It's Steiner254
It's Steiner254

@Steiner254

20 Tweets 7 reads Dec 10, 2022
Day 1⃣2⃣/2⃣0⃣ -- [RCE - Remote Code Execution]
➡️ Every Bug Bounty Hunter/Hacker wants to hit an RCE.
➡️ Below some of the best Tips & References for RCE (Feel Free To Share)🧵🧵👇👇
🧵🧵👇👇
#BugBounty
#bugbountytips
1/n
Simple Remote Code Execution Vulnerability Examples for Beginners
ozguralp.medium.com
2/n
Web & Reverse Shells for testing RCE
github.com
3/n
RCE explained how to get a reverse shell
vulp3cula.gitbook.io
4/n
Finding your first RCE by @InsiderPhD
youtube.com
5/n
Top 25 RCE Bug Bounty Reports
corneacristian.medium.com
6/n
7/n
Command Injection | Complete Guide
youtube.com
8/n
RCE via Image File Upload | Bug PoC
youtube.com
9/n
Unrestricted File Upload leads to RCE
anotherhackerblog.com
10/n
11/n
12/n
13/n
14/n
Outdated PHP Version leads to RCE
@iamdevansharya/outdated-php-version-leads-to-rce-380fb4db32f4" target="_blank" rel="noopener" onclick="event.stopPropagation()">medium.com
15/n
RCE by command line argument injection to `gm convert` in `/edit/process?a=crop`
hackerone.com
16/n
Bypass File Upload Restrictions on Web Apps to Get a Shell
null-byte.wonderhowto.com
17/n
Upload a Shell to a Web Server and Get Root (RFI): Part 1
null-byte.wonderhowto.com
18/n
PayPal Arbitriary File Upload Vulnerability To Remote Code Execution
youtube.com
n/n
Practice Makes Perfect!
Stay Ethical & Happy Hacking :)
See you here same time tomorrow!

Loading suggestions...