Biswajeet Ray🇮🇳

10.6K posts

Biswajeet Ray🇮🇳 banner
Biswajeet Ray🇮🇳

Biswajeet Ray🇮🇳

@BiswajeetRay7

Indian Security Researcher | Pentester | Analyst | #OSINT 🔍#SOCMINT #GEOINT | Research & Analysis | Secured Microsoft, IBM, NASA & more | National Security.

India Katılım Ekim 2017
508 Takip Edilen616 Takipçiler
Dinesh O Bareja🇮🇳
@Uber_Support what crap is this. You donnot allow cancellation unless I accept to pay a fee. WHY WILL I PAY ANTTHING WHEN YOUR DRIVER REFUSED THE RIDE UNLESS I CANCELLED ABD PAID CASH.
Dinesh O Bareja🇮🇳 tweet media
English
2
0
0
121
Biswajeet Ray🇮🇳
Biswajeet Ray🇮🇳@BiswajeetRay7·
. * . 🪐 * . * 🌀 * . . * 🌔 * . * . * . 🌍 * * . * . ☄️ * . * 🛸 . * . . ☀️ * . * 🛰 . * ✨ * .
ART
0
0
1
14
Biswajeet Ray🇮🇳
Biswajeet Ray🇮🇳@BiswajeetRay7·
Compliance keeps you out of trouble; adversaries keep you out of business. -Biswajeet Ray
English
0
0
0
6
Biswajeet Ray🇮🇳 retweetledi
vxdb
vxdb@vxdb·
If you wanna stay on top of cybersecurity news, you need these sites in your RSS reader BleepingComputer DarkReading RecordedFuture - The Record SecurityWeek DataBreachedNet TheRegister HackerNews (hit or miss) KrebsOnSecurity 404Media ArsTechnica TechDirt
English
30
216
1.9K
62.6K
Biswajeet Ray🇮🇳 retweetledi
Manjeet Negi
Manjeet Negi@manjeetnegilive·
"Jung ka ek hi usul hai, vo hai jeet. May I assure you that we shall accomplish the same at all costs." - General Bipin Rawat
Manjeet Negi tweet media
English
3
97
1K
8.3K
Biswajeet Ray🇮🇳
Biswajeet Ray🇮🇳@BiswajeetRay7·
@yandex I reported multiple vulnerabilities but still no response yet even you blocked my Yandex mail this is very disheartening to see unprofessional behaviour by your team.
English
1
0
1
81
Biswajeet Ray🇮🇳 retweetledi
0 day exploit
0 day exploit@0day_exploit_·
Top google Dorking Thread 🧵:👇 Here is how to find sensitive data issues: 1) publicly exposed documents :- site:target.com ext:doc | ext:docx | ext:odt | ext:rtf | ext:sxw | ext:psw | ext:ppt | ext:pptx | ext:pps | ext:csv #BugBounty #bugbountytips #infosec
English
31
200
573
54.8K
Biswajeet Ray🇮🇳 retweetledi
obscaries ❘ AppSec
obscaries ❘ AppSec@obscaries·
Just came across this clean browser-based bug bounty toolkit 👀 hackermd-toolkit.netlify.app It’s basically a well-organized collection of recon + vuln testing commands you can copy-paste instantly — no setup, no clutter. Good for: • Quick recon workflows • Remembering tool chains • Speeding up hunting sessions Not a scanner. Not automation. Just a solid command hub 🧠⚡ Use it smart — not blindly. Real bugs still need real thinking. 💀 #BugBounty #CyberSecurity #Infosec
obscaries ❘ AppSec tweet media
English
2
18
112
9.2K
Biswajeet Ray🇮🇳 retweetledi
NullSecurityX
NullSecurityX@NullSecurityX·
Bug Bounty Full Course: Recon, Dorking, XSS/LFI, CORS & Open Redirect on Live Targets | YesWeHack ✅ Subdomain Recon ✅ Google Dorking ✅ XSS & LFI ✅ CORS Misconfiguration ✅ Open Redirect Mass Hunt Perfect for beginners👇 youtu.be/wcZxhXel7jQ
YouTube video
YouTube
English
0
14
68
7.4K
Biswajeet Ray🇮🇳 retweetledi
Brut 🇮🇳
Brut 🇮🇳@wtf_yodhha·
⚡𝗕𝗿𝘂𝘁𝗗𝗿𝗼𝗶𝗱 𝟮.𝟬 - 𝗔𝗻𝗱𝗿𝗼𝗶𝗱 𝗦𝘁𝘂𝗱𝗶𝗼 𝗣𝗲𝗻𝘁𝗲𝘀𝘁 𝗔𝘂𝘁𝗼𝗺𝗮𝘁𝗼𝗿: 𝗦𝘁𝗿𝗲𝗮𝗺𝗹𝗶𝗻𝗲 𝗺𝗼𝗯𝗶𝗹𝗲 𝗽𝗲𝗻𝘁𝗲𝘀𝘁𝗶𝗻𝗴 𝘄𝗶𝘁𝗵 𝗮𝘂𝘁𝗼𝗺𝗮𝘁𝗲𝗱 𝗲𝗺𝘂𝗹𝗮𝘁𝗼𝗿 𝗿𝗼𝗼𝘁𝗶𝗻𝗴, 𝗙𝗿𝗶𝗱𝗮, 𝗮𝗻𝗱 𝗕𝘂𝗿𝗽 𝗦𝘂𝗶𝘁𝗲 𝗶𝗻𝘁𝗲𝗴𝗿𝗮𝘁𝗶𝗼𝗻. ✅github.com/Brut-Security/… ⭐𝗗𝗼𝗻'𝘁 𝗳𝗼𝗿𝗴𝗲𝘁 𝘁𝗼 𝗹𝗲𝗮𝘃𝗲 𝗮 𝘀𝘁𝗮𝗿 :) ✅ Join Telegram For More Content: t.me/brutsecurity ---------------------------------------------------------- ⭐ Found this helpful? Like, Share & Level Up Your Skills! #CyberSecurity #BugBounty #EthicalHacking #Infosec #BrutSecurity #Android #Pentesting
Brut 🇮🇳 tweet media
English
6
92
453
23.9K
Biswajeet Ray🇮🇳 retweetledi
NullSecurityX
NullSecurityX@NullSecurityX·
New Free Course is Now Live!🎬 Bug Bounty Full Course: Recon, Dorking, XSS/LFI, CORS & Open Redirect on Live Targets | YesWeHack ✅ Subdomain Recon ✅ Google Dorking ✅ XSS & LFI ✅ CORS Misconfiguration ✅ Open Redirect Mass Hunt Perfect for beginn👇 youtu.be/wcZxhXel7jQ
YouTube video
YouTube
English
1
10
41
11.5K
Biswajeet Ray🇮🇳 retweetledi
Hanuman Das
Hanuman Das@kutumbofshankar·
Nothing is more beautiful than this.
Hanuman Das tweet media
English
6
99
1.2K
11.7K
Biswajeet Ray🇮🇳
Biswajeet Ray🇮🇳@BiswajeetRay7·
Not every reaction is instant some are delayed kinetic responses that hit harder. ~Biswajeet Ray
English
0
0
1
15
Biswajeet Ray🇮🇳 retweetledi
〈seal〉
〈seal〉@sealldev·
@blahkayyyy @usetraceix @Ferrari You can figure it out from the screenshot, just use intitle and site. E.g. intitle:"Confidential - Internal" site:blah
English
0
1
13
942
Biswajeet Ray🇮🇳 retweetledi
X
X@TheMsterDoctor1·
🧠 X Advanced Recon Methodology — v5 by @TheMsterDoctor1 ⸻ ⚡ PHASE 0 — Target Expansion (OWN THE ATTACK SURFACE) 🔥 Expand Beyond Domains (CRITICAL) # ASN → IP → Subdomains → Assets amass intel -org "Starbucks" -o intel.txt amass enum -passive -df domains.txt -o amass-passive.txt # Reverse IP expansion cat domains.txt | dnsx -resp-only -silent | sort -u > ips.txt cat ips.txt | mapcidr -silent > cidr.txt ⸻ 🛰 PHASE 1 — Multi-Source URL Intelligence (NEXT LEVEL) 🔥 Add MORE sources (this is where most hunters lose) # Combine EVERYTHING gau --threads 50 --subs domains.txt > gau.txt waybackurls < domains.txt > wayback.txt katana -list domains.txt -silent -jc -kf all -o katana.txt # AlienVault OTX (YOU already know 🔥) for domain in $(cat domains.txt); do curl -s "otx.alienvault.com/api/v1/indicat…" \ | jq -r '.url_list[].url' >> otx.txt done # GitHub leak endpoints github-subdomains -d starbucks.com -t YOUR_TOKEN > github.txt ⸻ 🧬 PHASE 2 — Deep Endpoint & Parameter Discovery 🔥 Extract parameters like a machine cat *.txt | sort -u > all-urls.txt # Extract parameters cat all-urls.txt | unfurl keys | sort -u > params.txt # Find high-value endpoints grep -Ei 'admin|api|internal|private|debug|test|dev' all-urls.txt > juicy.txt ⸻ ⚡ PHASE 3 — Smart Sensitive File Detection (UPGRADED) 🔥 Advanced patterns (not basic anymore) grep -Ei '\.(zip|rar|sql|env|conf|gz|bak|db|tar|7z|log|yml|json|pem|key|crt)(\?|$|")' all-urls.txt > sensitive.txt 🔥 Add misconfig endpoints grep -Ei '/\.env|/config|/settings|/backup|/dump|/\.git|/\.aws' all-urls.txt >> sensitive.txt ⸻ 🎯 PHASE 4 — LIVE VALIDATION (INTELLIGENT) httpx -l sensitive.txt \ -mc 200,302,403 \ -title -tech-detect -server \ -content-length \ -silent > live-sensitive.txt ⸻ 🧠 PHASE 5 — PRIORITY SCORING (THIS IS WHAT MAKES YOU ELITE) cat live-sensitive.txt | while read url; do score=0 [[ "$url" == *".env"* ]] && score=$((score+10)) [[ "$url" == *".zip"* ]] && score=$((score+8)) [[ "$url" == *"backup"* ]] && score=$((score+7)) [[ "$url" == *"config"* ]] && score=$((score+6)) [[ "$url" == *"admin"* ]] && score=$((score+5)) echo "$score | $url" done | sort -nr > prioritized.txt ⸻ 🚀 PHASE 6 — AUTOMATED DOWNLOAD + ANALYSIS mkdir loot # Download everything juicy cat prioritized.txt | head -50 | cut -d'|' -f2 | xargs -n1 -P20 wget -q -P loot/ # Extract archives automatically for f in loot/*.zip; do unzip -o "$f" -d loot/extracted/; done ⸻ 🔍 PHASE 7 — SECRET HUNTING (ADVANCED) # Scan extracted + JS files gitleaks detect --source loot/ -v > secrets.txt # Custom regex scan (your engine) grep -RniE "AKIA|AIza|sk_live|ghp_|PRIVATE KEY" loot/ >> secrets.txt ⸻ 💣 PHASE 8 — JS RECON + HIDDEN ENDPOINTS # Extract JS files grep "\.js" all-urls.txt | sort -u > js.txt # Crawl JS deeply katana -list js.txt -silent -jc -o js-endpoints.txt # Find secrets inside JS cat js.txt | xargs -n1 -P20 curl -s | grep -E "api_key|token|secret" ⸻ ⚡ PHASE 9 — AUTOMATED VULNERABILITY TRIGGERS # IDOR detection candidates grep "=" all-urls.txt | grep -Ei "id=|user=|account=" > idor.txt # Test automatically (basic fuzz) cat idor.txt | qsreplace 1 | httpx -silent -mc 200 > idor-test.txt ⸻ 🛡 PHASE 10 — NUCLEI (SMART MODE) nuclei -l live-sensitive.txt \ -t exposures/ \ -t misconfiguration/ \ -t cves/ \ -severity critical,high \ -o nuclei.txt ⸻ 🤖 PHASE 11 — AI-POWERED ANALYSIS (YOUR EDGE) This is where you DESTROY competition. # ai_analyzer.py import openai def analyze_finding(url): prompt = f""" Analyze this URL for bug bounty impact: {url} Identify: - Vulnerability type - Exploitability - Impact level - Suggested attack chain """ # send to GPT / local LLM ⸻ 🔥 FULL AUTO PIPELINE (REAL HUNTER MODE) cat domains.txt \ | gau \ | tee gau.txt \ | httpx -mc 200 -silent \ | tee live.txt \ | grep -Ei '\.env|\.zip|backup|config' \ | anew final-sensitive.txt
GIF
English
4
30
136
6.6K