Мир сегодня с "Юрий Подоляка"
Мир сегодня с "Юрий Подоляка"
Труха⚡️Україна
Труха⚡️Україна
Николаевский Ванёк
Николаевский Ванёк
Мир сегодня с "Юрий Подоляка"
Мир сегодня с "Юрий Подоляка"
Труха⚡️Україна
Труха⚡️Україна
Николаевский Ванёк
Николаевский Ванёк
Rafa Sec avatar

Rafa Sec

Hey I'm Rafu 👋
Cybersec enthusiast | bughunter | Ethical hacker | CTF player
Feel free to join😊
-> you can contact me in @Rafa_support
- Join chat: @rafasec_chat
- join course channel: @Rafa_course
TGlist 评分
0
0
类型公开
验证
未验证
可信度
不可靠
位置
语言其他
频道创建日期Mar 27, 2025
添加到 TGlist 的日期
May 01, 2025
关联群组

记录

17.05.202523:59
372订阅者
03.04.202523:59
0引用指数
30.04.202521:01
847每帖平均覆盖率
24.04.202521:01
847广告帖子的平均覆盖率
02.05.202523:59
18.25%ER
25.04.202503:53
305.78%ERR
订阅者
引用指数
每篇帖子的浏览量
每个广告帖子的浏览量
ER
ERR
APR '25APR '25APR '25APR '25MAY '25MAY '25

Rafa Sec 热门帖子

We made it again! 💥 Another 11K birr! 💸
This all happened because of 3 things:
1️⃣ God 🙏
2️⃣ My mentor Nathan 👨‍🏫 @geeztechgroup
3️⃣ My hard work 😂💻



#Blessed #GrindPays #BugBountyWin


@rafa_sec
🔒🔥 Security Bug Found – Account Takeover & Privilege Escalation 🔓

💰 Reward: 23,000 BIRR

While testing a web app, I discovered a serious mass assignment vulnerability.
📌 Here’s how I found it:
During password change, the request sent:
"email": "email@example.com"
I changed it to:
"email": ["email1@example.com", "email2@example.com"]
✅ Result: The password for both accounts got updated!

Later, I saw:
"role": "user"
I changed it to:
"role": "administrator"
✅ My account became an admin.

🧠 What I achieved:
✅ Account Takeover (ATO) via Password Change
✅ Privilege Escalation via Mass Assignment

💸 This bug earned me 23,000 BIRR from the program.

Always validate and sanitize input on the server side!

@rafa_sec
08.05.202518:00
🚨💥 New Bounty Is Coming... 🐞

Stay tuned, something wild just got caught! 👀💻


@rafa_sec
@rafa_sec
I identified a critical security issue 🚨 where sensitive credentials were exposed through source code 🧑‍💻🔓 — received a reward of 11,000 birr 💰


@rafa_sec
06.05.202518:53
Zesiano's wisdom: 🤔

Hacking is about creativity, not tools. Spend 90% thinking 🧠, 10% scanning. 💻🔑


@rafa_sec
11.05.202518:13
Password: @rafa_sec

instalization:

1.
./set-permissions.sh

2.
sudo docker-compose up
👀😁


@rafa_sec
07.05.202505:14
Good morning guys ❤️
05.05.202508:16
🚀 eWPTv2 Course: Become a Web App Pentesting Pro! 🚀

Ready to launch your career in web application security? This Intermediate Level course is your fast track to mastering practical pentesting skills! 🎯

Course Highlights:

• Web App Security Fundamentals 💡
• Information Gathering 🔎
• Authentication & Authorization Testing 🔑
• Injection Attacks 💉
• File Inclusion Vulnerabilities 📄
• Server-Side Request Forgery (SSRF) 🌐
• Web Services Security ⚙️
• Practical Exploitation Techniques 🛠
• Hands-On Labs 🧪
• Report Writing 📝

Key Benefits:

🔥 Hands-On Learning: Real-world scenarios and practical exercises.
✅ Certification Prep: Ace the eWPTv2 exam with confidence.
📈 Career Advancement: Boost your skills and earning potential.
🛡 Real-World Skills: Protect web apps with cutting-edge techniques.

Join now and start your journey to becoming a Best web application penetration tester! ✨➡️ click this for course





💬 Chat: @rafasec_chat
📢 Channel: @rafa_sec
📚 Course Updates: @rafa_course
24.04.202508:36
199😳

Sudo apt install 1 member 😁
ነገር ግን እኛ ኀጢአተኞች ሳለን ክርስቶስ ስለ እኛ ሞተ፤ ይህም እግዚአብሔር ለእኛ ያለውን የራሱን ፍቅር ያሳያል።

ሮሜ 5:8

ልካም በአል🙏❤️

@rafa_sec
24.04.202510:41
RafaCTF – Web CTF Lab (Free & Online)
Hey hackers!
I’ve launched RafaCTF, a custom Capture The Flag (CTF) lab where you can practice real-world web vulnerabilities across 4 difficulty levels — from Easy to Insane!

What’s Inside?
🛡️ 7 Vulnerability Categories:

1. ⚔️ XSS (Cross-Site Scripting)


2. ⏱️ Rate Limit Bypass


3. 🔐 Brute Force


4. ✍️ Content Injection


5. 🧩 HTML Injection


6. ⚙️ JavaScript Injection


7. 🕵️ XSSI (Cross-Site Script Inclusion)



Features:
✅ 4 difficulty levels per challenge
✅ Hidden flag in each level
✅ Beginner-friendly & self-hosted
✅ Learn while hacking — hands-on!

Flag Path Format:
/flags/<vuln_name>/level1.txt (…up to level4.txt)

Try it. Hack it. Learn it.
Website: http://rafasecctf.rf.gd/

Need help or want to share your progress?

💬 Chat: @rafasec_chat
📢 Channel: @rafa_sec
📚 Course Updates: @rafa_course

Created by: Rafu | 2025
06.05.202508:40
Hacking TIP Day1:

Tip1:

Start every recon🔍 by mapping the attack surface thoroughly. Use tools like subfinder, httpx, and nmap to discover subdomains, alive hosts, and open ports. A wide recon often reveals hidden or forgotten services that are goldmines for bugs.



Tip2:

Always check for parameter pollution by duplicating query or body parameters (e.g., ?user=admin&user=guest). Some backends may use the first, others the last—leading to unexpected behavior or even auth bypass.


Happy hacking and bug hunting! 🐞🔍


💬 Chat: @rafasec_chat
📢 Channel: @rafa_sec
📚 Course Updates: @rafa_course
07.05.202516:50
🔥 Day 2 - Hacking Tips


🛠 Tip 1:

Fuzz for Hidden Parameters
Use tools like ParamMiner to discover hidden parameters like admin=true or debug=1 that can lead to privilege escalation.


🔍 Tip 2:

Check HTTP Method Misuse
Try methods like PUT, DELETE, or OPTIONS on endpoints. Misconfigurations here can expose serious flaws.


👉 Happy Hacking and Bug Hunting!

@rafa_sec
登录以解锁更多功能。