0xdln

943 posts

0xdln banner
0xdln

0xdln

@0xdln

Hacker, bug bounty hunter.

Katılım Ekim 2020
345 Takip Edilen2.1K Takipçiler
Lupin
Lupin@0xLupin·
WE DID IT ! WE RAISED $5.9M PRE-SEED 🥳🎉🎉
English
77
41
408
34K
0xdln retweetledi
Pomme
Pomme@pxmme1337·
You wake up in 2016. You just earned a $3,000 bounty. Your friends all think you’re a genius hacker. Your online bug bounty mate tells you « this shit is forever, bro » HackerOne sends you a hoodie over the mail
English
10
27
460
37.6K
0xdln retweetledi
Sunil Yedla
Sunil Yedla@sunilyedla2·
I wasn’t active in Bugbounty since very long time but the amount of love and support the bug bounty community is showing towards the live hacking event is overwhelming ❤️ As I always say stay kind with each other 😇 @BugTroopers #lhe #bugbounty #iitr #bugtrooper #security
Sunil Yedla tweet media
English
0
4
29
1.3K
Intigriti
Intigriti@intigriti·
name that hacker you see on every program's leaderboard 😂 👇
English
23
2
79
15.3K
Security BSides Dehradun
Security BSides Dehradun@BSidesDehradun·
🔥 Speaker Announcement – BSides Dehradun 0x02 We’re excited to welcome Sumit Grover (@sumgr0) as a Talk Speaker at Security BSides Dehradun 0x02. 🎙 Talk: Recon-age: Scaling Reconnaissance from Text Files to Production-Grade Recon Systems Recon is no longer about scattered scripts and text files. In this session, Sumit breaks down how modern reconnaissance is built at scale — turning ad-hoc recon into automated, production-ready systems used by top bug bounty hunters and security teams. This talk is packed with real-world workflows, automation strategies, and lessons learned from large-scale recon operations, making it highly valuable for bug bounty hunters, pentesters, and offensive security engineers. 👨‍💻 About the Speaker: Sumit Grover is an independent security researcher widely known for his work in recon automation and subdomain takeovers. His systematic approach to reconnaissance and bug hunting has helped uncover vulnerabilities that traditional methods often miss. ⏳ Reminder: Ticket registrations close on 5 January 2026. No registrations after that. 📅 Conference: 11 January 2026 📍 Venue: UPES, Dehradun 🎟 Secure your pass → bsidesdehradun.com/#/tickets #BSidesDehradun #Recon #BugBounty #EthicalHacking #OffensiveSecurity #Pentesting #Automation #InfoSecCommunity #BSidesIndia
Security BSides Dehradun tweet media
English
1
3
10
1.5K
0xdln retweetledi
Pomme
Pomme@pxmme1337·
hi everyone i made a new website: an anonymous forum to discuss bug bounty and cybersecurity stuff freely all together. one (optional!) cool feature is to get your bug bounty earnings verified by the website check it out: bugbounty.forum
Pomme tweet media
English
25
41
1.1K
76.6K
HackerOne
HackerOne@Hacker0x01·
🎉 The #H13120 award winners are in! Huge congratulations to these standout security researchers for pushing the boundaries of AI security and showcasing what’s possible when human ingenuity meets intelligent systems: 💥 Eliminator: metnew ⚡ Eradicator: yumi, marvelmaniac 🛡️ Exterminator: metnew 🤝 Best Collaboration: yumi, marvelmaniac 🌍 Community Choice: alexandrio Thank you to @salesforce for partnering with us to strengthen trust in the age of intelligent systems. Together, we’re shaping the future of secure AI. 🔐✨
HackerOne tweet media
English
4
2
92
10.6K
MJ_The_DJ🇮🇷
MJ_The_DJ🇮🇷@MiniMjStar·
@0xdln @BSidesVizag and is it on main asset or subs? cause i've been testing this but unfortunately i couldnt find any yet, and what's the approach for this? to search for the login snippet code and follow it or just follow the Oauth and manipulate it?
English
1
0
0
56
Ashutosh
Ashutosh@0xmarvelmaniac·
3 years 😻
Ashutosh tweet media
English
7
2
73
2.2K
0xdln
0xdln@0xdln·
@MiniMjStar @BSidesVizag Thank you . It was redirecting to a path and I replaced it with a domain and it worked and then I tried the javascript protocol leading to xss.
English
1
0
1
50
MJ_The_DJ🇮🇷
MJ_The_DJ🇮🇷@MiniMjStar·
@0xdln @BSidesVizag just asking if the DOM xss's on Login page (Oauth) via manipulation redirect was possible via thier main domain or like u randomly tested and redirect was possible? (for both cases) overall nice talk👏
English
1
0
1
158
0xdln retweetledi
N B Sri Harsha
N B Sri Harsha@nbsriharsha·
Glad to be a part of bug bounty panel at @BSidesVizag It was great sharing the stage with Surya Subash, Laxmi Narayana @0xdln, Charan, Dhawal. A big thanks to @deathflash_xyz and their entire team for organizing it so well. Wishing you all the best for future editions.
N B Sri Harsha tweet mediaN B Sri Harsha tweet media
English
1
3
7
1K