ikajakam

10K posts

ikajakam banner
ikajakam

ikajakam

@mechanisedbeat

Indian 🇮🇳 VAPT | GRC | ISO 27001 Lead Implementer

Katılım Mayıs 2009
976 Takip Edilen339 Takipçiler
Sabitlenmiş Tweet
ikajakam
ikajakam@mechanisedbeat·
#XSS Checklist Recon • Map inputs (params, headers, cookies, APIs) • Map reflections & contexts • Identify JS frameworks + sinks • Review client JS (sources → sinks) • Check CSP & security headers • Identify sanitizers (DOMPurify, server-side)
English
2
10
72
3.1K
ikajakam
ikajakam@mechanisedbeat·
@HackzYash Program sent you money as crypto on binance? Un connected dots
English
0
0
0
515
Yash___HackZ
Yash___HackZ@HackzYash·
Got $4,300 bounty from 2 programs 💰 Not a single bug — just connecting dots. Using GhostJS (TrinetLayer) for recon: Found → AWS secrets in JS → Hidden APIs Then: •LFI •IDOR (invoice & profile) •PII exposed Small issues → big impact. #BugBounty #CyberSecurity #
Yash___HackZ tweet mediaYash___HackZ tweet media
English
10
19
306
13.3K
ikajakam
ikajakam@mechanisedbeat·
#XSS Checklist Recon • Map inputs (params, headers, cookies, APIs) • Map reflections & contexts • Identify JS frameworks + sinks • Review client JS (sources → sinks) • Check CSP & security headers • Identify sanitizers (DOMPurify, server-side)
English
2
10
72
3.1K
Het Mehta
Het Mehta@hetmehtaa·
You spend hours on Reddit 'cybersecurity roadmap'. I break into systems daily. Free 1:1 call: Pentesting paths, VAPT tips, LinkedIn fixes. Comment "Roadmap" to receive the how to get started.
English
34
0
67
6.5K
Het Mehta
Het Mehta@hetmehtaa·
Say hi and I’ll recommend a security research topic that perfectly fits your profile.
English
85
2
37
7.9K
ikajakam
ikajakam@mechanisedbeat·
@Behi_Sec Also if you are using caido make workflow to highlight statechange request and juice for idor
English
0
0
0
97
Behi
Behi@Behi_Sec·
How to automate bug bounty tasks: - Pick a target. - Use your methodology and write down every action you take. - Once you are finished, check the list and ask yourself which actions you repeated multiple times. - Use AI to write mini-scripts to automate those specific actions. Thank me later.
English
9
14
194
10.3K
Suyash Sharma
Suyash Sharma@SuyashS91823422·
This is crazy 🔥 Used Arjun tool to find hidden paramater #bugbounty
Suyash Sharma tweet media
English
7
24
288
14.9K
ikajakam
ikajakam@mechanisedbeat·
Loving @CaidoIO workflows Active workflow lets reply same request as ACCOUNT B ON DEMAND (with stored variable token). Testing Cross Tenant IDOR gets super easy. also logs helps with confirming workflow works as desired #bugbounty #idor #accesscontrol #caido #js
ikajakam tweet mediaikajakam tweet media
English
0
0
4
129
bugcrowd
bugcrowd@Bugcrowd·
Words that haunt every bug hunter:
bugcrowd tweet media
English
6
6
85
3.9K
ikajakam retweetledi
Het Mehta
Het Mehta@hetmehtaa·
CVE-2025-55182 Advanced Scanner v2.0.0 now supports proxy and file input option for mass-scanning.
Het Mehta tweet media
English
7
23
175
13.1K
ikajakam retweetledi
YS
YS@YShahinzadeh·
How I reverse-engineered an Android app, bypassed custom encryption layer, achieved server-side RCE, and earned a $5000 bounty. read the full story here (TLDR; but worth reading) blog.voorivex.team/from-an-androi…
YS tweet media
English
23
211
1.1K
115.8K
ikajakam retweetledi
Abhishek Meena 🏵️
API Pentesting Series — Part 8 is LIVE! If you can’t discover APIs, you can’t hack them. Simple as that. In this chapter, I broke down: 🔸 Passive Recon → GHDB, CT logs, GitHub 🔸 Active Recon → DevTools, JS mining, mobile app analysis 🔸 Swagger/OpenAPI hunting 🔸 Kiterunner + API wordlists 🔸 Discovering hidden versions (v1, v2, internal) 🔸 Mapping & validating endpoints the right way 🔸 Tools, labs, notes, and modern workflows Most API bugs don’t hide inside the endpoints you see. They hide in the ones you weren’t meant to find. This chapter teaches you exactly how to find them. If you want: ✓ More targets ✓ More bugs ✓ Higher severity ✓ Better methodology Then Part 8 will change how you hunt APIs. 🔥 Read the full notes here: aacle.notion.site/API-Pentesting…
Abhishek Meena 🏵️ tweet media
English
2
65
314
16.1K
ikajakam retweetledi
Abhishek Meena 🏵️
Stop looking for id=1. Start looking for the logic flaws scanners miss. 🛑 Basic IDORs are dying. Modern apps use GUIDs (550e8400-e29b...) to hide data. But obscurity isn't security. Here is the blueprint for finding Advanced Broken Access Control in 2025. 🧵👇 #bugbountytips #infosec
English
4
21
171
14.7K