Using ZAP's Encode/Decode/Hash Add-on with CyberChef via Encode/Decode Scripts

Combine the Encode/Decode/Hash add-on with CyberChef operations in ZAP Encode/Decode Scripts for flexible encoding, decoding, and hashing in your testing workflow.

ZAP

@zaproxy Released add-ons today:

GraphQL ➡️ Fixes the optional integration with the Tech Detection add-on which had been failing.

OpenAPI ➡️ Re-enables Swagger Secret Detector Script Scan Rule, the JS Engine memory leak has been addressed.

#AppSec #DevSecOps #WebAppSec #BugBountyTips

#Antgravity - an AI code editor from Google that has access to your entire codebase and terminal had a Remote Code Execution (#RCE) vulnerability - a great find and write-up by @HacktronAI earning them $10k #BugBounty!
#BugBountyTips
👇

https://www.hacktron.ai/blog/hacking-google-antigravity

RCE in Google's AI code editor Antigravity - $10000 Bounty

Hacktron AI Research Team discovered a critical RCE in Google’s Antigravity IDE that lets attackers take over your system just by opening a malicious website.

Hacktron AI

Samuel Cohen's ( @metabugbounty ) presentation at TenguCon 2.0 is now available to watch online!
#TenguCon #InfoSec #tokyo #bugbountytips #Hacking #CyberSecurity

https://www.youtube.com/watch?v=SjWGm5MiFc4

TenguCon 2.0 - Day 1 Keynote: Samuel Cohen, Meta

YouTube
Amass 5.0.0 Usage for Recon

OWASP Tool

Medium

The payload contains '|/???/\b**\h,' which is meant to confuse WAF rules. Unusual characters are a common evasion tactic.

image by: win3zz

#cybersec #BugBountytips #infosec

Visible Error-Based SQL Injection

A Portswigger Lab

Medium
Blind SQL Injection with Conditional Errors

A Portswigger Lab

Medium

this is your reminder that if you're using Burp for web app testing, you should be using an extension that lets you use variables in your outgoing requests. variables functionality gives you a single place to update credential, token, and identifier values which improves productivity and reduces false positives. there are a few extensions that provide this functionality and I recommend my extension, Burp Variables, which is purpose-built for it: https://github.com/0xceba/burp_variables

#burp #burpsuite #burp_suite #pentesting #pentest #bugbounty #bugbountytips #hacking

GitHub - 0xceba/burp_variables: Burp Suite extension that extends Burp to support storing and reusing variables in requests

Burp Suite extension that extends Burp to support storing and reusing variables in requests - 0xceba/burp_variables

GitHub