Saqib Chand ๐Ÿ‡ต๐Ÿ‡ธ (@sakyb7) 's Twitter Profile
Saqib Chand ๐Ÿ‡ต๐Ÿ‡ธ

@sakyb7

๐Ÿ’‰ Web & Mobile Penetration tester | OSCP+ | ๐Ÿž Bug Hunter | ๐Ÿ›ก Synack Red Team Member

ID: 920374947435786240

calendar_today17-10-2017 19:44:21

733 Tweet

462 Followers

641 Following

Ian Carroll (@iangcarroll) 's Twitter Profile Photo

Our talk was accepted at DEF CON this summer! Come watch Lennert and I give a talk about the Unsaflok vulnerability in hotel locks and the technical details behind it. unsaflok.com

Our talk was accepted at <a href="/defcon/">DEF CON</a> this summer! Come watch <a href="/LennertWo/">Lennert</a> and I give a talk about the Unsaflok vulnerability in hotel locks and the technical details behind it. 

unsaflok.com
YS (@yshahinzadeh) 's Twitter Profile Photo

How I reverse-engineered an Android app, bypassed custom encryption layer, achieved server-side RCE, and earned a $5000 bounty. read the full story here (TLDR; but worth reading) blog.voorivex.team/from-an-androiโ€ฆ

How I reverse-engineered an Android app, bypassed custom encryption layer, achieved server-side RCE, and earned a $5000 bounty. read the full story here (TLDR; but worth reading)

blog.voorivex.team/from-an-androiโ€ฆ
Deev Pal (@techycodec08) 's Twitter Profile Photo

After going through 200+ IDOR reports, and spending some time hunting for them in Real Targets across multiple functionalities, here are some of the attack methodologies I build for myself, which I feel can be useful to others too. Follow this thread to know more.

Jason Haddix (@jhaddix) 's Twitter Profile Photo

๐Ÿ›‘ GIVEAWAY ALERT ๐Ÿ›‘ Today is DAY TWO of FIVE DAYS of Arcanum Information Security and friends Black Friday and Cyber Monday giveaways! Today we are giving away FIVE seats to our flagship training: "The Bug Hunter's Methodology Live" TBHM is one of the BEST trainings in the industry for

๐Ÿ›‘ GIVEAWAY ALERT ๐Ÿ›‘

Today is DAY TWO of FIVE DAYS of <a href="/arcanuminfosec/">Arcanum Information Security</a>  and friends Black Friday and Cyber Monday giveaways!

Today we are giving away FIVE seats to our flagship training:

"The Bug Hunter's Methodology Live" 

TBHM is one of the BEST trainings in the industry for
Luke Jahnke (@lukejahnke) 's Twitter Profile Photo

๐ŸงตCan you work out how to bypass this vulnerable CSRF protection? Read all about this gotcha in my latest blog post

๐ŸงตCan you work out how to bypass this vulnerable CSRF protection? Read all about this gotcha in my latest blog post
The SecOps Group (@thesecopsgroup) 's Twitter Profile Photo

๐Ÿš€Black Friday Giveaway!๐Ÿค— *** ๐—™๐—ผ๐—น๐—น๐—ผ๐˜„ ๐—ผ๐˜‚๐—ฟ ๐—ฝ๐—ฎ๐—ด๐—ฒ, ๐—ฅ๐—ฒ๐—ฝ๐—ผ๐˜€๐˜, ๐—Ÿ๐—ถ๐—ธ๐—ฒ ๐—ฎ๐—ป๐—ฑ ๐—–๐—ผ๐—บ๐—บ๐—ฒ๐—ป๐˜ ๐˜„๐—ต๐—ถ๐—ฐ๐—ต ๐—ฒ๐˜…๐—ฎ๐—บ ๐˜†๐—ผ๐˜‚ ๐˜„๐—ผ๐˜‚๐—น๐—ฑ ๐—น๐—ถ๐—ธ๐—ฒ ๐˜๐—ผ ๐˜„๐—ถ๐—ป ๐—ฎ๐—ป๐—ฑ ๐Ÿฑ ๐—น๐˜‚๐—ฐ๐—ธ๐˜† ๐˜„๐—ถ๐—ป๐—ป๐—ฒ๐—ฟ๐˜€ ๐˜„๐—ถ๐—น๐—น ๐—ด๐—ฒ๐˜ ๐—ฎ ๐—ณ๐—ฟ๐—ฒ๐—ฒ ๐—ฒ๐˜…๐—ฎ๐—บ ๐—ผ๐—ณ ๐˜๐—ต๐—ฒ๐—ถ๐—ฟ ๐—ฐ๐—ต๐—ผ๐—ถ๐—ฐ๐—ฒ! *** Get

๐Ÿš€Black Friday Giveaway!๐Ÿค—
*** ๐—™๐—ผ๐—น๐—น๐—ผ๐˜„ ๐—ผ๐˜‚๐—ฟ ๐—ฝ๐—ฎ๐—ด๐—ฒ, ๐—ฅ๐—ฒ๐—ฝ๐—ผ๐˜€๐˜, ๐—Ÿ๐—ถ๐—ธ๐—ฒ ๐—ฎ๐—ป๐—ฑ ๐—–๐—ผ๐—บ๐—บ๐—ฒ๐—ป๐˜ ๐˜„๐—ต๐—ถ๐—ฐ๐—ต ๐—ฒ๐˜…๐—ฎ๐—บ ๐˜†๐—ผ๐˜‚ ๐˜„๐—ผ๐˜‚๐—น๐—ฑ ๐—น๐—ถ๐—ธ๐—ฒ ๐˜๐—ผ ๐˜„๐—ถ๐—ป ๐—ฎ๐—ป๐—ฑ ๐Ÿฑ ๐—น๐˜‚๐—ฐ๐—ธ๐˜† ๐˜„๐—ถ๐—ป๐—ป๐—ฒ๐—ฟ๐˜€ ๐˜„๐—ถ๐—น๐—น ๐—ด๐—ฒ๐˜ ๐—ฎ ๐—ณ๐—ฟ๐—ฒ๐—ฒ ๐—ฒ๐˜…๐—ฎ๐—บ ๐—ผ๐—ณ ๐˜๐—ต๐—ฒ๐—ถ๐—ฟ ๐—ฐ๐—ต๐—ผ๐—ถ๐—ฐ๐—ฒ! ***

Get
Godfather Orwa ๐Ÿ‡ฏ๐Ÿ‡ด (@godfatherorwa) 's Twitter Profile Photo

Hello everyone โ™ฅ a little bit write-up of #bugbountytip #bugbountytips I am going to write here ..... Title: getting unauthorized access on 3rd party's/workspaces & and building your checklist for quickly locating bugs there via massive recon we know that its helpful to look

Hello everyone โ™ฅ
a little bit write-up of #bugbountytip #bugbountytips I am going to write here ..... 

Title:
getting unauthorized access on 3rd party's/workspaces &amp; and building your checklist for quickly locating bugs there via massive recon

we know that its helpful to look
Abdulaziz (@stuipds) 's Twitter Profile Photo

How we gained full control over 3,000 companies and all their registered branches. This took us about 3 weeks of studying the target to find about all the vulnerabilities explained. Hope you enjoy reading! link.medium.com/rmRjR6udwQb

Shuvo Kumar Saha ๐Ÿ‡ง๐Ÿ‡ฉ (@syper_shuvo) 's Twitter Profile Photo

$20,300 Bounties from a 200 Hour Hacking Challenge Credit: Mohammad Zaheri . . . . . . #bugbountytips #bughunting #infosec blog.voorivex.team/20300-bountiesโ€ฆ

Dan Bilzerian (@danbilzerian) 's Twitter Profile Photo

If youโ€™re not Jewish but you support Israel Congrats Youโ€™re one of the dumbest and most gullible motherfuckers on the planet.

Jsmon - jsmon.sh (@jsmonsh) 's Twitter Profile Photo

โŒGraphQL introspection disabled? โœ…No problem! Extract all GraphQL operations from Javascript files! 1. go install github.com/rashahacks/jsmโ€ฆ 2. Scan the JS URL with -u flag. ๐Ÿš€View all the GraphQL operations in seconds -- no introspection needed.

Andrรฉ Baptista (@0xacb) 's Twitter Profile Photo

How to grab subs for a target using subfinder, validate them and extract the text body from each response using httpx and jq, extract a wordlist of keywords using NLP then resolve them using puredns to find valid subdomains ๐Ÿ‘‡ You can also use LLMs and tools like alterx to

HackerRats - Uncle Rat โค๏ธ (XSS Rat) (@thexssrat) 's Twitter Profile Photo

JAVASCRIPT IS A GOLDMINE FOR #BugBounty HUNTERS youtube.com/playlist?list=โ€ฆ Check out my playlist to learn how <3 treat yoselfff rats is freeeee

Godfather Orwa ๐Ÿ‡ฏ๐Ÿ‡ด (@godfatherorwa) 's Twitter Profile Photo

Iโ€™ve added here github.com/orwagodfather/โ€ฆ PDF file for XSS, it can bypass any waf for who looking for Stored XSS , and it can be changed to blind if you want to Simply I encoded the payload as ASCII hex You can edit the payload over notepad++ #bugbountytips #bugbountytip

Iโ€™ve added here 
github.com/orwagodfather/โ€ฆ

PDF file for XSS, it can bypass any waf 
for who looking for Stored XSS , and it can be changed to blind if you want to

Simply I encoded the payload as ASCII hex

You can edit the payload over notepad++

#bugbountytips  #bugbountytip