Vivek Verma (@vivek23647571) 's Twitter Profile
Vivek Verma

@vivek23647571

Vulnerability Researcher | Hall of fame : Google

ID: 1429079633622749184

linkhttps://www.youtube.com/@vivekverma5467 calendar_today21-08-2021 13:55:26

249 Tweet

921 Takipรงi

599 Takip Edilen

Phantom ๐Ÿ‡ฎ๐Ÿ‡ณ (@proxy936623) 's Twitter Profile Photo

Congratulations to my brother vivek and Vikas Maurya for this huge and mind blowing ๐Ÿคฏ achievement ๐Ÿ™Œ Wishing you guys all the best for future you guys are going to rock in future Best wishes ๐Ÿคž #BugBounty #bugbountytips #bugbountytip #BugHunter #bug #web2 #web3

Vivek Verma (@vivek23647571) 's Twitter Profile Photo

๐ŸŒŸ Waking up to this made my day! ๐ŸŽ‰ Huge thanks to Ben Sadeghipour for the follow. Grateful for the support and inspired to keep pushing the boundaries in bug hunting. ๐Ÿ™Œ #BugBounty #CyberSecurity #Infosec

๐ŸŒŸ Waking up to this made my day! ๐ŸŽ‰ Huge thanks to <a href="/NahamSec/">Ben Sadeghipour</a>  for the follow.
Grateful for the support and inspired to keep pushing the boundaries in bug hunting. ๐Ÿ™Œ

#BugBounty #CyberSecurity #Infosec
Jayesh Madnani (@jayesh25_) 's Twitter Profile Photo

๐Ÿ’ฅ Simple HTTP Parameter Pollution escalated to PII Leak โ†’ 4-Digit Bounty! โœ… {"proxyPayload":"Limit=20&userID=<attacker_ID>"} โ†’ 200 OK โŒ {"proxyPayload":"Limit=20&userID=<victim_ID>"} โ†’ "errorMessage":"Forbidden Access" โœ…

๐Ÿ’ฅ Simple HTTP Parameter Pollution escalated to PII Leak โ†’ 4-Digit Bounty!

โœ… {"proxyPayload":"Limit=20&amp;userID=&lt;attacker_ID&gt;"} โ†’ 200 OK

โŒ {"proxyPayload":"Limit=20&amp;userID=&lt;victim_ID&gt;"} โ†’ "errorMessage":"Forbidden Access"

โœ…
Vivek Verma (@vivek23647571) 's Twitter Profile Photo

Hey Amazon Help, I ordered a Product, but the package was EMPTY! The delivery guy left instantly & refused to return when I called within a minute. Now Amazon is denying a refund, blaming me instead of investigating the delivery agent. Is this how you treat loyal customers?

encodedguy - jsmon.sh (@3nc0d3dguy) 's Twitter Profile Photo

๐Ÿš€ YouTube video published on "Hack JS Files Like a Pro with Jsmon's Chrome Extension". Contains installation, configuration and usage examples. youtube.com/watch?v=qJxeuPโ€ฆ

Aditya sharma ๐Ÿ‡ฎ๐Ÿ‡ณ (@assass1nmarcos) 's Twitter Profile Photo

When people think we making an easy money :v, Bruh we woke-up day and night , work a** off 48 hours continously sometimes, this ain't easy money. I am into this field since 10 years. We never took any courses/mentorship. It's all self learnt. Our own creative methodologies.

RogueSMG (@roguesmg) 's Twitter Profile Photo

How do they even make $20000+ from the same Public Target?? One of the key Techniques: Differential Analysis.๐Ÿงต๐Ÿ‘‡ #bugbountytips

Shreyas Chavhan (@shreyas_chavhan) 's Twitter Profile Photo

I studied 170+ hrs of top hacker interviews in the last 2 months to understand what I was doing wrong. Here's what I learnt and what I'm planning to do about it: ๐Ÿ”— Link: shreyaschavhan.notion.site/I-studied-170-โ€ฆ #BugBounty #bugbountytips

I studied 170+ hrs of top hacker interviews in the last 2 months to understand what I was doing wrong. Here's what I learnt and what I'm planning to do about it:

๐Ÿ”— Link: shreyaschavhan.notion.site/I-studied-170-โ€ฆ

#BugBounty #bugbountytips
Vivek Verma (@vivek23647571) 's Twitter Profile Photo

This is exactly why India needs open-source governance ๐Ÿ•Š๏ธ Imagine Open-Source Politics in India: See who built the road in your area Track every rupee spent on projects Accountability should not cost lives.

Harsh Jaiswal (@rootxharsh) 's Twitter Profile Photo

With only 48 hours remaining in a bug bounty event, I used Hacktron AI CLI to perform large-scale analysis of several JDBC drivers. Netting $85,000 in total rewards. This write-up shows how AI-assisted vulnerability research is speeding up the work of researchers and leading to

With only 48 hours remaining in a bug bounty event, I used <a href="/HacktronAI/">Hacktron AI</a> CLI to perform large-scale analysis of several JDBC drivers. Netting $85,000 in total rewards. 

This write-up shows how AI-assisted vulnerability research is speeding up the work of researchers and leading to