuration files
By:
link: https://hackerone.com/reports/1072078
to: GitHub Security Lab
State: Resolved
Severity: medium
Reward: -

Description: Stored XSS on oslo.io in notifications via project name change
By: optional
link: https://hackerone.com/reports/1070859
to: Logitech
State: Resolved
Severity: medium
Reward: -

Description: Being able to change account contents even after password change
By: ph4n745m
link: https://hackerone.com/reports/662108
to: Kartpay
State: Resolved
Severity: medium
Reward: -
174 views12:50
Open / Comment
2021-01-04 15:38:13 https://anontuttuvenus.medium.com/my-oscp-review-c46d2510643b
173 views12:38
Open / Comment
2020-12-30 16:18:14 https://github.com/KingOfBugbounty/KingOfBugBountyTips
198 views13:18
Open / Comment
2020-12-30 15:53:52 https://www.udemy.com/course/complete-webapplication-penetration-testing-practical-cwapt/?couponCode=SESSION8
183 views12:53
Open / Comment
2020-12-30 15:48:45
169 views12:48
Open / Comment