Sumit Jain

2.1K posts

Sumit Jain banner
Sumit Jain

Sumit Jain

@sumit_cfe

Content Creator | Pentabug Red Team | Public Speaker | BugBounty Hunter | Security Trainer | Ethical Hacker

Jaipur, India Bergabung Haziran 2015
421 Mengikuti2.7K Pengikut
Sumit Jain me-retweet
obscaries โ˜ AppSec
obscaries โ˜ AppSec@obscariesยท
Static JS analysis just got smarter. jsluice is a Go-based tool that parses JavaScript using ASTs to extract endpoints, secrets, and interesting artifacts โ€” no noisy regex scraping. ๐Ÿ”—source: github.com/BishopFox/jsluโ€ฆ Perfect for bug bounty hunters who actually read JS instead of just grepping it. ๐Ÿ”Žโšก If youโ€™re serious about client-side recon, this deserves a spot in your toolkit. #BugBounty #AppSec #JavaScript #Recon
obscaries โ˜ AppSec tweet media
English
3
50
258
13.9K
Sumit Jain me-retweet
YesWeHack โ ต
YesWeHack โ ต@yeswehackยท
Found an interesting Android target in a Bug Bounty Program but have no idea where to begin? Hereโ€™s a simple workflow to follow ๐Ÿ‘‡
English
6
23
155
10.7K
Sumit Jain me-retweet
The XSS Rat - Proud XSS N00b :-)
The XSS Rat - Proud XSS N00b :-)@theXSSratยท
๐Ÿ”ฅ Bug Bounty Web App Vulnerability Checklist (100) thexssrat.podia.com/big-beautiful-โ€ฆ Username enumeration Weak password policy Brute-force login (no rate limit) MFA bypass Reset token reuse Predictable reset tokens Login CSRF Session fixation Session not invalidated on logout Session reuse after password change Weak JWT signing Long session expiry OAuth misconfig IDOR (broken object access) Mass assignment Privilege escalation Broken access control Forced browsing Horizontal auth bypass Vertical auth bypass SQL injection NoSQL injection Command injection SSTI XXE LDAP injection XPath injection OS file inclusion Path traversal Open redirect Reflected XSS Stored XSS DOM XSS CSRF on sensitive actions CORS misconfig Clickjacking Mixed content Insecure cookies Missing HttpOnly flag Missing Secure flag File upload bypass Webshell upload MIME spoofing Image polyglots ZIP slip Large file DoS Unrestricted download Backup file exposure .env leak Config file exposure API auth bypass Rate limit bypass GraphQL introspection Excessive data exposure Insecure webhooks Token leakage Hardcoded secrets Public S3 buckets Open Firebase Debug endpoints Business logic abuse Coupon reuse Price manipulation Race conditions Double spending Workflow bypass Hidden parameters Feature flag abuse Referral fraud Free trial bypass Subdomain takeover Dangling DNS Open admin panels Default credentials Directory listing Sensitive logs exposed Stack traces in prod Old API versions Deprecated endpoints Dev tools exposed Insecure deserialization Prototype pollution Regex DoS Memory leaks CRLF injection Cache poisoning Host header injection HTTP request smuggling SSRF Blind SSRF Cloud metadata access Internal service scan DNS rebinding PDF injection Email header injection Web cache deception Password in URL Sensitive data in JS Outdated libraries Unpatched CVEs
English
2
19
74
5.2K
Sumit Jain
Sumit Jain@sumit_cfeยท
Happy Diwali 2025 .. Spread Light, Not Vulnerabilities May your life be filled with light, joy, and security both online and offline! ๐Ÿ’ปโœจ Letโ€™s celebrate this festival of lights responsibly and remember: ๐Ÿ’ก Keep your systems patched. โšก And spread positivity, not malware
English
0
0
1
210
Sumit Jain me-retweet
Intigriti
Intigriti@intigritiยท
Testing for file upload vulnerabilities? ๐Ÿง Check out Malicious PDF Generator, an open-source toolkit to help you generate tens of malicious PDF files designed to exploit various vulnerabilities and insecure features found in PDF readers! ๐Ÿค  ๐Ÿ”— github.com/jonaslejon/malโ€ฆ
Intigriti tweet media
English
4
185
912
51.8K
Sumit Jain me-retweet
Hunter
Hunter@HunterMappingยท
๐ŸšจAlert๐Ÿšจ: CVE-2025-9961(Zero-Day): An authenticated attacker may remotely execute arbitrary code via the CWMP binary on the devices AX10 and AX1500 series. ๐ŸงDeep Dive :1.blog.byteray.co.uk/exploiting-zerโ€ฆ 2.blog.byteray.co.uk/zero-day-alertโ€ฆ ๐Ÿ“Š37.6K+ Services are found on the hunter.how yearly. ๐Ÿ”—Hunter Link:hunter.how/list?searchValโ€ฆ ๐Ÿ‘‡Query HUNTER : product.name="TP-Link AX1500 Router" ๐Ÿ“ฐRefer:securityonline.info/cve-2025-9961-โ€ฆ tp-link.com/us/support/faqโ€ฆ #hunterhow #infosec #infosecurity #OSINT #Vulnerability
Hunter tweet media
English
0
25
75
10.8K
Sumit Jain
Sumit Jain@sumit_cfeยท
@deepseek_ai want to report a security vulnerability , can you guide me where to send those reports ?? any official bug bounty program ???
English
0
0
0
47
Sumit Jain
Sumit Jain@sumit_cfeยท
@TeamYouTube Not updating since months .. NOT a Single Hour ..
English
1
0
0
28
TeamYouTube
TeamYouTube@TeamYouTubeยท
@sumit_cfe Check the monetization sign-up page in Studio for your valid public watch hours! Keep in mind that while Analytics includes unlisted + private watch hours, only valid public watch hours count toward your YPP eligibility. More here: goo.gle/4g9yFag
English
1
0
0
50
Sumit Jain
Sumit Jain@sumit_cfeยท
๐Ÿš€ Just dropped a new video on KaliGPT! KaliGPT is an AI-powered assistant for ethical hackers, penetration testers, and cybersecurity learners. ๐Ÿ”— Watch here ๐Ÿ‘‰ youtu.be/cQdBjfAedY0
YouTube video
YouTube
English
0
1
1
226
Sumit Jain
Sumit Jain@sumit_cfeยท
A manufacturing plant's OT network has been targeted by attackers who want to intercept and alter communications between PLCs (Programmable Logic Controllers) and the central control system. Which tool would be suitable for the attackers to use?
English
0
0
1
96
Sumit Jain
Sumit Jain@sumit_cfeยท
๐…๐ซ๐จ๐ฆ ๐‚๐จ๐ฆ๐ฆ๐ž๐ซ๐œ๐ž ๐ญ๐จ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ~ ๐€๐ซ๐ฏ๐ข๐ง๐โ€™๐ฌ ๐๐จ๐ฅ๐ ๐‚๐š๐ซ๐ž๐ž๐ซ ๐’๐ฐ๐ข๐ญ๐œ๐ก Meet Arvind Jindal from Rajasthan - a UGC-NET qualified commerce graduate who took a leap of faith into the world of cybersecurity. youtu.be/UcYQkNMlVgk
YouTube video
YouTube
English
0
0
0
166
Sumit Jain
Sumit Jain@sumit_cfeยท
๐Ÿšจ Day 6 is LIVE! The journey to become a SOC Analyst L1 continues ๐Ÿ”๐Ÿ›ก๏ธ Topic: IP Addressing Explained for SOC Analysts ๐ŸŽฅ Watch now: ๐Ÿ”— youtube.com/live/YpmXT6Lo5โ€ฆ ๐Ÿ“Œ Subscribe to ZeroDayVault
YouTube video
YouTube
English
0
0
0
117
Sumit Jain
Sumit Jain@sumit_cfeยท
๐Ÿ”ด LIVE NOW on YouTube! ๐Ÿš€ Exploring the Power of AI in Cybersecurity with KaliGPT ๐Ÿค–๐Ÿ’ป In this session, i am walking through how to use KaliGPT - an AI tool for ethical hackers and cybersecurity pros to simplify tasks like: ๐Ÿ‘‰ Join here: youtube.com/live/Hp_Vc_FN7โ€ฆ
YouTube video
YouTube
English
0
0
0
239