Last active
April 9, 2024 02:32
-
-
Save JerryShah3/95d3a1baf2d29973286effb491684297 to your computer and use it in GitHub Desktop.
Revisions
-
JerryShah3 revised this gist
Sep 29, 2022 . 1 changed file with 3 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -51,7 +51,10 @@ http.component:"Loadash" http.component:"Cloudflare" http.component:"Cloudfront" http.component:"Amazon Cloudfront" http.component:"cdnjs" http.component:"jsDelivr" http.component:"CreateJS" http.component:"Akamai" http.component:"JQuery CDN" http.component:"Varnish" -
JerryShah3 revised this gist
Sep 29, 2022 . 1 changed file with 2 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -95,7 +95,9 @@ http.component:"WooCommerce" http.component:"Wix" http.component:"Shopify" http.component:"Magento" http.component:"Contentful" http.component:"Django CMS" http.component:"Craft CMS" ---------------------------------------------- -
JerryShah3 revised this gist
Sep 28, 2022 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -95,6 +95,7 @@ http.component:"WooCommerce" http.component:"Wix" http.component:"Shopify" http.component:"Magento" http.component:"Django CMS" ---------------------------------------------- -
JerryShah3 revised this gist
Sep 27, 2022 . 1 changed file with 3 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -101,4 +101,6 @@ http.component:"Magento" NOTE 1 : You need to enumerate and look for the vulnerabilities. This dorks will not give you the direct hit to vulnerabilities. NOTE 2 : This dorks will help you to know what vulnerabilities you can find on your target domains, if any of your target is using the above mentioned components. NOTE 3 : All dorks mentioned are from the perspective of bug bounty. -
JerryShah3 revised this gist
Sep 26, 2022 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -3,6 +3,7 @@ http.component:"AngularJS" http.component:"Ruby" http.component:"Ruby on Rails" http.component:"Python" ------------------------------- "For finding php vulnerabilites" -
JerryShah3 revised this gist
Sep 26, 2022 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -55,6 +55,7 @@ http.component:"Akamai" http.component:"JQuery CDN" http.component:"Varnish" http.component:"Netlify" http.component:"WP Rocket" ---------------------------------------------- "For finding subdomain takeovers" -
JerryShah3 revised this gist
Sep 25, 2022 . 1 changed file with 2 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -97,6 +97,6 @@ http.component:"Magento" NOTE 1 : You need to enumerate and look for the vulnerabilities. This dorks will not give you the direct hit to vulnerabilities. NOTE 2 : This dorks will help you to know what vulnerabilities you can find on your target domains, if any of your target is using the above mentioned components. -
JerryShah3 revised this gist
Sep 23, 2022 . 1 changed file with 5 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -10,6 +10,11 @@ http.component:"Ruby on Rails" http.component:"PHP" ---------------------------------------------- "For finding SAP XSS CVE" http.component:"SAP" ---------------------------------------------- "For finding Log4j" http.component:"Java" -
JerryShah3 revised this gist
Sep 23, 2022 . 1 changed file with 65 additions and 6 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,38 +1,97 @@ "For finding template injection" http.component:"AngularJS" http.component:"Ruby" http.component:"Ruby on Rails" ------------------------------- "For finding php vulnerabilites" http.component:"PHP" ---------------------------------------------- "For finding Log4j" http.component:"Java" ---------------------------------------------- "For finding vulnerable databases http.component:"MongoDB" http.component:"MySQL" ---------------------------------------------- "For finding unauthentication admin dashboard" http.component:"Python" http.component:"Django" ---------------------------------------------- "For finding api misconfigurations" http.component:"Open Graph" http.component:"Sentry" http.component:"Google Maps" ---------------------------------------------- "For finding prototype pollution" http.component:"JQuery" http.component:"Node.js" http.component:"Loadash" ---------------------------------------------- "For finding caching issues" http.component:"Cloudflare" http.component:"Cloudfront" http.component:"cdnjs" http.component:"Akamai" http.component:"JQuery CDN" http.component:"Varnish" http.component:"Netlify" ---------------------------------------------- "For finding subdomain takeovers" http.component:"Amazon S3" http.component:"GitHub Pages" ---------------------------------------------- "For finding smuggling/desync attacks" http.component:"HTTP/2" http.component:"HTTP/3" ---------------------------------------------- "For finding deserialization vulnerabilities" http.component:"Microsoft ASP.NET" ---------------------------------------------- "For finding OAuth squatting" http.component:"Google Sign-in" http.component:"Apple Sign-in" http.component:"Facebook Sign-in" ---------------------------------------------- "For finding CMS related vulnerabilities" http.component:"WordPress" http.component:"Contentful" http.component:"Discourse" http.component:"Joomla" http.component:"Drupal" http.component:"WooCommerce" http.component:"Wix" http.component:"Shopify" http.component:"Magento" ---------------------------------------------- NOTE 1 : You need to enumerate and look for the vulnerabilites. This dorks will not give you the direct hit to vulnerabilites. NOTE 2 : This dorks will help you to know what vulnerabilites you can find on your target domains, if any of your target is using the above mentioned components. -
JerryShah3 revised this gist
Sep 23, 2022 . 1 changed file with 7 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,11 +1,16 @@ ```For template injection``` http.component:"AngularJS" http.component:"Ruby" http.component:"Ruby on Rails" http.component:"PHP" http.component:"Python" http.component:"Java" http.component:"MongoDB" http.component:"MySQL" http.component:"Django" http.component:"Google Maps" http.component:"JQuery" -
JerryShah3 created this gist
Sep 23, 2022 .There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -0,0 +1,33 @@ http.component:"AngularJS" http.component:"PHP" http.component:"Ruby" http.component:"Python" http.component:"Java" http.component:"MongoDB" http.component:"MySQL" http.component:"Ruby on Rails" http.component:"Django" http.component:"Google Maps" http.component:"JQuery" http.component:"Node.js" http.component:"Cloudflare" http.component:"Cloudfront" http.component:"cdnjs" http.component:"Akamai" http.component:"JQuery CDN" http.component:"Varnish" http.component:"Netlify" http.component:"Amazon S3" http.component:"GitHub Pages" http.component:"Nginx" http.component:"HTTP/2" http.component:"HTTP/3" http.component:"Microsoft ASP.NET" http.component:"Google Sign-in" http.component:"Apple Sign-in" http.component:"Facebook Sign-in" http.component:"WordPress" http.component:"Contentful" http.component:"Loadash" http.component:"Open Graph" http.component:"Sentry"