- 41
- 75 199
BUG XS
เข้าร่วมเมื่อ 12 ก.ย. 2019
Bug XS is al about Cybersecurity and Bug Bounty
"10 Motivational Quotes to Keep You Inspired in your Bug Bounty Journey"🔥
Tired of Duplicates and NA in bug bounty?? Look no further! In this video, we share 10 motivational quotes to help you stay inspired and motivated on your journey. From believing in yourself and creating your own future, to taking risks and pursuing your dreams, these quotes will give you the boost you need to keep going. Watch the video and let these words of wisdom guide you towards success and happiness.
มุมมอง: 216
วีดีโอ
Did we just see folders with CVE Exploits? MASSIVE GIVEAWAY
มุมมอง 2322 ปีที่แล้ว
We have mentioned where to get these in the end!! Do watch🔥 We have reached yet another milestone by crossing 5000 followers on our Instagram page and on that occasion we are giving away Microsoft Surface Ergonomic Keyboard to one person. We are shipping all over world 🌍 Here is how to you can enter the give away: 1. Follow us on Instagram, TH-cam and Linked In. - bug_xs - th-cam...
What is Secure Shell!
มุมมอง 2173 ปีที่แล้ว
In this video we are going to talk about SSH and its working. We hope you like this video. Like.Share.Subscribe😍🙌 INSTAGRAM : bug_xs WEBSITE : www.bugxs.co
EP 01: Vartalaap : A Cyber Talk show with Hacktify Cybersecurity Founders
มุมมอง 9673 ปีที่แล้ว
Hello Folks, We had a super exciting and Full of fun talk with Hackitfy Cybersecurity founders.🤩🤩 We had 3 fun Rounds in this Talk💥💥: 1. Bounty Busters 2. Chit-Chat 3. This or That We hope you like this video. Like.Share.Subscribe😍🙌 INSTAGRAM : bug_xs WEBSITE : www.bugxs.co
Subdomain Enumeration with Sublister | More Domains to hunt | Bug Bounty
มุมมอง 5183 ปีที่แล้ว
This will guide you to enumerate subdomains. INSTAGRAM : bug_xs WEBSITE : www.bugxs.co LIKE.SHARE.SUBSCRIBE
Subdomain Takeover for beginners | Bug Bounty | Cybersecurity
มุมมอง 2.6K3 ปีที่แล้ว
This will guide you to find and exploit Subdomain Takeover. INSTAGRAM : bug_xs WEBSITE : www.bugxs.co LIKE.SHARE.SUBSCRIBE
Detect and Exploit SQL Injections with SQL Map | Bug Bounty | CyberSecurity
มุมมอง 5K3 ปีที่แล้ว
This will guide you with use of SQLMAP and how to hunt P1 bugs. INSTAGRAM : bug_xs WEBSITE : www.bugxs.co LIKE.SHARE.SUBSCRIBE
5 BEST USAGE OF FFUF | BUG BOUNTY | CYBERSECURITY
มุมมอง 1.8K3 ปีที่แล้ว
This will guide you to top 5 use of amazing tool FFUF. INSTAGRAM : bug_xs WEBSITE : www.bugxs.co LIKE.SHARE.SUBSCRIBE
Broken Link Hijacking | Bug Bounty | Baby Step to Hunt
มุมมอง 5K3 ปีที่แล้ว
This will guide you to find broken link hijacking vulnerability. INSTAGRAM : bug_xs WEBSITE : www.bugxs.co LIKE.SHARE.SUBSCRIBE
China's 2 Android app stealing data? | Cybersecurity News | Bug Bounty
มุมมอง 1723 ปีที่แล้ว
Updates specially crafted for you in the field of cybersecurity and bug bounty. *FOLLOW US ON SOCIAL MEDIA!* Instagram: @bug_xs Website: www.bugxs.co
Top 3 Cyber Security News | Security Update
มุมมอง 1303 ปีที่แล้ว
Here is why we should read cyber security news daily! *FOLLOW US ON SOCIAL MEDIA!* Instagram: @bug_xs Website: www.bugxs.co
Earn huge with this vulnerability | CVE-2020-3452 | CVE-2020-3187 | CyberSecurity | Bug Bounty
มุมมอง 2.6K4 ปีที่แล้ว
This video will guide you to find 2 P1 Vulnerabilities. LIKE.SHARE.SUBSCRIBE
9 Ways To Find Broken Authentication | Bug Bounty | CyberSecurity
มุมมอง 1.9K4 ปีที่แล้ว
This video will guide you to find Broken Authentication in 9 Different ways. LIKE.SHARE.SUBSCRIBE
F5 BIG IP RCE | P1-P2 VULNERABILITY | CVE 2020-5902 | BUG BOUNTY
มุมมอง 1.7K4 ปีที่แล้ว
F5 BIG IP RCE | P1-P2 VULNERABILITY | CVE 2020-5902 | BUG BOUNTY
Linux Privilege Escalation | OSCP | CyberSecurity
มุมมอง 2364 ปีที่แล้ว
Linux Privilege Escalation | OSCP | CyberSecurity
SQL Injection with Practical Lab session | Bug Bounty | Cyber security
มุมมอง 5664 ปีที่แล้ว
SQL Injection with Practical Lab session | Bug Bounty | Cyber security
Genymotion Configuration in easiest way | Bug Bounty | Cyber security | Android Pentesting
มุมมอง 1.5K4 ปีที่แล้ว
Genymotion Configuration in easiest way | Bug Bounty | Cyber security | Android Pentesting
How to Bypass Rate Limit in 3 simple steps | BUG BOUNTY | CYBER SECURITY
มุมมอง 9K4 ปีที่แล้ว
How to Bypass Rate Limit in 3 simple steps | BUG BOUNTY | CYBER SECURITY
Using Default Credentials | P1 Vulnerability | Bug Bounty | Cyber Security
มุมมอง 4K4 ปีที่แล้ว
Using Default Credentials | P1 Vulnerability | Bug Bounty | Cyber Security
ACTIVE INFORMATION GATHERING | DNS ZONE TRANSFER | OSCP | CYBERSECURITY
มุมมอง 1.6K4 ปีที่แล้ว
ACTIVE INFORMATION GATHERING | DNS ZONE TRANSFER | OSCP | CYBERSECURITY
CSRF EXPLAINED | POC | BUG BOUNTY | CYBERSECURITY
มุมมอง 4494 ปีที่แล้ว
CSRF EXPLAINED | POC | BUG BOUNTY | CYBERSECURITY
OAUTH MISCONFIGURATION EXPLAINED | P2 -P3 VULNEARBLITY | POC | CYBERSECURITY | BUG BOUNTY
มุมมอง 9K4 ปีที่แล้ว
OAUTH MISCONFIGURATION EXPLAINED | P2 -P3 VULNEARBLITY | POC | CYBERSECURITY | BUG BOUNTY
How to change Execution Policy | OSCP | CyberSecurity
มุมมอง 844 ปีที่แล้ว
How to change Execution Policy | OSCP | CyberSecurity
EVERYTHING ABOUT HTTP REQUEST SMUGGLING ALONG WITH POC | BUG BOUNTY | CYBERSECURITY
มุมมอง 2.1K4 ปีที่แล้ว
EVERYTHING ABOUT HTTP REQUEST SMUGGLING ALONG WITH POC | BUG BOUNTY | CYBERSECURITY
Find Cryptographic Vulnerability using NMAP | Cyber Security
มุมมอง 1.4K4 ปีที่แล้ว
Find Cryptographic Vulnerability using NMAP | Cyber Security
Identify your Hash Type in less than 30 sec | Cybersecurity | Hashing
มุมมอง 2754 ปีที่แล้ว
Identify your Hash Type in less than 30 sec | Cybersecurity | Hashing
Incognito mode browsing history is visible!!!! How to see and delete them | 2 COMMANDS
มุมมอง 3574 ปีที่แล้ว
Incognito mode browsing history is visible!!!! How to see and delete them | 2 COMMANDS
PROPMT.ML LEVEL 1-5 SOLUTION EXPLANIED | REFLECTED XSS | BUG BOUNTY
มุมมอง 2.3K4 ปีที่แล้ว
PROPMT.ML LEVEL 1-5 SOLUTION EXPLANIED | REFLECTED XSS | BUG BOUNTY
How to use Burp suite | Easiest Method | 10 mins to get pro in burp suite
มุมมอง 6064 ปีที่แล้ว
How to use Burp suite | Easiest Method | 10 mins to get pro in burp suite
how do we get to know we should solve by this type of approach only how does it comes into my mind
Its look like business logic
Is this a vulnerability that can be reported? also thank you for your great content❤
Hi I'm facing a rate limit issue with the twitter web api which gets tweets. will it work there?
Pain in the ass to find these bugs
:)
Imma want keyword and also this folder link.....😁😁❣️❣️
Imna want keyboard.
Imma want that keyboard
Imma want keyboard 😉
Imma want this drive link 🥂and the keyboard 😬
Imma want KEYBOARD and also READY TO REPORT!!!
I'mma want keyboard
Thank you so much. Can you explain what vuln i should look? I m desperate to learn dns zone transfer.. plz help i request you
farhan ahmed was here
Your teaching was amazing
Glad it was helpful!
imma want keyboard
Imma want keyboard 😃😉
Imma want keyboard 😃😉
Imma want Keyboard 🥳🥳
lmma want keyboard 😉
Imma want keyboard🙌✨
Iamma want keyboard
Imma want keyboard 😀
🤘🤘🤘
When will I get this checklist?
DM us on insta!
how to use multiple urls?
Will it work in 2022 or they patch the vulnerability. Also I had a question where did u delete the logo file. Will I have to use delete method to delete logo.
thank you!
Great man I didn't get a gud explanation of ffuf
nice
Bro before doing SQLMap on a website from bugcrowd or any other public bugbounty platforms,.do we have to take permission from them ??
No you dont have to but check inscope vulnerabilities.
Why this header cannot be automatically added when I browse websited
Superb bro... Simple explanation 👌👍
thank you so much educative video
Plz reply bro
Bro what is the IMPACT of logout management vulnerability
You have not shown for the post request...
Can we move one drive to another device. I mean c drive to d drive...
This can only be achieved on a local machine, web hosts don't have c or d drives
Tnx Bhai
Bro i found a target in which i can login with same email used in oauth functionality as well as i can login with oauth functionality without any verification so is it a oauth misconfiguration
Thank you so mach❤❤
how to see only broken link in results?
This video is very helpful thank you soooo much sir 🤘🤘🤘🤘🤘
Anyone pls share that git Link... !!🙏🙏
Hi men, your tutorial is gut, but your englisch is worst then main. Sorry to say it, but you have to try to speak without accent, or take a few courses please. However back to the tutorial- thank you for sharing your knowledge! Much appreciated
Prompt (1) to win ko use krne keliye kali os ki jarurat padti haii kya??
No
powerful , bro do have tool to do that job and saving my time
Copied from Rohit sir
I have a doubt. I actually found this vulnerability and now triager is asking me to exploit it idk how to do that. Please help me.!
i tried a lot but nothing happens. Any idea how to exploit it