Mayur Parmar  (@th3cyb3rc0p) 's Twitter Profile
Mayur Parmar 

@th3cyb3rc0p

Team Lead - NST | 👔 I Don't stalk,I Investigate 📌 | SRT @SynackRedTeam | Penetration Tester @yogoshaofficial |🇮🇳

ID: 866494095920959488

linkhttp://www.instagram.com/th3cyb3rc0p calendar_today22-05-2017 03:21:05

21,21K Tweet

4,4K Followers

5,5K Following

ӉѦСҠіИԌ ҬЄѦӍ (@hackingteam777) 's Twitter Profile Photo

Pentester Guide - Certifications - Pentesting Practice Platforms - Foss Labs - Bug Bounty Hunting Platforms - Independent Pentesting Platforms - 0Day Market - Operating System for Hacking - Hackers Manuals github.com/ZishanAdThanda… #cybersecurity

Pentester Guide

- Certifications
- Pentesting Practice Platforms
- Foss Labs
- Bug Bounty Hunting Platforms
- Independent Pentesting Platforms
- 0Day Market
- Operating System for Hacking
- Hackers Manuals

github.com/ZishanAdThanda…

#cybersecurity
Md Ismail Šojal 🕷️ (@0x0sojalsec) 's Twitter Profile Photo

hey hunter... A tool for validating API keys and credentials across services - github.com/NikhilPanwar/s… #infosec #cybersec #pentesting

hey hunter...

A tool for validating API keys and credentials across services

- github.com/NikhilPanwar/s…

#infosec #cybersec #pentesting
NullSecX (@nullsecurityx) 's Twitter Profile Photo

HTTP Request Smuggling → Bypass Auth 1️⃣ Attacker crafts desync payload (CL+TE mismatch). 2️⃣ Proxy & backend parse requests differently. 3️⃣ Attacker smuggles hidden request. 4️⃣ Leads to cache poisoning or auth bypass. 🚨 Powerful but often overlooked bug. #BugBounty #bypass

HTTP Request Smuggling → Bypass Auth

1️⃣ Attacker crafts desync payload (CL+TE mismatch).
2️⃣ Proxy & backend parse requests differently.
3️⃣ Attacker smuggles hidden request.
4️⃣ Leads to cache poisoning or auth bypass.

🚨 Powerful but often overlooked bug.
#BugBounty #bypass
Elorm Daniel (@elormkdaniel) 's Twitter Profile Photo

Nmap Commands (Educational Use) Nmap is a network scanning tool used by system administrators, IT professionals, and students for security auditing, troubleshooting, and learning. Basic Scans nmap -sP → Ping Scan: Checks which devices are active on a network. nmap -sS → TCP

Nmap Commands (Educational Use)

Nmap is a network scanning tool used by system administrators, IT professionals, and students for security auditing, troubleshooting, and learning.

Basic Scans

nmap -sP → Ping Scan: Checks which devices are active on a network.

nmap -sS → TCP
bugcrowd (@bugcrowd) 's Twitter Profile Photo

The front door to your vulnerability data opens soon 🚪 See what Bugcrowd's AI Connect will bring for you: bugcrowd.com/blog/bugcrowd-…

The front door to your vulnerability data opens soon 🚪 

See what Bugcrowd's AI Connect will bring for you: bugcrowd.com/blog/bugcrowd-…
Tur.js (@tur24tur) 's Twitter Profile Photo

Finally, with NoRiskNoLive, we managed to bypass the Cloudflare mTLS protection after around 5 days of work. I'd like to share a few golden tips for bug bounty hunters who might face something similar in the future. But first, here's a quick summary: The target was a banking app with

Finally, with <a href="/hw16/">NoRiskNoLive</a>, we managed to bypass the <a href="/Cloudflare/">Cloudflare</a> mTLS protection after around 5 days of work. I'd like to share a few golden tips for bug bounty hunters who might face something similar in the future. But first, here's a quick summary:

The target was a banking app with
HackerRats - Uncle Rat ❤️ (XSS Rat) (@thexssrat) 's Twitter Profile Photo

25 Parameters Devs Actually Use (and Hunters Forget) debug=true test=1 admin=1 isAdmin=true isPremium=true role=user → flip to admin uid=42 ref=partner → flip to internal redirect=/dashboard next=/secret returnUrl=evil.com (open redirect)

Orange Tsai  🍊 (@orange_8361) 's Twitter Profile Photo

Turns out my #PHRACK article is live! 🔥 > The Art of PHP — My CTF Journey and Untold Stories! Kinda a love letter to those CTF players & PHP nerds! Hope all the credit goes to the right ppl. Also huge thanks to [email protected] for not forgetting me, TMZ for the edits, and the

Turns out my #PHRACK article is live! 🔥

&gt; The Art of PHP — My CTF Journey and Untold Stories!

Kinda a love letter to those CTF players &amp; PHP nerds! Hope all the credit goes to the right ppl. Also huge thanks to <a href="/0xdea/">raptor@infosec.exchange</a> for not forgetting me, <a href="/guitmz/">TMZ</a> for the edits, and the
Arshad Kazmi (@arshadkazmi42) 's Twitter Profile Photo

🚨Giveaway - 1-Month Free iScan.today 🚨 Find exposed secrets in GitHub, Docker, GitLab & more. 1 lucky hunter gets full access for a month. To enter: 🔹 Follow me 🔹 Comment 🔹 RT this Winner will be announce in today #iScanToday

Bug Bounty Village (@bugbountydefcon) 's Twitter Profile Photo

Giveaway brought to you by HackingHub: 5x Blind XSS vouchers 5x Web Exploitation vouchers How to enter: 1⃣ Follow Bug Bounty Village + subscribe to our YouTube channel 2⃣Follow HackingHub 3⃣ ❤️+🔃 this post 4⃣Comment this post Winners will be picked on Friday 8/29

︎ ︎venom (@venom1s) 's Twitter Profile Photo

Feminist women developers have created an app for extra-marital affairs. > Women can join for free > Men have to pay Rs 1800 to join > Chats are hidden Most shocking part – 3 million Indians, most of them women, have already joined. Most are from Bangalore, followed by Mumbai.

AppsLab (@appslab_co) 's Twitter Profile Photo

Glass Widgets is now available for all Android devices🔥 No KWGT - Over 350 Stunning Widgets play.google.com/store/apps/det… 🎁10 Promo Codes #Giveaway ♥, follow, repost, and comment to Participate.

Glass Widgets is now available for all Android devices🔥

No KWGT - Over 350 Stunning Widgets
play.google.com/store/apps/det… 

🎁10 Promo Codes #Giveaway 
♥, follow, repost, and comment to Participate.
Muqsit 𝕏 (@mqst_) 's Twitter Profile Photo

🕸️ How 4,000,000 WordPress Sites Using "Really Simple Security" Free and Pro Versions were Affected by Critical Authentication Bypass Vulnerability Blog: wordfence.com/blog/2024/11/r… author: Wordfence #infosec

🕸️ How 4,000,000 WordPress Sites Using "Really Simple Security" Free and Pro Versions were Affected by Critical Authentication Bypass Vulnerability

Blog: wordfence.com/blog/2024/11/r…

author: <a href="/wordfence/">Wordfence</a> 

#infosec
Muqsit 𝕏 (@mqst_) 's Twitter Profile Photo

🚇 Beginners Guide to Heavy metal hacking: 3 steps to break into ICS pentesting Blog: hackthebox.com/blog/ics-pente… author: Hack The Box #infosec

🚇 Beginners Guide to Heavy metal hacking: 3 steps to break into ICS pentesting

Blog: hackthebox.com/blog/ics-pente…

author: <a href="/hackthebox_eu/">Hack The Box</a> 

#infosec
︎ ︎venom (@venom1s) 's Twitter Profile Photo

Why don’t girls with government jobs marry unemployed guys? I can find many guys who will cook and do all household chores. Will even give 10–20 lakhs dowry. Is any girl willing to marry them?