Pratik Dabhi (@impratikdabhi) 's Twitter Profile
Pratik Dabhi

@impratikdabhi

👨🏻‍💻Ethical Hacker 🐞Bug Hunter | Penetration tester 👨🏻‍💻Security Consultant at @Deloitte ☢️ Bugcrowd Top 250 | SRT |YouTuber (20k+ Subs)

ID: 2902452271

linkhttps://www.pratikdabhi.com/ calendar_today17-11-2014 06:16:15

3,3K Tweet

18,18K Followers

989 Following

Majix (@majix_de) 's Twitter Profile Photo

This script automates SQL injection testing using SQLMap with AI-powered decision making. github.com/atiilla/sqlmap…

Intigriti (@intigriti) 's Twitter Profile Photo

Testing for file upload vulnerabilities? 🧐 Check out Malicious PDF Generator, an open-source toolkit to help you generate tens of malicious PDF files designed to exploit various vulnerabilities and insecure features found in PDF readers! 🤠 🔗 github.com/jonaslejon/mal…

Testing for file upload vulnerabilities? 🧐

Check out Malicious PDF Generator, an open-source toolkit to help you generate tens of malicious PDF files designed to exploit various vulnerabilities and insecure features found in PDF readers! 🤠

🔗 github.com/jonaslejon/mal…
Aditi Singh (@aditi_singghh) 's Twitter Profile Photo

Just released Passive Recon – my Burp Suite extension for recon during manual bug hunting. Give it a try! Automatically scans every request/response for: • Endpoints • Subdomains • GraphQL queries (even meta-GraphQL) • URLs github.com/aditisingh2707…

Aditi Singh (@aditi_singghh) 's Twitter Profile Photo

Just released Wayback-Recon – my Burp Suite extension to pull historical URLs from the Wayback Machine directly into Burp with the better ui. Perfect for recon during manual bug hunting and works seamlessly with my other tools Passive Recon. github.com/aditisingh2707…

Pratik Dabhi (@impratikdabhi) 's Twitter Profile Photo

Excited to share that I’ll be attending Security BSides Ahmedabad on 12–13 September! If you’re around and want to connect, exchange ideas, or just chat about security & hacking, feel free to say hello at the conference. #BugBounty #hackerone #bugcrowd

Youssef Sammouda (sam0) (@samm0uda) 's Twitter Profile Photo

Julien | MrTuxracer 🇪🇺 AI slop, layoffs, and budget cuts. Bug bounty seem to have been around so long now that new management either doesn't understand it or has forgotten why they were created. The level of care and attention just isn't what it used to be,despite the quality reports they still receive

Aditi Singh (@aditi_singghh) 's Twitter Profile Photo

When we decompile an APK and see an unreadable index.android.bundle, it could be Hermes bytecode. Using github.com/P1sec/hermes-d… we can make it readable and look for interesting endpoints, keys, or app flows. #bugbounty

Pratik Dabhi (@impratikdabhi) 's Twitter Profile Photo

“🎯 Secret ChatGPT Prompts That 10x My Bug Bounty Success Rate ⚡” by Qasim Mahmood Khalid #bugbounty #infosec #hacking systemweakness.com/secret-chatgpt…

“🎯 Secret ChatGPT Prompts That 10x My Bug Bounty Success Rate ⚡” by Qasim Mahmood Khalid

#bugbounty #infosec #hacking systemweakness.com/secret-chatgpt…
Pratik Dabhi (@impratikdabhi) 's Twitter Profile Photo

📲 Bug Hunting in Mobile Apps • Intercept traffic with Burp Suite • Decompile APKs with JADX • Search for hardcoded secrets in smali or XML • Check logs for sensitive info • Monitor mobile APIs for IDORs or weak auth 📱 Mobile apps = unexplored territory. #BugBounty

🇸🇦 ROOD | GOAT (@0x_rood) 's Twitter Profile Photo

What happened here? 1.I found a subdomain endpoint via DuckDuckGo dorking. 2.I noticed a login endpoint that’s different from the users endpoint (neither allows registration). 3.I fuzzed that endpoint and discovered a user-management endpoint, but the website redirected me, so I

What happened here?

1.I found a subdomain endpoint via DuckDuckGo dorking.
2.I noticed a login endpoint that’s different from the users endpoint (neither allows registration).
3.I fuzzed that endpoint and discovered a user-management endpoint, but the website redirected me, so I
Godfather Orwa 🇯🇴 (@godfatherorwa) 's Twitter Profile Photo

A long time ago, i was using (Frogy Recon Tool) and the results were more than amazing now its back as 2.0 and now i like it so much github.com/iamthefrogy/fr… by the amazing Chintan 'Frogy' Gurjar Just want to share here if someone wants to check it #bugbountytips #bugbountytip

Vipin Panchal (@dirtycoder0124) 's Twitter Profile Photo

Now you can search keywords/secrets in both HTML+JS files. Also, it shows all URLs with parameters on the page. Already found some open redirects using this extension. #bugbountytips #bugbounty github.com/dirtycoder0124…

Intigriti (@intigriti) 's Twitter Profile Photo

Testing GraphQL targets? Make sure to check out GraphQL-wordlist, a complete repository with comprehensive wordlists for enumerating GraphQL API methods, field names, and types! 🤠 Check it out! 👇 github.com/Escape-Technol…

Testing GraphQL targets? Make sure to check out GraphQL-wordlist, a complete repository with comprehensive wordlists for enumerating GraphQL API methods, field names, and types! 🤠

Check it out! 👇
github.com/Escape-Technol…
Somdev Sangwan (@s0md3v) 's Twitter Profile Photo

Sharing my LLM prompt. It makes it so that the LLM states assumptions, is less likely to agree with you and treats you as a peer - not a child or superior. I wrote it by hand and then used Gemini 2.5 Pro to compress it under 1500 words. gist.github.com/s0md3v/2690603…

Sharing my LLM prompt.

It makes it so that the LLM states assumptions, is less likely to agree with you and treats you as a peer - not a child or superior.

I wrote it by hand and then used Gemini 2.5 Pro to compress it under 1500 words.

gist.github.com/s0md3v/2690603…
Intigriti (@intigriti) 's Twitter Profile Photo

Exposed secrets can have a devastating impact on any organization 👀 But you have to know where to look for them... 🔍 In our latest article, we explore several methods to search for leaked secrets, such as credential pairs, API keys, and other hard-coded tokens that can expand

Exposed secrets can have a devastating impact on any organization 👀

But you have to know where to look for them... 🔍

In our latest article, we explore several methods to search for leaked secrets, such as credential pairs, API keys, and other hard-coded tokens that can expand
X (@themsterdoctor1) 's Twitter Profile Photo

🔍 Unlock the secrets of the web with "The Art of Web Reconnaissance: Bug Bounty & Ethical Hacking"! 🌐💻 📌 What you'll learn: - Advanced web reconnaissance techniques - Identifying and exploiting vulnerabilities - Best practices for ethical hacking - Real-world bug bounty

🔍 Unlock the secrets of the web with "The Art of Web Reconnaissance: Bug Bounty & Ethical Hacking"! 🌐💻

📌 What you'll learn:
- Advanced web reconnaissance techniques
- Identifying and exploiting vulnerabilities
- Best practices for ethical hacking
- Real-world bug bounty
Md Ismail Šojal 🕷️ (@0x0sojalsec) 's Twitter Profile Photo

I read this all Two Factor Authentication writeups:-🥹 - link.medium.com/ne4pwoOl05 - link.medium.com/hhdBnCPl05 - link.medium.com/YFLGk4Ql05 - link.medium.com/rml43ESl05 - link.medium.com/ds1k5XTl05 - link.medium.com/35IjaPVl05 - link.medium.com/4l50R4Xl05