Sharat Chandra

8 posts

Sharat Chandra banner
Sharat Chandra

Sharat Chandra

@Sharatchandra_1

Katılım Ekim 2022
111 Takip Edilen12 Takipçiler
Saanvi🌺
Saanvi🌺@Saanvi_dhillon·
Dear windows kindly fix this
Saanvi🌺 tweet media
English
91
6
162
30K
Sharat Chandra
Sharat Chandra@Sharatchandra_1·
@Ox4d5a It's one of the best series... few episodes are slow but the rest is amazing 💀
English
0
0
3
1.2K
Nikhil
Nikhil@Ox4d5a·
just started watching mr robot and saw 373 octet in ip address 😭😭😭😭😭😭
Nikhil tweet media
English
18
3
242
21.5K
Coffin
Coffin@lostsec_·
Don't type this prompt on Chatgpt ☠️ "Create an image of a random scene taken with an iPhone 6 with he flash on, chaotic, and uncanny."
English
34
2
114
18.4K
Coffin
Coffin@lostsec_·
Next One: Dependency Confusion Attacks. My personal favorite. This one will be more Advance. only few professional bug hunters report this type of vulnerability. It have bigger impact and high paying bounty in bug bounty programs and require good skills to find and exploit. But don’t worry, I will make it easy for you. As always, I’ll deliver exactly what I promise.
Coffin@lostsec_

Which video + article should I drop next? 1️⃣ Google API Key Mass Hunting & Exploitation for Bug $$Bounties Finding exposed keys at scale and turning them into real bounty-worthy impact. 2️⃣ Dependency Confusion Attacks: Zero to Hero Understanding the attack, setting up the lab, and exploiting it in real-world scenarios.

English
9
13
143
7.4K
Coffin
Coffin@lostsec_·
Most people don’t realize how little real competition there is in bug hunting. A huge part of the younger generation is focused on gaming, while others spend most of their time scrolling Instagram, TikTok and similar platforms. Even within tech, a lot of people are tied up in web development, chasing projects, clients or frontend trends. And now with AI in the picture, many beginners get discouraged before they even start, thinking everything is already saturated or automated. But the reality is very different. The field is still wide open. If you stay consistent, actually learn the fundamentals and put in real effort, you’re already ahead of most people. The barrier to entry is much lower than it looks, and very few people are willing to go deep enough to stand out. That’s where the opportunity is. Take advantage of it. Build your skills. Stay focused. This space can genuinely change your life if you take it seriously.
English
67
125
1.2K
44.2K
th3Ripp3r
th3Ripp3r@rajeshsagar777·
Happy to reach my bounty goals. Jai Shri Ram #bugbounty
th3Ripp3r tweet media
English
6
1
63
2.6K
Gospel
Gospel@4osp3l·
Hey mate, "/wp-json/wp/v2/users" is not a credential leak; the /wp-json/wp/v2/users endpoint is a default, publicly-accessible REST route in wordPress. It returns basic profile metadata ( IDs, usernames, image URL etc. ) but does not expose credentials, password hashes, or secret tokens; access to this path by itself is not a security vulnerability and should not be treated as a credential leak.
Paradox hunt (N.u)@hunt_n27493

@jaaayveee Totally depend on target how they handle cause i got sometime credentials leaks include name email and phone numbers so it's all upto target am not saying it's critical etc so it depends case to case

English
5
1
38
5.3K