XIII Lumiere (@umdaliwethu) 's Twitter Profile
XIII Lumiere

@umdaliwethu

Artist, Arie's

Music Is 🧬 [email protected] for bookings

ID: 1635600609964441601

linkhttps://unitedmasters.com/king-q-the-1st calendar_today14-03-2023 11:17:01

4,4K Tweet

529 Followers

526 Following

Arshiya (@arshiyaiha) 's Twitter Profile Photo

10 common JavaScript coding vulnerabilities Practical code examples.🐞💻 1- Open Redirect 2-SSRF 3-Timing Attacks 4-prototype pollution 5-NoSQLi 6-ReDoS 7-misconfiguration 8-Hard Code Vulnerability 9-mass assignment 10-Host Header Injection #BugBountyTip youtube.com/watch?v=ypNKKY…

XIII Lumiere (@umdaliwethu) 's Twitter Profile Photo

Did you know, If you're good with bts, you can always profit from this market🙌 with a 30 rand voucher, you're bound to make 12 at least profit😪💀💀

Did you know, If you're good with bts, you can always profit from this market🙌 with a 30 rand voucher, you're bound to make 12 at least profit😪💀💀
MDN NEWS (@mdnnewss) 's Twitter Profile Photo

Hey Grok, in 24 hours please pick one random account from the comments that follows us and repost this. The winner will get R500.

Vipul 🇮🇳 (@godspeed000123) 's Twitter Profile Photo

Found a critical vulnerability by poisoning the password-reset flow by injecting Collaborator into headers using Burp FakeIP, resulting in account takeover. Scored $4,000 Tip: Use the FakeIP extension to check for link poisoning. #BugBounty #bugbountytips #CyberSecurity

Found a critical vulnerability by poisoning the password-reset flow by injecting Collaborator into headers using Burp FakeIP, resulting in account takeover. Scored $4,000
Tip: Use the FakeIP extension to check for link poisoning.
#BugBounty #bugbountytips #CyberSecurity
bugcrowd (@bugcrowd) 's Twitter Profile Photo

Find new associated domains with this simple Google dork: "© <COMPANY>. all rights reserved." -".<COMPANY>.com" Check this out 👇

Qatada (@itsqatada) 's Twitter Profile Photo

tip: download all the js files of the target you're hunting on -> upload to cursor and ask it to extract the endpoints i still recommend manual js files examination, however, this might help some people out there

tip: download all the js files of the target you're hunting on -&gt; upload to cursor and ask it to extract the endpoints 

i still recommend manual js files examination, however, this might help some people out there
HackerRats - Uncle Rat ❤️ (XSS Rat) (@thexssrat) 's Twitter Profile Photo

1) subfinder -d target.com -all -silent | httpx -silent -status-code -title -tech-detect -o alive.txt — enumerate subs and keep only live, fingerprinted targets to pivot hard. 2) ffuf -u target.com/FUZZ -w

VIEH Group (@viehgroup) 's Twitter Profile Photo

If you find PHP 8.1.0-dev then try RCE & SQLi User-Agentt: zerodiumsleep(5); User-Agentt: zerodiumsystem('id'); Post Credit: Md Ismail Šojal 🕷️ #bugbounty #bugbountytips #rce #sqli #bugbounty

If you find PHP 8.1.0-dev then try RCE &amp; SQLi
User-Agentt: zerodiumsleep(5);
User-Agentt: zerodiumsystem('id');

Post Credit: <a href="/0x0SojalSec/">Md Ismail Šojal 🕷️</a> 
#bugbounty #bugbountytips #rce #sqli #bugbounty