Bhavesh aka ShellBreaker (@shellbreaker_) 's Twitter Profile
Bhavesh aka ShellBreaker

@shellbreaker_

2 year of Experience in Application Security | Bug Bounty | CAPen | bugcrowd.com/shellbreaker | hackerone.com/shellbreaker | EJPTv2 | EWPTXv2

ID: 1414473798208737280

calendar_today12-07-2021 06:36:56

2,2K Tweet

685 Takipçi

667 Takip Edilen

Navalism (@navalismhq) 's Twitter Profile Photo

Meditation is intermittent fasting for the mind. Too much sugar leads to a heavy body & too many distractions lead to a heavy mind. Time spent undistracted & alone, in self-examination, journaling, meditation, resolves the unresolved and takes us from mentally fat to fit. Naval

Navalism (@navalismhq) 's Twitter Profile Photo

Fast, lift, sprint, stretch, and meditate. Build, sell, write, create, invest, and own. Read, reflect, love, seek truth, and ignore society. Make these habits. Say no to everything else. Avoid debt, jail, addiction, disgrace, shortcuts, and media. Relax.Victory is assured. Naval

RyotaK (@ryotkak) 's Twitter Profile Photo

I recently developed and posted about a technique called "First sequence sync", expanding James Kettle's single packet attack. This technique allowed me to send 10,000 requests in 166ms, which breaks the packet size limitation of the single packet attack. flatt.tech/research/posts…

Navalism (@navalismhq) 's Twitter Profile Photo

"The reality is life is a single-player game. You’re born alone. You’re going to die alone. All of your interpretations are alone. All your memories are alone. You’re gone in three generations and nobody cares. Before you showed up, nobody cared. It’s all single-player." Naval

SSD Secure Disclosure (@securiteam_ssd) 's Twitter Profile Photo

Understanding router architecture is crucial for identifying attack surfaces and uncovering vulnerabilities in network protocols, firmware, and web interfaces. Read the first part of our new series of articles on identifying and exploiting router vulnerabilities, including

Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile Photo

Everyone knows that the RFCs for email addresses are crazy. This post will show without doubt that you should not be following the RFC. portswigger.net/research/split…

Abhi Sharma 𝕏 (@a13h1_) 's Twitter Profile Photo

How to succeed in bug bounty? Focus on your skills and develop your own methodology. Everyone thinks differently. Start with any method, but as you encounter more duplicates, realize you need to innovate. Create your unique approach and you'll start seeing results. #BugBounty

Dhiyaneshwaran (@dhiyaneshdk) 's Twitter Profile Photo

🚨 GIVEAWAY ALERT! 🚨 Want to attend BSides Ahmedabad ? Here’s your chance! 🎟️ Security BSides Ahmedabad 🎁 Win 1 Student Pass and 1 Individual Pass To enter: 1️⃣ Comment with a link to your own blog where you’ve written about interesting bugs or Infosec content. #infosec #giveaway

Bug Bounty Village (@bugbountydefcon) 's Twitter Profile Photo

We're excited to announce one of our giveaways thanks to "Caido" 🎉 We will pick 5 winners to win a 1-year Caido Pro license! To enter: 1️⃣ Follow us @BugBountyDefcon and Caido 2️⃣ Like this post ❤️ 3️⃣ Retweet this post 🔁 You have time to participate until Friday (9/13)!

Bug Bounty Village (@bugbountydefcon) 's Twitter Profile Photo

We're excited to announce our 2nd giveaway, thanks to Hack The Box 🎉 We will pick 5 winners to win a Silver Annual subscription (+ Exam)! To enter: 1️⃣ Follow @BugBountyDefcon and Hack The Box 2️⃣ Like this ❤️ 3️⃣ Retweet this 🔁 You have time until next Friday (09/20).