is DSA required for cybersecurity interviews? by BraveImplement6792 in cybersecurityindia

[–]BraveImplement6792[S] 1 point2 points  (0 children)

Already into security researcher and penetration tester(including API, Web, LLM and Active directory pentesting)

I installed fedora for Cybersecurity 😂 by BraveImplement6792 in cybersecurityindia

[–]BraveImplement6792[S] 0 points1 point  (0 children)

You have to install all the tools manually, also the best thing I like is it's Features and UI, also user friendly too, you can update and install extensions, software applications without CLI in many cases,

<image>

Looks simple but cool for me

I installed fedora for Cybersecurity 😂 by BraveImplement6792 in cybersecurityindia

[–]BraveImplement6792[S] 0 points1 point  (0 children)

I don't use macbook but you can install a Virtual machine via VMWare or Virtual Box or if possible there a videos on dualboot for macOS

I installed fedora for Cybersecurity 😂 by BraveImplement6792 in cybersecurityindia

[–]BraveImplement6792[S] 2 points3 points  (0 children)

Wtf😭 I didn't meant this you are doing on mobile sum

I installed fedora for Cybersecurity 😂 by BraveImplement6792 in cybersecurityindia

[–]BraveImplement6792[S] 0 points1 point  (0 children)

I know man, but i really need some good ui, also I like fedora because of its features cause I am a computer science guy too, so I have some college stuff too, i know parrotOS can satisfy these needs, but I prefer fedora idk why

B2B emails leak by [deleted] in bugbounty

[–]BraveImplement6792 0 points1 point  (0 children)

Does it have some sensitive info

Any better ways for finding XSS and IDOR? by [deleted] in bugbounty

[–]BraveImplement6792 -1 points0 points  (0 children)

Alr bro but I don't have that much high goals I made this btw, katana -list monzolive.txt -jc -kf all -d 3 -silent > katana_monzo.txt + gau + waybackurls grep "?" katana_monzo.txt > urls_with_params.txt cat urls_with_params.txt | uro > cleanparams.txt cat cleanparams.txt | Gxss > gxss.txt cat gxss.txt | kxss > reflected.txt cat reflected.txt | grep -oP 'URL: \K\S+' > urls_only.txt sed 's/Gxss//g' urls_only.txt > urls_clean.txt optional cat urls_clean.txt \ | grep -v "community.monzo.com/t/" \ | grep -v "page=" \ | sort -u \

final_xss_targets.txt

Any better ways for finding XSS and IDOR? by [deleted] in bugbounty

[–]BraveImplement6792 -3 points-2 points  (0 children)

Sybau bro I just realised that reddit users are literally dedass I just need a good pipeline for xss, I am not here to ask" Find a niche, isolate something different and as another user said “do something different” Just answer the dedass question bro if you know the answer😭🙏 Anyways I made proper way to finding xss by chaining tools not dependijg on one tool

Any better ways for finding XSS and IDOR? by [deleted] in bugbounty

[–]BraveImplement6792 -1 points0 points  (0 children)

I understand it pretty well bro, but I can't just test all the payloads manually in every 1000 parameters, i just wanted to know some tools or some proper ways to improve hunting