<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[Dark C0d3rs - Web & Bug Bounty]]></title>
		<link>https://darkcoders.wiki/</link>
		<description><![CDATA[Dark C0d3rs - https://darkcoders.wiki]]></description>
		<pubDate>Sat, 09 May 2026 11:54:20 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[API PenTesting Playlist]]></title>
			<link>https://darkcoders.wiki/Thread-API-PenTesting-Playlist</link>
			<pubDate>Wed, 05 Nov 2025 05:23:06 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-API-PenTesting-Playlist</guid>
			<description><![CDATA[API PenTesting Playlist <br />
- Link   : <span style="color: #000000;" class="mycode_color"><span style="font-family: -apple-system, system-ui, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', 'Fira Sans', Ubuntu, Oxygen, 'Oxygen Sans', Cantarell, 'Droid Sans', 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Lucida Grande', Helvetica, Arial, sans-serif;" class="mycode_font">You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</span></span><br />
<br />
<span style="color: #000000;" class="mycode_color"><span style="font-family: -apple-system, system-ui, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', 'Fira Sans', Ubuntu, Oxygen, 'Oxygen Sans', Cantarell, 'Droid Sans', 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Lucida Grande', Helvetica, Arial, sans-serif;" class="mycode_font"><img src="https://media.licdn.com/dms/image/v2/D4D22AQHgQKQOPR2ZvQ/feedshare-shrink_800/B4DZpKk3EdJEAk-/0/1762187769828?e=1764201600&amp;v=beta&amp;t=Wgs6Y1iP8IRRL3S31lfah7kuSeQmByhB2_qrVI01Z18" loading="lazy"  alt="[Image: 1762187769828?e=1764201600&amp;v=beta&amp;t=Wgs6..._qrVI01Z18]" class="mycode_img" /></span></span>]]></description>
			<content:encoded><![CDATA[API PenTesting Playlist <br />
- Link   : <span style="color: #000000;" class="mycode_color"><span style="font-family: -apple-system, system-ui, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', 'Fira Sans', Ubuntu, Oxygen, 'Oxygen Sans', Cantarell, 'Droid Sans', 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Lucida Grande', Helvetica, Arial, sans-serif;" class="mycode_font">You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</span></span><br />
<br />
<span style="color: #000000;" class="mycode_color"><span style="font-family: -apple-system, system-ui, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', 'Fira Sans', Ubuntu, Oxygen, 'Oxygen Sans', Cantarell, 'Droid Sans', 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Lucida Grande', Helvetica, Arial, sans-serif;" class="mycode_font"><img src="https://media.licdn.com/dms/image/v2/D4D22AQHgQKQOPR2ZvQ/feedshare-shrink_800/B4DZpKk3EdJEAk-/0/1762187769828?e=1764201600&amp;v=beta&amp;t=Wgs6Y1iP8IRRL3S31lfah7kuSeQmByhB2_qrVI01Z18" loading="lazy"  alt="[Image: 1762187769828?e=1764201600&amp;v=beta&amp;t=Wgs6..._qrVI01Z18]" class="mycode_img" /></span></span>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[subfinder with shuffledns!]]></title>
			<link>https://darkcoders.wiki/Thread-subfinder-with-shuffledns</link>
			<pubDate>Thu, 16 Oct 2025 05:02:32 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-subfinder-with-shuffledns</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size">Find more subdomains by combining subfinder with shuffledns!</span></span><br />
<br />
<br />
<br />
shuffledns -mode bruteforce -d &lt;target&gt; -w &lt;words&gt; -r &lt;resolvers&gt; | anew subs.txt &amp;&amp; subfinder -d &lt;target&gt; | anew subs.txt<br />
<br />
<span style="color: #000000;" class="mycode_color"><span style="font-family: -apple-system, system-ui, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', 'Fira Sans', Ubuntu, Oxygen, 'Oxygen Sans', Cantarell, 'Droid Sans', 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Lucida Grande', Helvetica, Arial, sans-serif;" class="mycode_font"><img src="https://media.licdn.com/dms/image/v2/D5610AQFbRCD1Os64sA/image-shrink_1280/B56ZnpDw5dKUAQ-/0/1760551702708?e=1761195600&amp;v=beta&amp;t=99qPuH_uca347r7TJ8VOU1YR4WHw52n_-kne_D5KPjI" loading="lazy"  alt="[Image: 1760551702708?e=1761195600&amp;v=beta&amp;t=99qP...kne_D5KPjI]" class="mycode_img" /></span></span><br />
Install subfinder now ?<br />
You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
<br />
Install shuffleDNS ?<br />
You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size">Find more subdomains by combining subfinder with shuffledns!</span></span><br />
<br />
<br />
<br />
shuffledns -mode bruteforce -d &lt;target&gt; -w &lt;words&gt; -r &lt;resolvers&gt; | anew subs.txt &amp;&amp; subfinder -d &lt;target&gt; | anew subs.txt<br />
<br />
<span style="color: #000000;" class="mycode_color"><span style="font-family: -apple-system, system-ui, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', 'Fira Sans', Ubuntu, Oxygen, 'Oxygen Sans', Cantarell, 'Droid Sans', 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Lucida Grande', Helvetica, Arial, sans-serif;" class="mycode_font"><img src="https://media.licdn.com/dms/image/v2/D5610AQFbRCD1Os64sA/image-shrink_1280/B56ZnpDw5dKUAQ-/0/1760551702708?e=1761195600&amp;v=beta&amp;t=99qPuH_uca347r7TJ8VOU1YR4WHw52n_-kne_D5KPjI" loading="lazy"  alt="[Image: 1760551702708?e=1761195600&amp;v=beta&amp;t=99qP...kne_D5KPjI]" class="mycode_img" /></span></span><br />
Install subfinder now ?<br />
You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
<br />
Install shuffleDNS ?<br />
You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[XSS advanced payloads]]></title>
			<link>https://darkcoders.wiki/Thread-XSS-advanced-payloads</link>
			<pubDate>Thu, 07 Aug 2025 12:37:38 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-XSS-advanced-payloads</guid>
			<description><![CDATA[link : You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.]]></description>
			<content:encoded><![CDATA[link : You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[CloudFlair - find original IP/server behind CloudFlare]]></title>
			<link>https://darkcoders.wiki/Thread-CloudFlair-find-original-IP-server-behind-CloudFlare</link>
			<pubDate>Thu, 07 Aug 2025 12:23:56 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-CloudFlair-find-original-IP-server-behind-CloudFlare</guid>
			<description><![CDATA[CloudFlair is a tool to find origin servers of websites protected by CloudFlare (or CloudFront) which are publicly exposed and don't appropriately restrict network access to the relevant CDN IP ranges.<br />
<br />
The tool uses Internet-wide scan data from Censys to find exposed IPv4 hosts presenting an SSL certificate associated with the target's domain name. API keys are required and can be retrieved from your Censys account.<br />
<br />
Link : You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
<br />
<img src="https://pbs.twimg.com/media/GxqFUUxWoAAa0Wp?format=jpg&amp;name=small" loading="lazy"  alt="[Image: GxqFUUxWoAAa0Wp?format=jpg&amp;name=small]" class="mycode_img" />]]></description>
			<content:encoded><![CDATA[CloudFlair is a tool to find origin servers of websites protected by CloudFlare (or CloudFront) which are publicly exposed and don't appropriately restrict network access to the relevant CDN IP ranges.<br />
<br />
The tool uses Internet-wide scan data from Censys to find exposed IPv4 hosts presenting an SSL certificate associated with the target's domain name. API keys are required and can be retrieved from your Censys account.<br />
<br />
Link : You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
<br />
<img src="https://pbs.twimg.com/media/GxqFUUxWoAAa0Wp?format=jpg&amp;name=small" loading="lazy"  alt="[Image: GxqFUUxWoAAa0Wp?format=jpg&amp;name=small]" class="mycode_img" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[XSS & Param Fuzzing via Wayback + Nuclei]]></title>
			<link>https://darkcoders.wiki/Thread-XSS-Param-Fuzzing-via-Wayback-Nuclei</link>
			<pubDate>Mon, 09 Jun 2025 18:51:49 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-XSS-Param-Fuzzing-via-Wayback-Nuclei</guid>
			<description><![CDATA[Sharing a quick and effective one-liner to discover parameter-based vulnerabilities like XSS using archived URLs and fuzzing templates.<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: large;" class="mycode_size">Single Subdomain One-Liner:</span></span><br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>echo sub.target.com | waybackurls &#92;<br />
  | grep "=" &#92;<br />
  | gf xss &#92;<br />
  | uro &#92;<br />
  | httpx -silent -mc 200 -title &#92;<br />
  &gt; live-params.txt &amp;&amp; &#92;<br />
nuclei -l live-params.txt -t fuzzing-templates/ -severity low,medium,high -o findings.txt</code></div></div><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b">Multiple Subdomains (List from subs.txt):</span></span><br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>cat subs.txt | while read sub; do<br />
  echo "[*] Processing &#36;sub"<br />
  echo &#36;sub | waybackurls &#92;<br />
    | grep "=" &#92;<br />
    | gf xss &#92;<br />
    | uro &#92;<br />
    | httpx -silent -mc 200,302,403 -title &#92;<br />
    &gt;&gt; live-params.txt<br />
done<br />
<br />
nuclei -l live-params.txt -t fuzzing-templates/ -severity low,medium,high -o findings.txt</code></div></div><br />
You can also use anew in place of &gt;&gt; to avoid duplicate URLs in live-params.txt.<br />
<br />
<span style="font-size: medium;" class="mycode_size"><span style="font-family: Times New Roman;" class="mycode_font">Requirements:</span><br />
</span><br />
<ul class="mycode_list"><li><span style="font-size: medium;" class="mycode_size"><span style="color: #0000ee;" class="mycode_color"><span style="font-family: Times New Roman;" class="mycode_font"><span style="text-decoration: underline;" class="mycode_u">You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</span></span></span></span><br />
</li>
<li><span style="font-size: medium;" class="mycode_size"><span style="color: #0000ee;" class="mycode_color"><span style="font-family: Times New Roman;" class="mycode_font"><span style="text-decoration: underline;" class="mycode_u">You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</span></span></span></span><br />
</li>
<li><span style="font-size: medium;" class="mycode_size"><span style="color: #0000ee;" class="mycode_color"><span style="font-family: Times New Roman;" class="mycode_font"><span style="text-decoration: underline;" class="mycode_u">You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</span></span></span></span><br />
</li>
<li><span style="font-size: medium;" class="mycode_size"><span style="color: #0000ee;" class="mycode_color"><span style="font-family: Times New Roman;" class="mycode_font"><span style="text-decoration: underline;" class="mycode_u">You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</span></span></span></span><br />
</li>
<li><span style="font-size: medium;" class="mycode_size"><span style="font-family: Times New Roman;" class="mycode_font"><span style="color: #0000ee;" class="mycode_color"><span style="text-decoration: underline;" class="mycode_u">You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</span></span> with fuzzing-templates</span></span><br />
</li>
</ul>
<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: large;" class="mycode_size">Optional Speed Boost:</span></span><br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>cat subs.txt | xargs -P 10 -I{} bash -c &#92;<br />
'echo {} | waybackurls | grep "=" | gf xss | uro | httpx -silent -mc 200,302,403 -title' &gt;&gt; live-params.txt</code></div></div>]]></description>
			<content:encoded><![CDATA[Sharing a quick and effective one-liner to discover parameter-based vulnerabilities like XSS using archived URLs and fuzzing templates.<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: large;" class="mycode_size">Single Subdomain One-Liner:</span></span><br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>echo sub.target.com | waybackurls &#92;<br />
  | grep "=" &#92;<br />
  | gf xss &#92;<br />
  | uro &#92;<br />
  | httpx -silent -mc 200 -title &#92;<br />
  &gt; live-params.txt &amp;&amp; &#92;<br />
nuclei -l live-params.txt -t fuzzing-templates/ -severity low,medium,high -o findings.txt</code></div></div><br />
<br />
<span style="font-size: large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b">Multiple Subdomains (List from subs.txt):</span></span><br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>cat subs.txt | while read sub; do<br />
  echo "[*] Processing &#36;sub"<br />
  echo &#36;sub | waybackurls &#92;<br />
    | grep "=" &#92;<br />
    | gf xss &#92;<br />
    | uro &#92;<br />
    | httpx -silent -mc 200,302,403 -title &#92;<br />
    &gt;&gt; live-params.txt<br />
done<br />
<br />
nuclei -l live-params.txt -t fuzzing-templates/ -severity low,medium,high -o findings.txt</code></div></div><br />
You can also use anew in place of &gt;&gt; to avoid duplicate URLs in live-params.txt.<br />
<br />
<span style="font-size: medium;" class="mycode_size"><span style="font-family: Times New Roman;" class="mycode_font">Requirements:</span><br />
</span><br />
<ul class="mycode_list"><li><span style="font-size: medium;" class="mycode_size"><span style="color: #0000ee;" class="mycode_color"><span style="font-family: Times New Roman;" class="mycode_font"><span style="text-decoration: underline;" class="mycode_u">You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</span></span></span></span><br />
</li>
<li><span style="font-size: medium;" class="mycode_size"><span style="color: #0000ee;" class="mycode_color"><span style="font-family: Times New Roman;" class="mycode_font"><span style="text-decoration: underline;" class="mycode_u">You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</span></span></span></span><br />
</li>
<li><span style="font-size: medium;" class="mycode_size"><span style="color: #0000ee;" class="mycode_color"><span style="font-family: Times New Roman;" class="mycode_font"><span style="text-decoration: underline;" class="mycode_u">You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</span></span></span></span><br />
</li>
<li><span style="font-size: medium;" class="mycode_size"><span style="color: #0000ee;" class="mycode_color"><span style="font-family: Times New Roman;" class="mycode_font"><span style="text-decoration: underline;" class="mycode_u">You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</span></span></span></span><br />
</li>
<li><span style="font-size: medium;" class="mycode_size"><span style="font-family: Times New Roman;" class="mycode_font"><span style="color: #0000ee;" class="mycode_color"><span style="text-decoration: underline;" class="mycode_u">You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</span></span> with fuzzing-templates</span></span><br />
</li>
</ul>
<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: large;" class="mycode_size">Optional Speed Boost:</span></span><br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>cat subs.txt | xargs -P 10 -I{} bash -c &#92;<br />
'echo {} | waybackurls | grep "=" | gf xss | uro | httpx -silent -mc 200,302,403 -title' &gt;&gt; live-params.txt</code></div></div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[JSMON CLI - Find ALL hidden API endpoints directly from JavaScript files]]></title>
			<link>https://darkcoders.wiki/Thread-JSMON-CLI-Find-ALL-hidden-API-endpoints-directly-from-JavaScript-files</link>
			<pubDate>Sat, 26 Apr 2025 15:53:57 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-JSMON-CLI-Find-ALL-hidden-API-endpoints-directly-from-JavaScript-files</guid>
			<description><![CDATA[JSMON CLI is a command-line interface for interacting with the jsmon.sh web application. It provides a convenient way to access various features of JSMON directly from your terminal.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Features</span><ul class="mycode_list"><li>Upload URLs for scanning<br />
</li>
<li>Rescan previously scanned URLs<br />
</li>
<li>Upload and scan files<br />
</li>
<li>View scan results<br />
</li>
<li>Manage domains<br />
</li>
<li>Set up and manage cron jobs for automated scanning<br />
</li>
<li>Compare JavaScript responses<br />
</li>
<li>View user profile and usage information<br />
</li>
</ul>
<br />
Link: You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.]]></description>
			<content:encoded><![CDATA[JSMON CLI is a command-line interface for interacting with the jsmon.sh web application. It provides a convenient way to access various features of JSMON directly from your terminal.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Features</span><ul class="mycode_list"><li>Upload URLs for scanning<br />
</li>
<li>Rescan previously scanned URLs<br />
</li>
<li>Upload and scan files<br />
</li>
<li>View scan results<br />
</li>
<li>Manage domains<br />
</li>
<li>Set up and manage cron jobs for automated scanning<br />
</li>
<li>Compare JavaScript responses<br />
</li>
<li>View user profile and usage information<br />
</li>
</ul>
<br />
Link: You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[403 Bypass Techniques]]></title>
			<link>https://darkcoders.wiki/Thread-403-Bypass-Techniques</link>
			<pubDate>Sun, 23 Mar 2025 07:45:30 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-403-Bypass-Techniques</guid>
			<description><![CDATA[extensive and updated reference for 403 (Forbidden) bypass techniques and tricks for bug bounty hunters and penetration testers.<br />
<br />
Link: You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.]]></description>
			<content:encoded><![CDATA[extensive and updated reference for 403 (Forbidden) bypass techniques and tricks for bug bounty hunters and penetration testers.<br />
<br />
Link: You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Caido - A lightweight web security auditing toolkit]]></title>
			<link>https://darkcoders.wiki/Thread-Caido-A-lightweight-web-security-auditing-toolkit</link>
			<pubDate>Sun, 23 Mar 2025 07:41:31 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-Caido-A-lightweight-web-security-auditing-toolkit</guid>
			<description><![CDATA[<img src="https://docs.caido.io/assets/landing_image.M1TLlug_.png" loading="lazy"  alt="[Image: landing_image.M1TLlug_.png]" class="mycode_img" /><br />
<br />
<span style="font-weight: bold;" class="mycode_b">Installing Caido on Windows</span><br />
<ul class="mycode_list"><li>Download the Caido installer package for Windows from the dashboard or Github repository.<br />
</li>
<li>Open the downloaded package and follow the prompts to install Caido on your system.<br />
</li>
<li>Once the installation is complete, you can launch Caido from the Start menu or by searching for it in the Windows search bar.<br />
</li>
</ul>
<span style="font-weight: bold;" class="mycode_b">Installing Caido on Linux</span><br />
<br />
<ul class="mycode_list"><li>Download the Caido installer package for Linux from the dashboard or Github repository.<br />
</li>
<li>Open a terminal and navigate to the directory where the downloaded package is located.<br />
</li>
<li>Use the command sudo dpkg -i &lt;package-name&gt; to install Caido.<br />
</li>
<li>Once the installation is complete, you can launch Caido by running the caido command in the terminal.<br />
</li>
</ul>
<span style="font-weight: bold;" class="mycode_b">Installing Caido on MacOS</span><ul class="mycode_list"><li>Download the Caido installer package for macOS from the dashboard or Github repository.<br />
</li>
<li>Open the downloaded package and follow the prompts to install Caido on your system.<br />
</li>
<li>Once the installation is complete, you can launch Caido from the Applications folder or by searching for it in Spotlight.<br />
</li>
</ul>
<br />
Link : You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.]]></description>
			<content:encoded><![CDATA[<img src="https://docs.caido.io/assets/landing_image.M1TLlug_.png" loading="lazy"  alt="[Image: landing_image.M1TLlug_.png]" class="mycode_img" /><br />
<br />
<span style="font-weight: bold;" class="mycode_b">Installing Caido on Windows</span><br />
<ul class="mycode_list"><li>Download the Caido installer package for Windows from the dashboard or Github repository.<br />
</li>
<li>Open the downloaded package and follow the prompts to install Caido on your system.<br />
</li>
<li>Once the installation is complete, you can launch Caido from the Start menu or by searching for it in the Windows search bar.<br />
</li>
</ul>
<span style="font-weight: bold;" class="mycode_b">Installing Caido on Linux</span><br />
<br />
<ul class="mycode_list"><li>Download the Caido installer package for Linux from the dashboard or Github repository.<br />
</li>
<li>Open a terminal and navigate to the directory where the downloaded package is located.<br />
</li>
<li>Use the command sudo dpkg -i &lt;package-name&gt; to install Caido.<br />
</li>
<li>Once the installation is complete, you can launch Caido by running the caido command in the terminal.<br />
</li>
</ul>
<span style="font-weight: bold;" class="mycode_b">Installing Caido on MacOS</span><ul class="mycode_list"><li>Download the Caido installer package for macOS from the dashboard or Github repository.<br />
</li>
<li>Open the downloaded package and follow the prompts to install Caido on your system.<br />
</li>
<li>Once the installation is complete, you can launch Caido from the Applications folder or by searching for it in Spotlight.<br />
</li>
</ul>
<br />
Link : You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Brainstorm - AI directory fuzzing]]></title>
			<link>https://darkcoders.wiki/Thread-Brainstorm-AI-directory-fuzzing</link>
			<pubDate>Mon, 03 Mar 2025 05:53:28 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-Brainstorm-AI-directory-fuzzing</guid>
			<description><![CDATA[A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery<br />
<br />
Combines traditional web fuzzing techniques with AI-powered path generation to discover hidden endpoints, files, and directories in web applications.<br />
<br />
Reference: You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
<br />
Github : You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
<br />
<img src="https://github.com/Invicti-Security/brainstorm/blob/main/screenshot.png?raw=true" loading="lazy"  alt="[Image: screenshot.png?raw=true]" class="mycode_img" />]]></description>
			<content:encoded><![CDATA[A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery<br />
<br />
Combines traditional web fuzzing techniques with AI-powered path generation to discover hidden endpoints, files, and directories in web applications.<br />
<br />
Reference: You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
<br />
Github : You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
<br />
<img src="https://github.com/Invicti-Security/brainstorm/blob/main/screenshot.png?raw=true" loading="lazy"  alt="[Image: screenshot.png?raw=true]" class="mycode_img" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[xnLinkFinder - discover endpoints and potential parameters]]></title>
			<link>https://darkcoders.wiki/Thread-xnLinkFinder-discover-endpoints-and-potential-parameters</link>
			<pubDate>Fri, 28 Feb 2025 12:40:30 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-xnLinkFinder-discover-endpoints-and-potential-parameters</guid>
			<description><![CDATA[<span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font">a tool used to discover endpoints (and potential parameters) for a given target. It can find them by:</span><br />
<ul class="mycode_list"><li><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font">crawling a target (pass a domain/URL)</span><br />
</li>
<li><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font">crawling multiple targets (pass a file of domains/URLs)</span><br />
</li>
<li><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font">searching files in a given directory (pass a directory name)</span><br />
</li>
<li><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font">get them from a <span style="font-weight: bold;" class="mycode_b">Burp</span> project (pass location of a Burp XML file)</span><br />
</li>
<li><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font">get them from an <span style="font-weight: bold;" class="mycode_b">ZAP</span> project (pass location of a ZAP ASCII message file)</span><br />
</li>
<li><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font">get them from a <span style="font-weight: bold;" class="mycode_b">Caido</span> project (pass location of a Caido export CSV file)</span><br />
</li>
<li><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font">processing a You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view. results directory (searching archived response files from </span>waymore -mode R<span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font"> and also requesting URLs from </span>waymore.txt<span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font"> and the original URLs from </span>index.txt<span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font"> - see You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.)</span><br />
</li>
</ul>
<span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font">The python script is based on the link finding capabilities of my Burp extension You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.. As a starting point, I took the amazing tool You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view. by Gerben Javado, and used the Regex for finding links, but with additional improvements to find even more.</span><br />
<br />
<span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font">Link : You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</span><br />
<span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font"><img src="https://raw.githubusercontent.com/xnl-h4ck3r/xnLinkFinder/main/xnLinkFinder/images/example1a.png" loading="lazy"  alt="[Image: example1a.png]" class="mycode_img" /></span>]]></description>
			<content:encoded><![CDATA[<span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font">a tool used to discover endpoints (and potential parameters) for a given target. It can find them by:</span><br />
<ul class="mycode_list"><li><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font">crawling a target (pass a domain/URL)</span><br />
</li>
<li><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font">crawling multiple targets (pass a file of domains/URLs)</span><br />
</li>
<li><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font">searching files in a given directory (pass a directory name)</span><br />
</li>
<li><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font">get them from a <span style="font-weight: bold;" class="mycode_b">Burp</span> project (pass location of a Burp XML file)</span><br />
</li>
<li><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font">get them from an <span style="font-weight: bold;" class="mycode_b">ZAP</span> project (pass location of a ZAP ASCII message file)</span><br />
</li>
<li><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font">get them from a <span style="font-weight: bold;" class="mycode_b">Caido</span> project (pass location of a Caido export CSV file)</span><br />
</li>
<li><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font">processing a You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view. results directory (searching archived response files from </span>waymore -mode R<span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font"> and also requesting URLs from </span>waymore.txt<span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font"> and the original URLs from </span>index.txt<span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font"> - see You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.)</span><br />
</li>
</ul>
<span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font">The python script is based on the link finding capabilities of my Burp extension You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.. As a starting point, I took the amazing tool You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view. by Gerben Javado, and used the Regex for finding links, but with additional improvements to find even more.</span><br />
<br />
<span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font">Link : You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</span><br />
<span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji';" class="mycode_font"><img src="https://raw.githubusercontent.com/xnl-h4ck3r/xnLinkFinder/main/xnLinkFinder/images/example1a.png" loading="lazy"  alt="[Image: example1a.png]" class="mycode_img" /></span>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Shadow Repeater:AI-enhanced manual testing -  Burp Plugin]]></title>
			<link>https://darkcoders.wiki/Thread-Shadow-Repeater-AI-enhanced-manual-testing-Burp-Plugin</link>
			<pubDate>Fri, 21 Feb 2025 09:09:47 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-Shadow-Repeater-AI-enhanced-manual-testing-Burp-Plugin</guid>
			<description><![CDATA[Shadow Repeater monitors your Repeater requests and identifies which parameters you're changing. It then extracts the payloads you've placed in these parameters, and sends them to an AI model which generates variants. Finally, it attacks the target with these payload variations and uses response diffing to identify whether any of them triggered a new interesting code path. This approach allows it to build on a manual tester's expertise to uncover unexpected behaviors, such as unconventional You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view. vectors, successful You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view. attempts, and even novel vulnerabilities like email splitting attacks.<br />
<br />
You can get the source code for You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view. and it's available on the BApp store.<br />
<br />
<iframe width="560" height="315" src="//www.youtube-nocookie.com/embed/Z1uJmfCGpRE" frameborder="0" allowfullscreen="true"></iframe><br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Reference :</span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.]]></description>
			<content:encoded><![CDATA[Shadow Repeater monitors your Repeater requests and identifies which parameters you're changing. It then extracts the payloads you've placed in these parameters, and sends them to an AI model which generates variants. Finally, it attacks the target with these payload variations and uses response diffing to identify whether any of them triggered a new interesting code path. This approach allows it to build on a manual tester's expertise to uncover unexpected behaviors, such as unconventional You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view. vectors, successful You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view. attempts, and even novel vulnerabilities like email splitting attacks.<br />
<br />
You can get the source code for You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view. and it's available on the BApp store.<br />
<br />
<iframe width="560" height="315" src="//www.youtube-nocookie.com/embed/Z1uJmfCGpRE" frameborder="0" allowfullscreen="true"></iframe><br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Reference :</span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Dork Generators]]></title>
			<link>https://darkcoders.wiki/Thread-Dork-Generators</link>
			<pubDate>Thu, 20 Feb 2025 06:25:16 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-Dork-Generators</guid>
			<description><![CDATA[Shodan Dorks Generator :  You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
Google Dorks Generator :  You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
Github Dorks Generator : You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
DorkGPT (Generate Google Dorks with AI) : You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
<br />
Google Dorks for Bug Bounty : You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.]]></description>
			<content:encoded><![CDATA[Shodan Dorks Generator :  You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
Google Dorks Generator :  You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
Github Dorks Generator : You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
DorkGPT (Generate Google Dorks with AI) : You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
<br />
Google Dorks for Bug Bounty : You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[AI HTTP Analyzer - Burp Plugin]]></title>
			<link>https://darkcoders.wiki/Thread-AI-HTTP-Analyzer-Burp-Plugin</link>
			<pubDate>Thu, 20 Feb 2025 05:12:22 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-AI-HTTP-Analyzer-Burp-Plugin</guid>
			<description><![CDATA[<span style="font-style: italic;" class="mycode_i">AI HTTP ANALYZER</span> is an advanced security analysis assistant integrated into Burp Suite. It examines HTTP requests and responses for potential security vulnerabilities such as SQL injection, XSS, CSRF, and other threats. The extension provides focused technical analysis, including quick identification of detected vulnerabilities, clear technical steps for exploitation, and PoC examples and payloads where applicable.<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: large;" class="mycode_size">Features</span></span><ul class="mycode_list"><li>Analyze HTTP requests and responses for security vulnerabilities<br />
</li>
<li>Provide technical analysis and exploitation steps<br />
</li>
<li>Include PoC examples and payloads<br />
</li>
<li>Integrate with Burp Suite's UI and context menu<br />
</li>
<li>Real-time vulnerability assessments<br />
</li>
<li>AI-powered context-aware analysis<br />
</li>
<li>Generate Proof-of-Concept exploits<br />
</li>
<li>Custom PoC script generation<br />
</li>
<li>Payload customization for specific scenarios<br />
</li>
</ul>
<img src="https://pbs.twimg.com/media/GkKXPfwWkAAaefd?format=jpg" loading="lazy"  alt="[Image: GkKXPfwWkAAaefd?format=jpg]" class="mycode_img" /><br />
<br />
Link : You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.]]></description>
			<content:encoded><![CDATA[<span style="font-style: italic;" class="mycode_i">AI HTTP ANALYZER</span> is an advanced security analysis assistant integrated into Burp Suite. It examines HTTP requests and responses for potential security vulnerabilities such as SQL injection, XSS, CSRF, and other threats. The extension provides focused technical analysis, including quick identification of detected vulnerabilities, clear technical steps for exploitation, and PoC examples and payloads where applicable.<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: large;" class="mycode_size">Features</span></span><ul class="mycode_list"><li>Analyze HTTP requests and responses for security vulnerabilities<br />
</li>
<li>Provide technical analysis and exploitation steps<br />
</li>
<li>Include PoC examples and payloads<br />
</li>
<li>Integrate with Burp Suite's UI and context menu<br />
</li>
<li>Real-time vulnerability assessments<br />
</li>
<li>AI-powered context-aware analysis<br />
</li>
<li>Generate Proof-of-Concept exploits<br />
</li>
<li>Custom PoC script generation<br />
</li>
<li>Payload customization for specific scenarios<br />
</li>
</ul>
<img src="https://pbs.twimg.com/media/GkKXPfwWkAAaefd?format=jpg" loading="lazy"  alt="[Image: GkKXPfwWkAAaefd?format=jpg]" class="mycode_img" /><br />
<br />
Link : You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Extract All Links from a Webpage - bug bounty tip]]></title>
			<link>https://darkcoders.wiki/Thread-Extract-All-Links-from-a-Webpage-bug-bounty-tip</link>
			<pubDate>Tue, 18 Feb 2025 07:26:25 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-Extract-All-Links-from-a-Webpage-bug-bounty-tip</guid>
			<description><![CDATA[JS to extract all links from a page instantly. Just open your browser console (<br />
F12 → Console) and paste this:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>javascript:console.log('Links on this Page:&#92;n' + Array.from(document.querySelectorAll('a')).map(link =&gt; link.href).join('&#92;n'));</code></div></div><br />
Credit:  You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
<br />
#BugBounty #Recon #Pentesting #Hacking #OSINT]]></description>
			<content:encoded><![CDATA[JS to extract all links from a page instantly. Just open your browser console (<br />
F12 → Console) and paste this:<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>javascript:console.log('Links on this Page:&#92;n' + Array.from(document.querySelectorAll('a')).map(link =&gt; link.href).join('&#92;n'));</code></div></div><br />
Credit:  You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
<br />
#BugBounty #Recon #Pentesting #Hacking #OSINT]]></content:encoded>
		</item>
	</channel>
</rss>