UDAY 🥷

3.3K posts

UDAY 🥷 banner
UDAY 🥷

UDAY 🥷

@heyiamuday

Hacking my way to a better tomorrow 🌏

Katılım Aralık 2023
781 Takip Edilen110 Takipçiler
UDAY 🥷 retweetledi
Path of Men
Path of Men@PathOfMen_·
there is no deeper hell than being fully aware that you are wasting your potential
English
28
347
3.7K
78.4K
UDAY 🥷 retweetledi
Michael Blake
Michael Blake@Michael1026H1·
Seeing a lot of fear mongering about 'required' use of AI in bug bounty. My approach hasn't really changed in the last couple of years, yet I'm sitting with 17 high / critical bugs from the last 10 days. Currently the only thing I use AI for in bug bounty is programming.
English
12
6
154
8.8K
UDAY 🥷 retweetledi
drop
drop@dropn0w·
I disagree a bit here. I believe we’re no longer talking about companies investing a ton of money and getting almost zero return, but rather about individual researchers. These tools are very accessible and are already creating a huge impact if you know how to use them. Speaking for myself, with a $200 investment, I already achieved a 70x return in bug bounties in a single month. So the impact is already there, and for me, this is no longer “hype”… just saying. 🤷🏻
English
2
1
14
524
UDAY 🥷 retweetledi
Patrickbatman
Patrickbatman@hamidonsolo·
day 2: how to hit bounty quick $1,500. Tip for bug bounty hunters: every AI chatbot on a website is an attack surface now. I asked a company's AI support bot to "help me understand this error." The error was a base64-encoded XSS payload. The bot decoded it. Rendered it in the DOM. Zero sanitization. That gave me JavaScript execution on their site. From there: → Cookie downgrade via OAuth flow → Stole authentication tokens → Full account takeover I reported it. 4 months of silence. Then they quietly patched it and told me they "couldn't reproduce it." So I sent video proof. Timestamps. Working PoC. Everything documented. $500 → $1,500. Every company is rushing to ship AI features. Nobody is auditing the output. If it renders in the DOM, it's probably vulnerable. Go test them. Free XSS everywhere. And if they try to lowball you — push back. Always push back. Full YouTube lab breaking down the entire chain if this hits 2,000 ❤️
Patrickbatman tweet mediaPatrickbatman tweet media
English
16
30
490
19.5K
UDAY 🥷 retweetledi
Patrickbatman
Patrickbatman@hamidonsolo·
@w4rcrypt Reports submitted vs resolved
English
1
1
2
300
UDAY 🥷 retweetledi
Patrickbatman
Patrickbatman@hamidonsolo·
Bug bounty tip most beginners don't know: Don't hack Google. Don't hack Apple. Don't hack Facebook. Start with small startups on HackerOne that have 0-5 hackers looking at them. Less competition = faster first bounty even public programs. I found my first bug in a program after 1 month full tiem Paid $2500. Next post: how to find YOUR bug type — the one thing you get so good at that money becomes inevitable subscribe to be alerted when it comes .
Patrickbatman tweet media
English
19
13
387
16.3K
UDAY 🥷 retweetledi
.RW🦦
.RW🦦@whotfisrw·
Physics is fascinating!
English
80
401
8.3K
1.1M
UDAY 🥷
UDAY 🥷@heyiamuday·
June’24,I started 365-day bug bounty challenge. Quit on day 363 just before my first bounty That failure taught me more than success ever could. Today,I restart with the 12-Week Year. Posting every Monday until my first $10K bounty heyiamuday.github.io/bug-bounty-jou… x.com/heyiamuday/sta…
UDAY 🥷@heyiamuday

🎯 Day 363 of my Bug Bounty journey Build a social media app with Node.js, GraphQL, Prisma, PostgreSQL, JWT, bcryptjs, Cloudinary, TypeScript, React, Vite, Tailwind CSS, SASS/SCSS. Summarizing tweets takes more time than git!📝 x.com/heyiamuday/sta… github.com/UdayDocs/bug-b…

English
1
0
0
19
UDAY 🥷 retweetledi
Abhi Sharma 𝕏
Abhi Sharma 𝕏@a13h1_·
Every time I open X, I notice in the bug bounty / infosec space, people are posting anything these days copy-paste threads, fabricated success stories recycled “recon tips,” tools they’ve never actually used, resources they haven’t even read - just to grab likes and followers. No depth. No real testing. No responsibility. And I genuinely wonder: how are newcomers going to learn in all this noise? Sharing knowledge is good. Teaching is powerful. But posting unverified, half-understood, fabricated success as cybersecurity content just for engagement helps no one - and sometimes even misleads beginners. No one need more “security influencers.” People need more researchers, who share there research how they do, what they learn new, what is really working and what not. Do it in hard way. Stop chasing numbers. You can lie today with posts, threads, and recycled “tips” but one day, all that so-called hard work will be exposed. Because you’re not just fooling others, you’re fooling yourself. Followers don’t equal knowledge. Likes don’t equal skill. In security, sooner or later, someone will look inside your work and realize: there’s nothing there just noise. If you read this far and it resonated, repost it so it reaches the people who need to read it. #BugBounty #Hacking #InfoSec #CyberSec #Cybersecurity
English
8
7
54
3.3K
UDAY 🥷 retweetledi
Vincent
Vincent@vinhacks·
2025 stats: ~200 reports sent 133 paid reports + 18 pending It still feels so surreal, a year ago I barely had 1 paid report. Next year: -Volume < higher payouts -More learning -More collaboration Thank you @Bugcrowd and @yeswehack for the best student job I could ask for!
English
16
4
136
7.1K
UDAY 🥷 retweetledi
Rakesh Pulapa
Rakesh Pulapa@rakesh_pulapa·
📍 Araku, Andhra Pradesh. Unseen side of this amazing place from my recent shoot.
Rakesh Pulapa tweet mediaRakesh Pulapa tweet mediaRakesh Pulapa tweet mediaRakesh Pulapa tweet media
English
30
230
3K
119.7K
UDAY 🥷 retweetledi
blue
blue@bluewmist·
a mistake that cost me 5 years: thinking preparation was progress. reading every book. taking every course. planning every detail. meanwhile, someone dumber than me started badly and figured it out. preparation feels productive but it's often just fear dressed up as strategy. you learn to swim by getting in the water, not by studying water.
English
218
3.1K
23.2K
665.6K
UDAY 🥷 retweetledi
Rakesh Pulapa
Rakesh Pulapa@rakesh_pulapa·
📍Vanajangi, Andhra Pradesh Magical layers never seen before here
Rakesh Pulapa tweet mediaRakesh Pulapa tweet media
English
52
521
7.1K
351.3K
UDAY 🥷 retweetledi
Coffin
Coffin@lostsec_·
The best way to learn something is to do it, and then revise what you learn again and again. Read it at least five times over a few days or a week and you’ll see the results. Think about real life memories. You remember them because you replay them in your mind many times.. The more you think about something, the deeper it gets stored in your memory.
Feelings ღ@anxietymsgs

What's the best way to learn something?

English
4
18
185
9.6K
UDAY 🥷 retweetledi
th3Ripp3r
th3Ripp3r@rajeshsagar777·
@ManasH4rsh Thank you bhai. Apart from bugbounty, i have a full time job and I am an active member of RSS🚩 ( RSS ka 100th yr, have lots of work to do)
English
0
1
4
152
UDAY 🥷 retweetledi
Behi
Behi@Behi_Sec·
I've made $20K+ from SSRF bugs. I've made $20K+ from IDOR bugs. I've made $20K+ from XSS bugs. I've made $20K+ from access control bugs. You just need to be persistent.
English
10
17
304
11.4K
UDAY 🥷 retweetledi
Mohsin Khan
Mohsin Khan@tabaahi_·
What held you back from reaching your bug bounty goals in 2025 and what will you change in your approach in 2026?
English
16
2
73
11.8K