Nikhil Kumar (@socalledhacker) 's Twitter Profile
Nikhil Kumar

@socalledhacker

CEH V12 || Penetration Tester || Bug Hunter

ID: 1554749853888299008

linkhttps://nexguardians.com calendar_today03-08-2022 08:44:02

196 Tweet

57 Followers

101 Following

Justin Gardner (@rhynorater) 's Twitter Profile Photo

All my current bug bounty knowledge is gone. Here's how I get it back and make $100k in the first year: First, I've got to learn the basics. For this, I will make sure I understand at a high level how the components I'm working with function. I'll need to understand...

All my current bug bounty knowledge is gone. 

Here's how I get it back and make $100k in the first year:

First, I've got to learn the basics. For this, I will make sure I understand at a high level how the components I'm working with function. 

I'll need to understand...
Nikhil Kumar (@socalledhacker) 's Twitter Profile Photo

Read “P4 bug’s and their POC steps | Part 9“ by socalledhacker on Medium: osintteam.blog/p4-bugs-and-th… #bugbounty #bugbountytips #cybersecurity #infosec

Nikhil Kumar (@socalledhacker) 's Twitter Profile Photo

Read “Account Take Over | P1 — Critical“ by Irsyad Muhammad Fawwaz on Medium: irsyadsec.medium.com/account-take-o… #bugbounty #bugbountytips #infosec #bugbountytip #infosec #cybersecurity #hacking #bug #reward

Nikhil Kumar (@socalledhacker) 's Twitter Profile Photo

Read “Username restrictions bypass on Hackerone program“ by bugbounty_learners on Medium: medium.com/@bugbounty_lea… #bugbountytips #bugbounty #bugbountytip #bughunting #reward #security

Nikhil Kumar (@socalledhacker) 's Twitter Profile Photo

Read “File Upload Bypass (Nginx + PHP)“ by Arijit Dirghangi on Medium: medium.com/@arijitdirghan… #bugbountytips #bughunting #bugbounty #infosec #cybersecurity

Nikhil Kumar (@socalledhacker) 's Twitter Profile Photo

Read bug bounty articles:- nexguardians.com #bugbounty #cybersecurity #infosec #hacking #bugbountytips #bug #bughunting #security

Nikhil Kumar (@socalledhacker) 's Twitter Profile Photo

Read “How I Found My First Bug Using Shodan“ by Bochixx on Medium: medium.com/@bughunt.bochi… #bugbountytips #bugbounty #infosec #cybersecurity #hacking

Nikhil Kumar (@socalledhacker) 's Twitter Profile Photo

Read “Easy SQLI in just 30 minutes“ by Muhammed Mubarak on Medium: medium.com/@mohammed01550… #bugbounty #bugbountytips

Nikhil Kumar (@socalledhacker) 's Twitter Profile Photo

Read “[$$$ Bug Bounty Write Up] SSRF in OAuth Implementation of a Client Application“ by Ahmed Fadel on Medium: medium.com/@ahmedfadel616… #BugBounty #bugbountytips #cybersecurity #infosec #hacking #security

Nikhil Kumar (@socalledhacker) 's Twitter Profile Photo

Read “500$ Secrets: Uncovering Critical Vulnerabilities with Advanced JavaScript Analysis“ by hackersatty on Medium: hackersatty.medium.com/500-secrets-un… #bugbounty #infosec #bughunting

Nikhil Kumar (@socalledhacker) 's Twitter Profile Photo

Read “Business Logic Errors - A New Look“ by Jerry Shah (Jerry) on Medium: shahjerry33.medium.com/business-logic… #bugbounty #bugbountytips #hacking #infosec #bounty

Jayesh Madnani (@jayesh25_) 's Twitter Profile Photo

Bug Bounty Tips💰: Easy $2000 bounty via enabled "PUT" method! Here’s the nuclei template I used to identify this vulnerability: 🔗 github.com/projectdiscove… The key question: If it’s a public nuclei template, why wasn’t it flagged as a duplicate, and how come no one else found

Nikhil Kumar (@socalledhacker) 's Twitter Profile Photo

Read “Google Dorks – Web Ninja Style“ by Angry Oval Egg on Medium: medium.com/@angryovalegg/… #bugbountytips #bugbounty #hacking #bughunting

Hunter (@huntermapping) 's Twitter Profile Photo

🚨Alert🚨 CVE-2024-49113 : Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability 🔥PoC :github.com/SafeBreach-Lab… 📊 302.9m+ Services are found on hunter.how yearly. 🔗Hunter Link: hunter.how/list?searchVal… 👇Query HUNTER

🚨Alert🚨 CVE-2024-49113 : Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
🔥PoC :github.com/SafeBreach-Lab…
📊 302.9m+ Services are found on hunter.how yearly.
🔗Hunter Link: hunter.how/list?searchVal…
👇Query
HUNTER
✞ inversecos (@inversecos) 's Twitter Profile Photo

How the NSA (Equation Group) allegedly hacked into China's Polytechnical University 👀 I analysed intelligence reports from Chinese cyber firms (360, Pangu, CVERC) to aggregate TTPs attributed to Equation Group. 🔗inversecos.com/2025/02/an-ins…

How the NSA (Equation Group) allegedly hacked into China's Polytechnical University 👀

I analysed intelligence reports from Chinese cyber firms (360, Pangu, CVERC) to aggregate TTPs attributed to Equation Group.

🔗inversecos.com/2025/02/an-ins…
Critical Thinking - Bug Bounty Podcast (@ctbbpodcast) 's Twitter Profile Photo

OAuth Client Confusion is an easy-to-overlook vulnerability that can lead to account takeovers. If an app doesn’t verify that an Access Token was generated for its specific Client ID, an attacker can hijack accounts. Here’s how it works:

HackerRats - Uncle Rat ❤️ (XSS Rat) (@thexssrat) 's Twitter Profile Photo

🔥 XSS Filter Bypass Cheatsheet 🔥 🚀 Basic Payloads: 🟢 <script>prompt(1)</script> 🟢 "><script>prompt(1)</script> 🟢 <img src=x onerror=prompt(1)> 🟢 <svg/onload=prompt(1)> 🟢 <body onload=prompt(1)> 🟢 <iframe src="javascript:prompt(1)"></iframe> 🟢 <a

Sunil Yedla (@sunilyedla2) 's Twitter Profile Photo

2FA bypass: 1. 2FA activated on main domain 2. Found subdomain : embed.<target>.com 3. Logged in to subdomain with same creds 4. After login to subdomain option to redirect to main domain. 5. Full access to main domain without entering 2FA #bugbountytips #BugBounty #2fabypass

2FA bypass:
1. 2FA activated on main domain
2. Found subdomain : embed.&lt;target&gt;.com
3. Logged in to subdomain with same creds
4. After login to subdomain option to redirect to main domain. 
5. Full access to main domain without entering 2FA

#bugbountytips #BugBounty #2fabypass