Sai kumar (@saikumar_vijay) 's Twitter Profile
Sai kumar

@saikumar_vijay

Securuity Resercher | Web application Pentesting | OSINT |

ID: 1286518818450190336

calendar_today24-07-2020 04:29:40

723 Tweet

108 Takipçi

265 Takip Edilen

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Interesting reading on Tapo TC60 Smart Security Camera reverse engineering and exploitation medium.com/@two06/hacking… #IoT #embedded #infosec

Interesting reading on Tapo TC60 Smart Security Camera reverse engineering and exploitation

medium.com/@two06/hacking…

#IoT #embedded #infosec
Jayesh Madnani (@jayesh25_) 's Twitter Profile Photo

🔍Question of the day: How can you uncover and exploit AEM issues successfully? I've reported over 50+ AEM issues, with rewards ranging from $500 to $7500 based on their impact. AEM stands as a widely used product across many bug bounty targets, often falling within the in-scope

🔍Question of the day: How can you uncover and exploit AEM issues successfully?

I've reported over 50+ AEM issues, with rewards ranging from $500 to $7500 based on their impact. AEM stands as a widely used product across many bug bounty targets, often falling within the in-scope
Jason Haddix (@jhaddix) 's Twitter Profile Photo

Ok fam. I’m giving away TWO free tickets to my course which takes place in two/three weeks. All you have to do to win is like, retweet this tweet, and reply with “tbhmlive.com!” I’ll pick winners next week! If you haven’t seen my course, check out the link!

TryHackMe (@realtryhackme) 's Twitter Profile Photo

Advent of Cyber is just 9 sleeps away! 💤🎄🎅 Like and retweet to be in with the chance of winning one of the following: 🎁 Limited edition AoC t-shirt 🎁 3-month subscription 🎁 Extra tickets for the $50,000 prize draw! Three winners will be chosen on 1st December. Good luck!

Advent of Cyber is just 9 sleeps away! 💤🎄🎅

Like and retweet to be in with the chance of winning one of the following:

🎁 Limited edition AoC t-shirt
🎁 3-month subscription
🎁 Extra tickets for the $50,000 prize draw!

Three winners will be chosen on 1st December. Good luck!
Shivam Kumar Singh (@mrrajputhacker) 's Twitter Profile Photo

Account Sessions Still Active And Binded To Older Username After Changing Username - Total 6000$ Reward Receive from GitHub for this issue. Full Write-ups :- blog.cyberxplore.com/we-hacked-gith… #bugbountytips #bugbounty

Account Sessions Still Active And Binded To Older Username After Changing Username  - Total 6000$  Reward Receive from GitHub for this issue.

Full Write-ups :- blog.cyberxplore.com/we-hacked-gith…

#bugbountytips #bugbounty
Sai kumar (@saikumar_vijay) 's Twitter Profile Photo

Hey #bugbounty hunters! I'm getting back into bug bounty hunting after a break. Any recommendations for an XSS Hunter alternative for blind XSS? Thanks!

Godfather Orwa 🇯🇴 (@godfatherorwa) 's Twitter Profile Photo

Slides of my talk in bsidesodisha about •Build your setup for hunting Tools , Extensions , Etc… • Quick Orwa Methodology 2023 • SQL Injection • and for sure #bugbountytips docs.google.com/presentation/d… feel free to ask about anything in comment and will try explained ❤️❤️

Kavishka Gihan (@_kavigihan) 's Twitter Profile Photo

Check out my latest article on Creating Vulnerable Machines with VMware and Network Configuration. In this piece, I explore ways to enhance the organization and efficiency of our content creation process, focusing on #vmware #networking #CTF #infosec. link.medium.com/RbpX2bYG8Fb

MrBeast (@mrbeast) 's Twitter Profile Photo

I’m gonna give 10 random people that repost this and follow me $25,000 for fun (the $250,000 my X video made) I’ll pick the winners in 72 hours

Nithin 🦹‍♂️ (@thebinarybot) 's Twitter Profile Photo

Ever wonder how those smart devices in your home actually work? And perhaps want to learn how to hack them too? Here are some IOT pentesting resources to get you started 🚀

TESS (@armansameer95) 's Twitter Profile Photo

Stop🛑reporting XSS in boring traditional manner, and start escalating them to a high issue instead. How? It is possible to chain XSS via a Browser based Password Manager Account takeover issue. I see a lot of times, I get duplicated to XSS being reported as a medium severity

Deedy (@deedydas) 's Twitter Profile Photo

EXCLUSIVE: Star Health is a $1.4B revenue insurance company whose CISO sold ~31 million Indians' data from salary to PAN card to a Chinese hacker for $43k. Ever wondered how these things happen? Here's a breakdown of the events "allegedly" with video proof. 1. Amarjeet

Sai kumar (@saikumar_vijay) 's Twitter Profile Photo

Thinking of buying a flagship phone with great performance and camera. The #iqoo13 keeps showing up in my searches, but I’m confused about its camera performance. Everything else looks like a beast on paper and in reviews. Can anyone share camera samples? #iQOO13 iQOO India

Sam Curry (@samwcyo) 's Twitter Profile Photo

New blog post with shubs: We found a vulnerability in Subaru where an attacker, with just a license plate, could retrieve the full location history, unlock, and start vehicles remotely. The issue was reported and patched. Full post here: samcurry.net/hacking-subaru

root@AkashHamal0x01:~/ # 🇵🇭 (@akashhamal0x01) 's Twitter Profile Photo

Here is writeup regarding how i was able to bypass HackerOne 2FA due to race condition: Link: akashhamal0x01.medium.com/bypassing-hack… As always feedbacks are appreciated.