Rushabh Vyas ⚡ (@mavrik_13) 's Twitter Profile
Rushabh Vyas ⚡

@mavrik_13

Breaking your app, but for a good cause :)

ID: 1042042700080599046

linkhttps://hackerone.com/github-bot calendar_today18-09-2018 13:28:34

835 Tweet

556 Takipçi

1,1K Takip Edilen

N$ (@nav1n0x) 's Twitter Profile Photo

If your target uses Rails, look for Action View CVE-2019-5418 - File Content Disclosure vuln. Although this is an old bug, it can still be found. Intercept the request in Burp and replace the Accept header with: `Accept: ../../../../../../../../../../etc/passwd{{` #bugbountytips

If your target uses Rails, look for Action View CVE-2019-5418 - File Content Disclosure vuln. Although this is an old bug, it can still be found.

Intercept the request in Burp and replace the Accept header with: `Accept: ../../../../../../../../../../etc/passwd{{` #bugbountytips
Haider Ali Hacker (@cyberpro151) 's Twitter Profile Photo

While hunting on one of the targets, I came across a cool way to access documents inside target's internal portal. Here's the writeup: #bugbountytips #BugBounty #CyberSecurity #togetherwehitharder medium.com/@cyberpro151/a…

Shreyas Chavhan (@shreyas_chavhan) 's Twitter Profile Photo

It's been 1000+ hours into bug bounties since the day I started. Hunting: 1002 hrs Cyberstudy: 363 hrs Days worked: 271 days Here's the top 59 lessons/advice/learning I've been giving myself since day one that have helped me reach where I am today (a thread 1/60): #BugBounty

It's been 1000+ hours into bug bounties since the day I started.

Hunting: 1002 hrs
Cyberstudy: 363 hrs
Days worked: 271 days

Here's the top 59 lessons/advice/learning I've been giving myself since day one that have helped me reach where I am today (a thread 1/60):

#BugBounty
ʀᴇᴍᴏɴ (@remonsec) 's Twitter Profile Photo

Another day, another 403 bypassed Straight into the Django admin panel Might drop a write-up this weekend Stay tune ⚡️ #bugbounty x #pentest

Another day, another 403 bypassed

Straight into the Django admin panel

Might drop a write-up this weekend

Stay tune ⚡️ #bugbounty x #pentest
Vipul 🇮🇳 (@godspeed000123) 's Twitter Profile Photo

Found a critical vulnerability in a leaked Docker Hub image exposing private keys, scoring a $500 bounty! Tip: Automate your searches with DockerSpy to find sensitive data faster.[github.com/UndeadSec/Dock…] #BugBounty #bugbountytips #cybersecuritytips

Arshad Kazmi (@arshadkazmi42) 's Twitter Profile Photo

🎉 GIVEAWAY TIME! 🎉 I’m giving away "Hacker Plan" of iScan.today to one lucky follower! 🚀 To enter: 1️⃣ Follow me 2️⃣ Like & Reply 3️⃣ Retweet Winner will be announced on 01 March 2025! 🏆 Good luck! 🍀 #bugbountytools #giveaway #iScanToday

Debangshu 🇮🇳🥷 (@thisisdk999) 's Twitter Profile Photo

no hate but compared to the insane number of HackerOne ambassadors, the concentrated effort is see is only in BLR region. Rest are just lifeless.

Dr. Sniper (@thedrsniper) 's Twitter Profile Photo

Make sure to apply only if you can come to the meetup in Mohali/Chandigarh. March 15- March 21: hack on a dedicated target virtually March 22: Attend the meetup in person, network and collaborate ! Exact meetup venue will be shared soon. Looking forward to meet u all :)

Rushabh Vyas ⚡ (@mavrik_13) 's Twitter Profile Photo

In the first quarter, I spent some time exploring bug bounty but focused more on learning new things, especially in Web3. Still, I managed to submit 23 reports across different programs! Thanks to HackerOne for the opportunities.Let’s see what happens in Q2learning never stops

In the first quarter, I spent some time exploring bug bounty but focused more on learning new things, especially in Web3. Still, I managed to submit 23 reports across different programs!
Thanks to <a href="/Hacker0x01/">HackerOne</a> for the opportunities.Let’s see what happens in Q2learning never stops
Jayesh Madnani (@jayesh25_) 's Twitter Profile Photo

I've often hesitated to participate in public bug bounty programs, mistakenly believing that if a program is public, it's likely already been thoroughly tested and is bug-free. However, I've been proven wrong. Over the past 2 years, I've learned valuable lessons that have

Jatin (@techyfreakk) 's Twitter Profile Photo

Get ready for our first-ever Live Hacking Meetup in Udaipur! 🎉 Join us in person on April 20 for a day full of hacking. The hacking continues online from April 21–27 virtually. Open to all skill levels — RSVP by April 15 to be part of the action👉 h1.community/events/details…

Get ready for our first-ever Live Hacking Meetup in Udaipur! 🎉 
Join us in person on April 20 for a day full of hacking. The hacking continues online from April 21–27 virtually. Open to all skill levels — RSVP by April 15 to be part of the action👉 h1.community/events/details…
TESS (@armansameer95) 's Twitter Profile Photo

Are you using Cursor right? For H#cking? It's easy to customize open-source tools now IMO, Just visit github.com/tess-ss/shrewd… download the tool as "Download ZIP", upload it to the cursor, be precise with prompt,s for example: Me: Hey, cursor analyze the code very carefully