Skip to content

Instantly share code, notes, and snippets.

View progprnv's full-sized avatar
πŸ€ͺ

Pranav Jayan progprnv

πŸ€ͺ
View GitHub Profile
You are ChatGPT, a large language model based on the GPT-5 model and trained by OpenAI.
Knowledge cutoff: 2024-06
Current date: 2025-08-08
Image input capabilities: Enabled
Personality: v2
Do not reproduce song lyrics or any other copyrighted material, even if asked.
You're an insightful, encouraging assistant who combines meticulous clarity with genuine enthusiasm and gentle humor.
Supportive thoroughness: Patiently explain complex topics clearly and comprehensively.
Lighthearted interactions: Maintain friendly tone with subtle humor and warmth.
@hackermondev
hackermondev / research.md
Last active November 6, 2025 02:36
Unique 0-click deanonymization attack targeting Signal, Discord and hundreds of platform

hi, i'm daniel. i'm a 15-year-old high school junior. in my free time, i hack billion dollar companies and build cool stuff.

3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target's phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds--and you wouldn't even know.

I'm publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here's how it works:

Cloudflare

By the numbers, Cloudflare is easily the most popular CDN on the market. It beats out competitors such as Sucuri, Amazon CloudFront, Akamai, and Fastly. In 2019, a major Cloudflare outage k

https://vsec7.github.io/
https://github.com/0xPugazh/Awesome-Dorks/blob/master/github-dorks.txt
@h0tak88r
h0tak88r / Shodan_dorking_Resources.txt
Last active September 14, 2025 06:45
Resources for Shodan ( Search Engine ) Dorking
https://github.com/humblelad/Shodan-Dorks
https://skerritt.blog/shodan/
https://medium.com/@BrownBearSec/shodan-for-bug-bounty-and-why-you-shouldnt-use-these-53-dorks-bfa347285b61
https://www.reddit.com/r/netsec/comments/12z7j98/codingodorky_a_tool_to_automate_dorking_of/
https://github.com/lothos612/shodan
https://github.com/HernanRodriguez1/Dorks-Shodan-2023
https://github.com/iGotRootSRC/Dorkers
https://github.com/0xPugazh/Awesome-Dorks/blob/master/Shodan-dorks.txt
https://github.com/dootss/shodan-dorks
@h0tak88r
h0tak88r / # Google Dorks
Last active November 17, 2024 17:13
List of files helps when google dorking
# Files for google Dorking
# Resources
[Bug Bounty Helper] (https://dorks.faisalahmed.me/)
[Google Dorks] (https://www.boxpiper.com/posts/google-dork-list)
https://www.uedbox.com/shdb/type/files-containing-juicy-info/
https://github.com/0xPugazh/Awesome-Dorks/blob/master/google-dorks.txt
My Resources and Links over time to various Tools, Notes, Videos, Papers, Articles, Writeups, and more. Will be moving to my own private hosted Wikipedia soon. Ascii Art Font: Calvin S
╔╦╗╦ ╦ β•”β•— ┬ β”¬β”Œβ”€β” β•”β•— β”Œβ”€β”β”¬ β”¬β”Œβ”β”Œβ”¬β”β”¬ ┬ β•¦β•β•—β”Œβ”€β”β”Œβ”€β”β”Œβ”€β”β”¬ β”¬β”¬β”€β”β”Œβ”€β”β”Œβ”€β”β”Œβ”€β”
β•‘β•‘β•‘β•šβ•¦β• β• β•©β•—β”‚ β”‚β”‚ ┬ β• β•©β•—β”‚ β”‚β”‚ β”‚β”‚β”‚β”‚β”‚ β””β”¬β”˜ β• β•¦β•β”œβ”€ └─┐│ β”‚β”‚ β”‚β”œβ”¬β”˜β”‚ β”œβ”€ └─┐
β•© β•© β•© β•šβ•β•β””β”€β”˜β””β”€β”˜ β•šβ•β•β””β”€β”˜β””β”€β”˜β”˜β””β”˜β”΄ β”΄ β•©β•šβ•β””β”€β”˜β””β”€β”˜β””β”€β”˜β””β”€β”˜β”΄β””β”€β””β”€β”˜β””β”€β”˜β””β”€β”˜
//
()==========>>======================================--
\\
https://doepichack.com/
@ruevaughn
ruevaughn / Bug Bounty Resources.txt
Last active November 24, 2024 17:36
My Resources and Links over time to various Tools, Notes, Videos, Papers, Articles, Writeups, and more. Will be moving to my own private hosted Wikipedia soon. Ascii Art Font: Calvin S
╔╦╗╦ ╦ β•”β•— ┬ β”¬β”Œβ”€β” β•”β•— β”Œβ”€β”β”¬ β”¬β”Œβ”β”Œβ”¬β”β”¬ ┬ β•¦β•β•—β”Œβ”€β”β”Œβ”€β”β”Œβ”€β”β”¬ β”¬β”¬β”€β”β”Œβ”€β”β”Œβ”€β”β”Œβ”€β”
β•‘β•‘β•‘β•šβ•¦β• β• β•©β•—β”‚ β”‚β”‚ ┬ β• β•©β•—β”‚ β”‚β”‚ β”‚β”‚β”‚β”‚β”‚ β””β”¬β”˜ β• β•¦β•β”œβ”€ └─┐│ β”‚β”‚ β”‚β”œβ”¬β”˜β”‚ β”œβ”€ └─┐
β•© β•© β•© β•šβ•β•β””β”€β”˜β””β”€β”˜ β•šβ•β•β””β”€β”˜β””β”€β”˜β”˜β””β”˜β”΄ β”΄ β•©β•šβ•β””β”€β”˜β””β”€β”˜β””β”€β”˜β””β”€β”˜β”΄β””β”€β””β”€β”˜β””β”€β”˜β””β”€β”˜
//
()==========>>======================================--
\\
2FA Bypass
@nullenc0de
nullenc0de / api-linkfinder.sh
Created August 7, 2021 11:17
Exports links and params from API documentation
wget https://gist.githubusercontent.com/nullenc0de/bb16be959686295b3b1caff519cc3e05/raw/2016dc0e692821ec045edd5ae5c0aba5ec9ec3f1/api-linkfinder.yaml
echo https://stripe.com/docs/api | hakrawler -t 500 -d 10 |nuclei -t ./linkfinder.yaml -o api.txt
cat api.txt |grep url_params |cut -d ' ' -f 7 |tr , '\n' | tr ] '\n' | tr [ '\n' |tr -d '"' |tr -d "'" |sort -u > api_params.txt
cat api.txt |grep relative_links |cut -d ' ' -f 7 |tr , '\n' | tr ] '\n' | tr [ '\n' |tr -d '"' |tr -d "'" |sort -u > api_link_finder.txt
@0xblackbird
0xblackbird / open-redirect.md
Created April 1, 2021 19:04
Open redirect bypasses
google dork -> site:.co.uk inurl:"responsible disclosure"
https://registry.internetnz.nz/about/vulnerability-disclosure-policy/
http://www.123contactform.com/security-acknowledgements.htm
https://18f.gsa.gov/vulnerability-disclosure-policy/
https://support.1password.com/security-assessments/
https://www.23andme.com/security-report/
https://www.abnamro.com/en/footer/responsible-disclosure.html
https://www.accenture.com/us-en/company-accenture-responsible-disclosure
https://www.accredible.com/white_hat/
https://www.acquia.com/how-report-security-issue