Mazhar (@mazhar0sec) 's Twitter Profile
Mazhar

@mazhar0sec

Student | Bug Hunter

ID: 1564602919978090497

calendar_today30-08-2022 13:16:40

222 Tweet

167 Followers

1,1K Following

Intigriti (@intigriti) 's Twitter Profile Photo

If you want to master XSS, open this thread! Cross-site scripting vulnerabilities are injection attacks that allow attackers to execute malicious Javascript in your browser! 🤯 A Thread 🧵👇

Brut 🇮🇳 (@wtf_brut) 's Twitter Profile Photo

🌟Subdominator🌟 is a powerful tool for passive subdomain enumeration during bug hunting and reconnaissance processes. 📥github.com/sanjai-AK47/Su… #bugbountytip #bugbountytips #ethicalhacking #CyberSecurity #Pentesting #sqli #xss #CyberSecurityAwareness #bugbounty #GitHub #offsec

🌟Subdominator🌟 is a powerful tool for passive subdomain enumeration during bug hunting and reconnaissance processes.

📥github.com/sanjai-AK47/Su…

#bugbountytip #bugbountytips #ethicalhacking #CyberSecurity #Pentesting #sqli #xss #CyberSecurityAwareness #bugbounty #GitHub #offsec
Jayesh Madnani (@jayesh25_) 's Twitter Profile Photo

🤖 Question of the day: How to set up Discord/Slack notifications for bug bounty findings? Looking to enhance your automation workflow? Ideally, you should have Discord/Slack/Telegram notifications configured for your bug bounty automation to get instant alerts on critical

🤖 Question of the day: How to set up Discord/Slack notifications for bug bounty findings?

Looking to enhance your automation workflow? Ideally, you should have Discord/Slack/Telegram notifications configured for your bug bounty automation to get instant alerts on critical
X (@themsterdoctor1) 's Twitter Profile Photo

💠 Linux Privileges Escalation Techniques (Basic to Advanced) Series 👇 🔗 Part 1: hacklido.com/blog/158 🔗 Part 2: hacklido.com/blog/162 🔗 Part 3: hacklido.com/blog/210 🔗 Part 4: hacklido.com/blog/224 🔗 Part 5: hacklido.com/blog/286 #OSCP #oscp

💠 Linux Privileges Escalation Techniques (Basic to Advanced) Series 👇

🔗 Part 1: hacklido.com/blog/158
🔗 Part 2: hacklido.com/blog/162
🔗 Part 3: hacklido.com/blog/210
🔗 Part 4: hacklido.com/blog/224
🔗 Part 5: hacklido.com/blog/286

#OSCP #oscp
Rana Khalil's Academy (@ranakhalilacad) 's Twitter Profile Photo

🔊 Lab #1 video in the Business Logic Vulnerabilities module has been added to Rana Khalil's Youtube channel! 👉🏼 Youtube Link: youtube.com/watch?v=Khpn2f… 🐞 This lab doesn't adequately validate user input. We exploit a logic flaw in its purchasing workflow to buy items for an

🔊 Lab #1 video in the Business Logic Vulnerabilities module has been added to Rana Khalil's Youtube channel!

👉🏼 Youtube Link: youtube.com/watch?v=Khpn2f…

🐞 This lab doesn't adequately validate user input. We exploit a logic flaw in its purchasing workflow to buy items for an
Nithin 🦹‍♂️ (@thebinarybot) 's Twitter Profile Photo

🕵️‍♂️ New to bug bounty hunting? Here's a beginner-friendly thread with 10 must-do steps to kickstart your journey! From starting small to staying ethical, this list has got you covered.😉

Ahsan Khan (@hunter0x7) 's Twitter Profile Photo

High: Stealing Credentials via CORs (Tokens, Secrets, Sessions etc) Changed the PUT req to GET = Response was Json with info like secrets, API keys & session to access the app. Used CORs exploit to steal that info. Endpoint: /api/app-keys/value1~value2~value3/ (3/3)

Masonhck357 (@masonhck3571) 's Twitter Profile Photo

Dear beginners, I was no different from yall. 3 years ago, I couldn’t tell you the difference between a POST and GET request . I submitted P5’s and dupes and argued and cursed out triagers. However, know that through consistency comes growth. Growth becomes success. Focus on

Hussein Daher (@hussein98d) 's Twitter Profile Photo

Don't be trapped in only hacking/bug bounty. Build an exit door for when you feel exhausted. Hacking requires a lot of concentration and can drain your energy very quick. Be wise.

X (@themsterdoctor1) 's Twitter Profile Photo

200+ Hacking / Infosec pdfs Like and Repost Red Team Experts that explains the importance and details of Windows APIs❗️📷😈📷 Source: drive.google.com/drive/u/0/mobi… Source: drive.google.com/file/d/1qUoyzw… Credit:Joas Antonio #infosec #Hacking #infosecurity #Malware #bugbountytips #CTF

200+ Hacking / Infosec pdfs   

Like and Repost

Red Team Experts that explains the importance and details of Windows APIs❗️📷😈📷

Source: drive.google.com/drive/u/0/mobi…

Source: drive.google.com/file/d/1qUoyzw…

Credit:<a href="/C0d3Cr4zy/">Joas Antonio</a>

#infosec #Hacking #infosecurity #Malware #bugbountytips #CTF
X (@themsterdoctor1) 's Twitter Profile Photo

Offensive Security notes 🔥📢 Welcome to the Linux Privilege Escalation Guide within my OSCP (Offensive Security Certified Professional) notes. 🚀🚀🚀 "Access to my OSCP Linux Privilege Escalation notes is limited to a select group. First 10,000 people are eligible to receive

Offensive Security notes 🔥📢

Welcome to the Linux Privilege Escalation Guide within my OSCP (Offensive Security Certified Professional) notes. 🚀🚀🚀

"Access to my OSCP Linux Privilege Escalation notes is limited to a select group. 

First 10,000 people are eligible to receive
Critical Thinking - Bug Bounty Podcast (@ctbbpodcast) 's Twitter Profile Photo

Match and replace doesn’t get the love it deserves and is often forgotten about. Here are 8 things to match and replace in you’re next hunt:

Match and replace doesn’t get the love it deserves and is often forgotten about.

Here are 8 things to match and replace in you’re next hunt:
Dave Gerry (@davegerryjr) 's Twitter Profile Photo

At BlackHat this year, the bugcrowd Team ran four in-person Bug Bashes with 3 different customers where nearly 50 Hackers earned over $3M in 3 days. The power and ingenuity of the hacker community, and the scale of the Bugcrowd platform, is undeniable. Customers on the