jatin budhwar (@jatinbudhwar2) 's Twitter Profile
jatin budhwar

@jatinbudhwar2

Bug Bounty Hunter
immunefi.com/profile/J10/

ID: 1002469473914376192

calendar_today01-06-2018 08:38:42

276 Tweet

29 Followers

324 Following

Yash Sharma (@05__yash) 's Twitter Profile Photo

Hey Bounty Hunter Here are the steps to configure your iOS device with the Burp Suite proxy. 1. Change your burp settings to below. Go to Proxy > Proxy Settings > Select running proxy > Change it to "All Interfaces". 2. Copy the IP address(arrowed one). 3. Later in the

Hey Bounty Hunter

Here are the steps to configure your iOS device with the Burp Suite proxy.

1. Change your burp settings to below. 

Go to Proxy > Proxy Settings > Select running proxy > Change it to "All Interfaces".

2. Copy the IP address(arrowed one). 

3. Later in the
Patrik Fehrenbach (@itsecurityguard) 's Twitter Profile Photo

New write-up on the bugs we found in Adobe Experience Manager. Dispatcher bypasses, SSRF, XXE, EL injection β€” the usual suspects πŸ¦† enjoy! slcyber.io/assetnote-secu…

π°šπ°Όπ°‡π±… (@ynsmroztas) 's Twitter Profile Photo

I’ve improved my JSMap Inspector tool and added lots of new features! Perfect for exploring, analyzing, and understanding JavaScript source maps effortlessly. πŸ” Check it out on GitHub: github.com/ynsmroztas/JSM… #DevTools #JsMap #bugbountytip #bugbountytips #InfoSec #recon

I’ve improved my JSMap Inspector tool and added lots of new features!
Perfect for exploring, analyzing, and understanding JavaScript source maps effortlessly.

πŸ” Check it out on GitHub: github.com/ynsmroztas/JSM…

#DevTools #JsMap #bugbountytip  #bugbountytips  #InfoSec  #recon
AndrΓ© Baptista (@0xacb) 's Twitter Profile Photo

If you found a package.json file in the wild, you might find some internal packages vulnerable to a dependency confusion attack πŸ‘€ Check for it quicker using this cool new tool by JSMon: app.jsmon.sh/tools/npm-vali… πŸ‘‡

π°šπ°Όπ°‡π±… (@ynsmroztas) 's Twitter Profile Photo

I created a simple but effective tool that examines and analyzes .js files. πŸ”— Project: github.com/ynsmroztas/Ins… #DevTools #Js #JavaScript #bugbountytip #bugbountytips #InfoSec #recon

I created a simple but effective tool that examines and analyzes .js files.
πŸ”— Project: github.com/ynsmroztas/Ins…

#DevTools #Js #JavaScript #bugbountytip #bugbountytips #InfoSec #recon
Godfather Orwa πŸ‡―πŸ‡΄ (@godfatherorwa) 's Twitter Profile Photo

Added a wordlist for path(s) scan on Assetnote React2shell-scanner github.com/orwagodfather/… And now you can use it on a huge list of subs python3 scanner.py -l hosts.txt -t 20 --path-file paths.txt --safe-check -o results.json #bugbountytips #bugbountytip

Godfather Orwa πŸ‡―πŸ‡΄ (@godfatherorwa) 's Twitter Profile Photo

Big #Bugbountytip / #bugbountytips Google Services Hunting Google services are amazing, and for bug hunters, it's amazing as well. In some cases, you can get some P1-P2-P3 from these services, such as Workspaces / Sheets / Groups / Drives / Etc... In groups: you can access

Big #Bugbountytip / #bugbountytips 
Google Services Hunting
Google services are amazing, and for bug hunters, it's amazing as well. In some cases, you can get some P1-P2-P3 from these services, such as
Workspaces / Sheets / Groups / Drives / Etc...

In groups: you can access
Blackstorm Security (@blackstormsecbr) 's Twitter Profile Photo

CVE-2025-32432: Unauthenticated Remote Code Execution in Craft CMS: opswat.com/blog/cve-2025-… #exploitation #cms #vulnerability #cybersecurity #informationsecurity #cve

CVE-2025-32432: Unauthenticated Remote Code Execution in Craft CMS:

opswat.com/blog/cve-2025-…

#exploitation #cms #vulnerability #cybersecurity #informationsecurity #cve
Aditya Shende (@adityashende17) 's Twitter Profile Photo

Recon Smarter: Finding Sensitive Files in Large URL Lists Most bug hunters stop at URLs. Real impact comes from what those URLs expose. This workflow combines: β€’ high-risk file extensions β€’ real-world secret patterns β€’ automated URL discovery Result β†’ fewer URLs, higher

Recon Smarter: Finding Sensitive Files in Large URL Lists
Most bug hunters stop at URLs.
 Real impact comes from what those URLs expose.
This workflow combines:
 β€’ high-risk file extensions
 β€’ real-world secret patterns
 β€’ automated URL discovery
Result β†’ fewer URLs, higher
π°šπ°Όπ°‡π±… (@ynsmroztas) 's Twitter Profile Photo

Always delve deeper into your ASN number searches for your goals, sometimes a .zip file changes everything πŸ₯³πŸŒΉπŸ˜Š For Windows IIS fuzzing, I generally use the .../raft-medium-words.txt wordlist. #bugbountytip #bugbountytips #InfoSec #recon YesWeHack β ΅

Always delve deeper into your ASN number searches for your goals, sometimes a .zip file changes everything πŸ₯³πŸŒΉπŸ˜Š

For Windows IIS fuzzing, I generally use the .../raft-medium-words.txt wordlist.

 #bugbountytip #bugbountytips #InfoSec #recon 

<a href="/yeswehack/">YesWeHack β ΅</a>
Damian Strobel (@damian_89_) 's Twitter Profile Photo

Hey guys, I just launched argosdns.io - if you are into IT security, bug bounty hunting, red teaming, ... this is interesting for you! argosdns.io

Muqsit 𝕏 (@mqst_) 's Twitter Profile Photo

πŸ’‰ Weekend Read: The SQL Injection Knowledge Base Website: websec.ca/kb/sql_injecti… author: Roberto Salgado #infosec

πŸ’‰ Weekend Read: The SQL Injection Knowledge Base

Website: websec.ca/kb/sql_injecti…

author: Roberto Salgado

#infosec
AISecHub (@aisechub) 's Twitter Profile Photo

Claude Bug Bounty Hunter - github.com/shuvonsec/clau… Claude Code skill that turns Claude into your AI bug bounty co-pilot. Point it at any target and Claude maps the attack surface, runs your scanners, validates findings, and writes the HackerOne or Bugcrowd report β€” all from a

Claude Bug Bounty Hunter - github.com/shuvonsec/clau…

Claude Code skill that turns Claude into your AI bug bounty co-pilot. Point it at any target and Claude maps the attack surface, runs your scanners, validates findings, and writes the HackerOne or Bugcrowd report β€” all from a
X (@themsterdoctor1) 's Twitter Profile Photo

Claude-OSINT β€” AI-Driven OSINT Framework πŸ”Ž β€’ OSINT skills + methodology (Claude-based) β€’ Structured recon workflows + scripts + examples β€’ Focus: passive intel (no exploitation) β€’ Includes automation, testing, skill modules β€’ Clean methodology for real investigations

Claude-OSINT β€” AI-Driven OSINT Framework πŸ”Ž

β€’ OSINT skills + methodology (Claude-based)
β€’ Structured recon workflows + scripts + examples
β€’ Focus: passive intel (no exploitation)
β€’ Includes automation, testing, skill modules
β€’ Clean methodology for real investigations
Koupon (@shabosec) 's Twitter Profile Photo

Wow Yandex Dork is Very Crazy πŸ”₯πŸ”₯πŸ”₯πŸ”₯πŸ”₯ Glad they write to Yandex to remove there index πŸš€πŸš€πŸš€ Big up Sachin Pandey for the Yandex dork Simple url: yandex-dork.lovable.app πŸ”₯πŸ”₯πŸ”₯πŸ”₯ so insane Yandex Never Fail πŸ”₯πŸ”₯πŸ”₯πŸš€πŸš€πŸš€

Wow Yandex Dork is Very Crazy πŸ”₯πŸ”₯πŸ”₯πŸ”₯πŸ”₯
Glad they write to Yandex to remove there index πŸš€πŸš€πŸš€ 

Big up <a href="/sachin_pandey98/">Sachin Pandey</a>  for the Yandex dork Simple url: yandex-dork.lovable.app πŸ”₯πŸ”₯πŸ”₯πŸ”₯ so insane

Yandex  Never Fail πŸ”₯πŸ”₯πŸ”₯πŸš€πŸš€πŸš€
dw1 (@dwisiswant0) 's Twitter Profile Photo

CVE-2026-23870, CVE-2026-44575, CVE-2026-44579, CVE-2026-44574, CVE-2026-44578, CVE-2026-44573, CVE-2026-44581, CVE-2026-44580, CVE-2026-44577, CVE-2026-44576, CVE-2026-44582, CVE-2026-44572 github.com/dwisiswant0/ne…

πŸ‡ΈπŸ‡¦ ROOD | GOAT (@0x_rood) 's Twitter Profile Photo

If the admin panel you targeted has a username enumeration , you can brute-force using a wordlist. This has worked many times for me in this case, the username was "admin" My password wordlists: Basic: raw.githubusercontent.com/danielmiessler… Advance: raw.githubusercontent.com/mrtc0/honeylog… Usernames

If the admin panel you targeted has a username enumeration , you can brute-force using a wordlist. This has worked many times for me  in this case, the username was "admin"

My password wordlists:

Basic: raw.githubusercontent.com/danielmiessler…

Advance: raw.githubusercontent.com/mrtc0/honeylog…

Usernames