gobbledygookrigmarole (@u1s3xhulk) 's Twitter Profile
gobbledygookrigmarole

@u1s3xhulk

ID: 1511326266078556163

calendar_today05-04-2022 12:55:00

25 Tweet

6 Followers

391 Following

Farah Hawa (@farah_hawaa) 's Twitter Profile Photo

Bug Bounty Playbook 2 is great for learning post-recon exploitation techniques 🙌 It shows how to approach apps by analyzing their tech stack & you'll learn to create impactful POCs for bugs beyond OWASP's top 10! Check it out here:payhip.com/b/nRia #sponsored(but loved)

TRÄW🤟 (@thatstraw) 's Twitter Profile Photo

Want to be a hacker? Phase 1 – Basic Computer Skills Phase 2 – Networking Phase 3 – Linux Skills Phase 4 – Programming Phase 5 – PEH by TCM Phase 6 – Practise on THM/HTB Phase 7 – eJPT Phase 8 – PNPT/OSCP Phase 9 – Keep on learning Congrats, You're an ethical hacker.🏆

Vaibhav Sisinty (@vaibhavsisinty) 's Twitter Profile Photo

Gmail has 4.26 billion active users globally. But only a few know to use the platform effectively. Here are 35 Gmail hacks that you shouldn’t miss:

🐞Sara Badran (@sarabadran18) 's Twitter Profile Photo

2FA Bypass Techniques thread 🔥🐞🔓 ------------------------- 📌2FA Code Leakage in Response: You can intercept otp using burpsuite and inspect http response and check if the 2FA code leaked #hackerone #BugBounty #bugbountytips #BugBountyTip

2FA Bypass Techniques thread 🔥🐞🔓
-------------------------

📌2FA Code Leakage in Response:

You can intercept otp using burpsuite and inspect http response and check if the 2FA code leaked

#hackerone #BugBounty #bugbountytips #BugBountyTip