sreenivas (@h4xsr33n) 's Twitter Profile
sreenivas

@h4xsr33n

re-awaken from sleep

ID: 1676680463489069056

calendar_today05-07-2023 19:52:44

223 Tweet

0 Takipçi

147 Takip Edilen

VAIDIK PANDYA (@h4x0r_fr34k) 's Twitter Profile Photo

Want to Learn IDOR ? 14 Blogs to Master IDOR 1. medium.com/@aysebilgegund… 2. aon.com/cyber-solution… 3. github.com/KathanP19/HowT… 4. bugbountyhunter.com/vulnerability/… 5. owasp.org/www-project-we… 6. medium.com/@BrownBearSec/… 7. cheatsheetseries.owasp.org/cheatsheets/In… 8. vickieli.medium.com/how-to-find-mo… 9.

Harshleen Chawla (@harshleenchawl2) 's Twitter Profile Photo

JWT Pentesting 📂 10 Writeups to Hack with JWTs 1. medium.com/@musab_alharan… 2. cyberw1ng.medium.com/jwt-attack-vul… 3. book.hacktricks.xyz/pentesting-web… 4. portswigger.net/web-security/j… (Labs) 5. github.com/tuhin1729/Bug-… (Checklist/Methdology) 6. bugbase.ai/blog/all-about… 7.

VAIDIK PANDYA (@h4x0r_fr34k) 's Twitter Profile Photo

Fuzzing lists - Part 2 Wordlists for few specific Funtions you can use for Specific Purpuses. 1. WEB-INF github.com/orwagodfather/… 2. git_config github.com/random-robbie/… 3. Kubernates / k8s github.com/manojdeshmukh4… 4. log github.com/random-robbie/… 5. pl github.com/orwagodfather/… 6.

Intigriti (@intigriti) 's Twitter Profile Photo

Want a comprehensive guide on how to exploit SQL injections? 🤑 Check out Advanced SQL Injection Techniques by N$! 😎 A Gitbook covering some of the most common and advanced SQL injections that may be present on your target! 👇 buff.ly/3AfzUUz

Tanner Barnes (@_staticflow_) 's Twitter Profile Photo

github.com/Static-Flow/Si… new extension to solve a feature request JS0N Haddix mentioned. Now you can add notes inline to Site map targets!

Ben Sadeghipour (@nahamsec) 's Twitter Profile Photo

🔍💻 Discovering GitLab misconfigurations is one of my favorite reconnaissance tricks when it comes to enterprise tools! 🎥 In this video, I share 2 examples: 👀👉🏼youtu.be/KfoOl8RhlhQ

🔍💻 Discovering GitLab misconfigurations is one of my favorite reconnaissance tricks when it comes to enterprise tools! 🎥 In this video, I share 2 examples: 

👀👉🏼youtu.be/KfoOl8RhlhQ
Godfather Orwa 🇯🇴 (@godfatherorwa) 's Twitter Profile Photo

check my new tools for #bugbounty its just came public now github.com/orwagodfather/… github.com/orwagodfather/… and dont forget to check my updated wordlists Thanks Security BSides Ahmedabad bugcrowd #bugbountytip #bugbountytips

Chaofan Shou (svm/acc) (@shoucccc) 's Twitter Profile Photo

Someone just rekt an LP and hacked half a million $. The reward logic can reduce the token in LP, leading to price inflation when there is limited token in the LP. app.blocksec.com/explorer/tx/bs…

Someone just rekt an LP and hacked half a million $. 

The reward logic can reduce the token in LP, leading to price inflation when there is limited token in the LP. 

app.blocksec.com/explorer/tx/bs…
𝕏 Bug Bounty Writeups 𝕏 (@bountywriteups) 's Twitter Profile Photo

Account Takeover: How I Gained Access to Any User Account Through a Simple Registration Flaw 0d-amr.medium.com/account-takeov… #bugbounty #bugbountytips #bugbountytip

Intigriti (@intigriti) 's Twitter Profile Photo

Recon can find you so many good bugs 😎 In our latest article, we're exploring tools like Shodan & Censys to find more vulnerabilities! 🤑 If you want to dive deeper into recon with internet search engines, check out our latest article! 👇 buff.ly/4hSTtmO

Recon can find you so many good bugs 😎

In our latest article, we're exploring tools like Shodan & Censys to find more vulnerabilities! 🤑

If you want to dive deeper into recon with internet search engines, check out our latest article! 👇
buff.ly/4hSTtmO
Critical Thinking - Bug Bounty Podcast (@ctbbpodcast) 's Twitter Profile Photo

The $120,000 MetaMask clickjacking bug bounty explained. What's covered: - Iframe vulns in extensions - Clickjacking MetaMask UI - PoC attacks Watch now: youtube.com/watch?v=HnI0w1…

Intigriti (@intigriti) 's Twitter Profile Photo

Having a bug bounty methodology is crucial! Here are 4 FREE resources to help you expand your current methodology! 😎 🧵 👇

sreenivas (@h4xsr33n) 's Twitter Profile Photo

DEF CON 33 - Kill List: Hacking an Assassination Site on the Dark Web - Carl Miller, Chris Monteiro YT: youtu.be/cYZmRp90hss?si… Thank you Chris Monteiro and Carl Miller . you guys are god me this modern internet world.

DEF CON 33 - Kill List: Hacking an Assassination Site on the Dark Web - Carl Miller, Chris Monteiro

YT: youtu.be/cYZmRp90hss?si…

Thank you  <a href="/Deku_shrub/">Chris Monteiro</a> and  <a href="/carljackmiller/">Carl Miller</a> . you guys are  god me this modern internet world.