Ved Parkash (@v3d_bug) 's Twitter Profile
Ved Parkash

@v3d_bug

Curious to Learn

ID: 1192493625499742208

calendar_today07-11-2019 17:27:09

5,5K Tweet

920 Followers

765 Following

Het Mehta (@hetmehtaa) 's Twitter Profile Photo

JWT Security Resources 1. JWT Introduction - jwt.io/introduction 2. JWT Attacks - portswigger.net/web-security/j… 3. OWASP JWT Cheat Sheet - cheatsheetseries.owasp.org/cheatsheets/JS… 4. JWT Vulnerabilities Guide - pentesterlab.com/blog/jwt-vulne… 5. JWT Best Practices - curity.io/resources/lear… 6.

Nicolas Krassas (@dinosn) 's Twitter Profile Photo

pentest-ai - 6 Claude Code subagents for offensive security research (engagement planning, recon analysis, exploit methodology, detection engineering, STIG compliance, report writing) 0xsteph.github.io/pentest-ai/

Hossam A. Mesbah 🇵🇸 (@m359ah) 's Twitter Profile Photo

A simple vulnerability in postmessage CTI, Been a while since my last bug bounty tip 😂 Not something new, but honestly I liked it Application is integrates with various integration including salesforce, Shopify etc... for example window.opener && window.opener.postMessage({

A simple vulnerability in postmessage CTI, Been a while since my last bug bounty tip 😂
Not something new, but honestly I liked it

Application is integrates with various integration including salesforce, Shopify etc... for example

window.opener && window.opener.postMessage({
The 0uts1der (@the_outs1derx) 's Twitter Profile Photo

GitHub repos for bug bounty hunters: 1. github.com/0xmaximus/Gala… 2. github.com/coffinxp/nucle… 3. github.com/0xKayala/Custo… 4. github.com/HackTricks-wik… 5. github.com/cipher387/Dork… 6. github.com/techgaun/githu… 7. github.com/s0md3v/Awesome… 8. github.com/TakSec/google-… 9. github.com/arainho/awesom…

Faiyaz Ahmad (@faiyazz007) 's Twitter Profile Photo

Don’t waste time chasing expensive AI tools. If you can’t build it, you don’t really understand it. That’s where most beginners go wrong. Everyone wants to use AI in cybersecurity, but very few actually learn what’s happening behind the scenes. They rely on tools, copy

Don’t waste time chasing expensive AI tools. If you can’t build it, you don’t really understand it.

That’s where most beginners go wrong.

Everyone wants to use AI in cybersecurity, but very few actually learn what’s happening behind the scenes. They rely on tools, copy
The 0uts1der (@the_outs1derx) 's Twitter Profile Photo

Browser extensions for bug bounty hunters: Wappalyzer (Chrome/Firefox) HackTools (Chrome/Firefox) HackBar (Chrome/Firefox) FoxyProxy (Chrome/Firefox) Cookie-Editor (Chrome/Firefox) CORS Everywhere (Firefox) CYFARE Reconner (Firefox) DotGit (Chrome/Firefox) EndPointer

🇷🇴 cristi (@cristivlad25) 's Twitter Profile Photo

Good resource for a quick search for assets in scope through public BBPs across some of the big platforms. recon.bugtraceai.com

Ehsan (@ehsan1579) 's Twitter Profile Photo

This one has a bit of story behind it. Less than 12h after the report was submitted, it was confirmed by the team. The team didn’t even try to argue about how catastrophic the impact was. They were fast responsive and professional and transparent with their users, something I

张惠倩 (@momika233) 's Twitter Profile Photo

CloudFront WAF sets a 403 interception rule for the `/actuator` path, but you can use URL encoding `/%61%63%74%75%61%74%6f%72` (That's, each character of `/actuator` is hexadecimal encoded) to bypass the WAF and directly access Spring Boot #BugHunter #BugBounty #BugBountyTips

CloudFront WAF sets a 403 interception rule for the `/actuator` path, but you can use URL encoding `/%61%63%74%75%61%74%6f%72` (That's, each character of `/actuator` is hexadecimal encoded) to bypass the WAF and directly access Spring Boot
#BugHunter #BugBounty #BugBountyTips
Koupon (@shabosec) 's Twitter Profile Photo

I found this Admin portal using Y-Dork site:Target.com inurl:login | inurl:admin | inurl:login | inurl:logon | inurl:sign-in | inurl:signin | inurl:signup | inurl:sign-up | inurl:dash | inurl:portal | inurl:panel | inurl:register | inurl:administrator 🔥🔥🔥🔥🔥

André Baptista (@0xacb) 's Twitter Profile Photo

Race conditions in OAuth flows can still happen in custom implementations. Here's how to find it: During the token exchange, the server is supposed to treat an authorization code as single-use. If you race the token endpoint by sending parallel requests with the same code