RUSHII๐Ÿฆ๐Ÿ‡ฎ๐Ÿ‡ณ/ (@u1tran00b) 's Twitter Profile
RUSHII๐Ÿฆ๐Ÿ‡ฎ๐Ÿ‡ณ/

@u1tran00b

Infosec Junkie, Pentester, Part-Time Bug Bounty @Bugcrowd @SynackRedTeam, Ambassador @Bugcrowd, Freelancer ๐Ÿ’ป ๐ŸŽ’ | CRTO | eCPPTv2 | eWPTXv2 | ShivaHolic ๐Ÿ•‰๐Ÿ”ฑ

ID: 926482846742609921

calendar_today03-11-2017 16:14:58

859 Tweet

2,2K Followers

480 Following

Securityboat (@securityb0at) 's Twitter Profile Photo

๐Ÿ“ฃ Exciting News! ๐ŸŽ‰ Join us for SB-Meetup 6.0 on April 30, 2023! ๐Ÿš€ ๐Ÿ—“๏ธ Save the Date: 30/04/2023 ๐Ÿ’ผ Engaging Talks ๐Ÿ” Valuable Insights ๐ŸŒ Latest Trends ๐Ÿ”’ Networking Opportunities Events are free & open to all. Don't miss out! ๐Ÿ†“๐Ÿค๐Ÿ“š #SBMeetup #Cybersecurity #Infosec

๐Ÿ“ฃ Exciting News! ๐ŸŽ‰ Join us for SB-Meetup 6.0 on April 30, 2023! ๐Ÿš€ 
๐Ÿ—“๏ธ Save the Date: 30/04/2023
๐Ÿ’ผ Engaging Talks
๐Ÿ” Valuable Insights
๐ŸŒ Latest Trends
๐Ÿ”’ Networking Opportunities

Events are free & open to all. Don't miss out! ๐Ÿ†“๐Ÿค๐Ÿ“š 
#SBMeetup #Cybersecurity #Infosec
Abiral ๐Ÿ‡ณ๐Ÿ‡ต (@proabiral) 's Twitter Profile Photo

๐ŸŽ‰๐ŸŽ‰๐ŸŽ‰ Giveaway alert ๐ŸŽ‰๐ŸŽ‰๐ŸŽ‰ Giving away metallic hacker trading card from bugcrowd which will be personalized for you. To enter: 1๏ธโƒฃ Follow me 2๏ธโƒฃ Retweet this tweet Winner will be announced in 48 hours. #giveaway #swag

๐ŸŽ‰๐ŸŽ‰๐ŸŽ‰ Giveaway alert ๐ŸŽ‰๐ŸŽ‰๐ŸŽ‰

Giving away metallic hacker trading card from <a href="/Bugcrowd/">bugcrowd</a> which will be personalized for you.

To enter: 
1๏ธโƒฃ Follow me
2๏ธโƒฃ Retweet this tweet

Winner will be announced in 48 hours.

#giveaway #swag
@bytes032.xyz (@bytes032) 's Twitter Profile Photo

Struggling with Ethereum Yellowpaper's complex mathematical jargon? Don't worry! The "Beigepaper" is a rewrite of the Yellowpaper that simplifies it with accessible terms, making it easier for everyone to grasp. github.com/chronaeon/beigโ€ฆ

Bhagavan Bollina โšก (@xcriminal_) 's Twitter Profile Photo

Hey everyone, I'm writing the blogs on #AWS misconfigurations, in case if you are interested you can subscribe to my medium blogs here : medium.com/@XCriminal/subโ€ฆ These are my upcoming blogs :) Go check my workโšก #aws #cloud #learning #bugbountytips #BugBounty #redteam #infosec

Hey everyone, I'm writing the blogs on #AWS misconfigurations, in case if you are interested you can subscribe to my medium blogs here : 
medium.com/@XCriminal/subโ€ฆ

These are my upcoming blogs :) Go check my workโšก

#aws #cloud #learning #bugbountytips #BugBounty #redteam #infosec
Appsecco (@appseccouk) 's Twitter Profile Photo

Check out Bollina Bhagavan's Bhagavan Bollina ๐Ÿšฉ new blog on "Getting shell and data access in AWS App Runner" Read on and share your thoughts! Link: blog.appsecco.com/getting-shell-โ€ฆ #aws #cloudsecurity #redteam #infosec #appsecco

@bytes032.xyz (@bytes032) 's Twitter Profile Photo

Roadmaps for security researcher keeps popping up, but it all comes down to three simple steps: - Get your Solidity skills on point - Dive into Secureum like there's no tomorrow - Join contests, check out all the juicy submissions, and soak up all the knowledge you can from

@bytes032.xyz (@bytes032) 's Twitter Profile Photo

Beginner auditors face the same five problems: 1. Overstudying 2. Overemphasis on CTFโ€™s 3. Intimidation by huge codebases 4. Feared of previously audited codebases 5. Lack of discipline Sounds familiar? Start here: blog.bytes032.xyz

@bytes032.xyz (@bytes032) 's Twitter Profile Photo

An excellent checklist by that can yield you a medium-severity finding when auditing multi-chain protocols. github.com/0xJuancito/mulโ€ฆ

pashov (@pashovkrum) 's Twitter Profile Photo

My latest solo smart contract security audit report has been published on my Github. It contains an interesting High severity issue, where a user-supplied address parameter can be used maliciously to steal funds from users. EnjoyโœŒ๏ธ github.com/pashov/audits/โ€ฆ

@bytes032.xyz (@bytes032) 's Twitter Profile Photo

I have just released the bible on how to prepare a quote for a solo audit โœŒ๏ธ blog.bytes032.xyz/p/solo-auditorโ€ฆ

Chetan Nayak (Brute Ratel C4 Author) (@ninjaparanoid) 's Twitter Profile Photo

I am conducting a public #BruteRatel 2 hr Seminar. The Seminar is free for everyone to attend. This will include: 1. Overview of the shellcode and it's OpSec considerations 2. Commander and Payload Profiles Overview 3. OpSec considerations during red teams 4. Badger OpSec v/s

Justin Gardner (@rhynorater) 's Twitter Profile Photo

XSS -> ATO Escalation Brain Dump: * Change email -> password reset * Change password * Change phone -> SMS password reset * Change security questions * Add SSO login (login with GitHub, ect) * Force logout -> Session Fixation * Steal session token via non-HTTP only cookie * Steal

Nick Aleks (@nick_aleks) 's Twitter Profile Photo

Free Black Hat GraphQL Book Giveaway! Retweet for your chance to win! #graphql #api #hacking #book #giveaway (10 signed books)

Free Black Hat GraphQL Book Giveaway! Retweet for your chance to win! #graphql #api #hacking #book #giveaway (10 signed books)
chrisdior.eth (@chrisdior777) 's Twitter Profile Photo

As a web3 security researcher, understanding financial basics is KEY! When auditing complex DeFi projects, knowing financial terms saves time and enhances your ability to detect risks and vulnerabilities. Acquire a thorough and well-rounded knowledge of financial concepts,

Chetan Nayak (Brute Ratel C4 Author) (@ninjaparanoid) 's Twitter Profile Photo

Trying not to sound like an Ahole, but do people even read blogs before tweeting it? Heck, do people even read their own blog before posting it these days? You can literally post any crap saying its redteam or maldev and everyone will spread it coz neither the poster nor the

Hussein Daher (@hussein98d) 's Twitter Profile Photo

Some bug bounty programs have killed that euphoria hackers get when finding multiple vulnerabilities on their assets by implementing rules like "same bug different path", "same bug different parameter", "same bug different domain" .. like come on, what's next?

Ninad Mathpati ๐Ÿ‡ฎ๐Ÿ‡ณ (@ninad_mathpati) 's Twitter Profile Photo

Looking to sponsor and guide any college student/working professional doing research in blockchain in-terms of cybersecurity. If anyone is interested, DM me with the answer for below questions. Why are you doing the research in blockchain? What kind of help do you expect from

luna (@imlunahey) 's Twitter Profile Photo

DO NOT STORE JWTS IN LOCAL STORAGE. DO NOT STORE JWTS IN LOCAL STORAGE. DO NOT STORE JWTS IN LOCAL STORAGE. DO NOT STORE JWTS IN LOCAL STORAGE. DO NOT STORE JWTS IN LOCAL STORAGE.