Vishal Vishwakarma

934 posts

Vishal Vishwakarma banner
Vishal Vishwakarma

Vishal Vishwakarma

@rootxvishal

Security Analyst | eJPT | VAPT | Bug Hunter | Secured Google, NASA , BBC, Lenskart & 300+ Companies | 8xCVE

Katılım Ocak 2020
201 Takip Edilen1K Takipçiler
Sabitlenmiş Tweet
Vishal Vishwakarma
Vishal Vishwakarma@rootxvishal·
Here are 27 ways to learn ethical hacking for free: Credit: @danielmakelley Thread 🧵 ⬇ #infosec #bugbountytips #ctf #hacking 1. Root Me — Challenges. 2. Stök's YouTube — Videos. 3. Hacker101 Videos — Videos. 4. InsiderPhD YouTube — Videos. 5. EchoCTF — Interactive Learning
English
6
11
38
4.4K
Vishal Vishwakarma
Vishal Vishwakarma@rootxvishal·
Day 5 / 30 — JAVASCRIPT FILE ANALYSIS JS files leak endpoints, API keys, internal infra. Read them. Don't just scan. Tools: → subjs — github.com/lc/subjs →getJS — github.com/003random/getJS → LinkFinder — github.com/GerbenJavado/L… → JSluice — github.com/BishopFox/jslu… → SecretFinder — github.com/m4ll0k/SecretF… → trufflehog — github.com/trufflesecurit… Read the comments. Devs leave goldmines. #bugbountytips #javascript #bugbounty #infosec #cybersecurity
Vishal Vishwakarma tweet media
English
0
13
83
2K
Vishal Vishwakarma
Vishal Vishwakarma@rootxvishal·
Bug Bounty Tip 🎯 - WordPress /wp-json/wp/v2/users/ Still Works in 2026 WordPress user enumeration via REST API is old. It still works everywhere. curl target.com/wp-json/wp/v2/… Got: name, slug (= login username), user ID, profile URL Then the chain: Username known → /wp-login.php?action=lostpassword → host header injection in reset email → ATO Add it to your checklist. It takes 2 seconds and the slug is usually the WP login. #bugbountytips #cybersecurity #wordpress #recon
English
0
20
155
5.5K
Vishal Vishwakarma
Vishal Vishwakarma@rootxvishal·
Day 4 / 30 — PARAMETER DISCOVERY ARSENAL Hidden params = hidden bugs. Skip this step and you skip half the attack surface. Tools: → ParamSpider— github.com/devanshbatham/… → Arjun (@s0md3v) — github.com/s0md3v/Arjun → x8 — github.com/Sh1Yo/x8 → Param Miner — Burp BApp store → gf(@TomNomNom) — github.com/tomnomnom/gf gf patterns repo: github.com/1ndianl33t/Gf-… #bugbountytips #recon #paramspider #infosec #cybersecurity
Vishal Vishwakarma tweet media
English
0
10
95
2.9K
Vishal Vishwakarma
Vishal Vishwakarma@rootxvishal·
Bug Bounty Tip 🎯 - Commented-Out Registration = Hidden Attack Surface Always read the login page HTML source before moving on. Found this in a company's login page: The link was commented out. The endpoint was still live. The registration form had a role dropdown: Admin, Champion, Lead Coordinator. Any stranger could register as Admin. No invite. No restriction. No check. Hidden != Deleted. #bugbounty #bugbountytips #infosec
English
1
5
66
2.1K
Vishal Vishwakarma
Vishal Vishwakarma@rootxvishal·
Day 3 / 30 — URL & ENDPOINT COLLECTION Got alive subs? Now collect every URL ever associated with them. This is where the gold is. Tools: → waybackurls (@TomNomNom) — github.com/tomnomnom/wayb… → gau — github.com/lc/gau → katana — github.com/projectdiscove… → hakrawler (@hakluke) — github.com/hakluke/hakraw… → gospider — github.com/jaeles-project… → paramspider — github.com/devanshbatham/… #bugbountytips #recon #infosec #cybersecurity
Vishal Vishwakarma tweet media
English
0
9
58
1.9K
Vishal Vishwakarma
Vishal Vishwakarma@rootxvishal·
Day 2 / 30 — LIVE HOST PROBING WITH HTTPX Once you have subs, find what's alive. httpx is the standard. The flags matter. Tool: github.com/projectdiscove… Flags that earn bounties: → -mc 200,301,302,401,403 — match codes → -tech-detect — fingerprint the stack → -title — page titles surface dev/admin pages → -sc -cl — status code + content length → -favicon — favicon hash (use with Shodan) → -screenshot — visual recon → -threads 200 — speed #bugbountytips #recon #infosec
Vishal Vishwakarma tweet media
English
1
4
61
2.6K
Vishal Vishwakarma
Vishal Vishwakarma@rootxvishal·
🔥 Ultimate IDOR Testing Checklist 🔥 📌 mrdesoky0.notion.site/Ultimate-IDOR-… IDOR is still one of the most impactful bugs in bug bounty. Many critical findings start by simply changing an ID in a request. 💡 This checklist covers: ✔️ ID & UUID manipulation ✔️ API & version bypasses ✔️ Multi-account testing ✔️ GraphQL & WebSocket ✔️ Race conditions & batch abuse ✔️ Mobile, gRPC & blind IDOR If you want high-impact bugs, don’t skip this. 🚀 #bugbountytips #bugbounty #infosec #cybersec
English
2
51
230
8.4K
Vishal Vishwakarma
Vishal Vishwakarma@rootxvishal·
Day 1 / 30 — SUBDOMAIN ENUMERATION STACK Don't rely on one tool. Stack them. The bug lives in the sub only one tool found. Tools: → subfinder — github.com/projectdiscove… → amass — github.com/owasp-amass/am… → assetfinder — github.com/tomnomnom/asse… → findomain — github.com/findomain/find… → chaos — github.com/projectdiscove… → github-subdomains — github.com/gwen001/github… → shuffledns — github.com/projectdiscove… #bugbountytips #recon #infosec
Vishal Vishwakarma tweet media
English
1
24
172
6.8K
Vishal Vishwakarma
Vishal Vishwakarma@rootxvishal·
WAF Bypass with Comment Injection - Bug Bounty Tip 🎯 When SQL injection is blocked by a WAF, try comment-based keyword splitting. UNION SELECT → blocked UNION/**/SELECT/**/NULL-- → 200 ✅ The WAF pattern often matches keywords separated by spaces. Injecting comments breaks the pattern without affecting SQL parsing. Test payloads: AND/**/1=1-- OR/**/1=2-- UNION/**/ALL/**/SELECT Useful as a stepping stone before identifying a truly injectable endpoint. #bugbountytips #bugbounty #infosec #cybersecurity
English
2
6
84
2.6K
Vishal Vishwakarma
Vishal Vishwakarma@rootxvishal·
I’ve learned a lot from this community over the years. Now it’s time to give back. For the next 30 days, I’ll be sharing one bug bounty tip every day — real recon stacks, payload lists, Burp tricks, resources, and tools I actually use. Day 1 starts tomorrow. Follow along if you want to level up 🚀 #bugbountytips #bugbounty #infosec #cybersecurity
English
6
10
286
9.3K
Altered Security
Altered Security@AlteredSecurity·
Another exciting giveaway for our community as part of the Month of Azure Red Teaming 2026. We’re giving you a chance to win FREE access to our Azure Red Team courses: • CARTP® (Beginner) • CARTE® (Advanced) If you’ve been looking to build real-world Azure Red Teaming skills through hands-on labs and practical attack paths, this is your opportunity. How to participate: • Like and follow us • Comment which course you’re interested in and why • Repost this post We will announce the random winners on April 25, 2026. Don’t miss this exclusive Month of Azure Red Teaming offer: Flat 20% OFF on our Azure Red Team courses Use code: MOART20 Valid till May 5, 2026 Explore now: alteredsecurity.com/azure-red-team… #Azure #RedTeaming #CloudSecurity #CyberSecurity #AzureSecurity #Giveaway #AlteredSecurity
Altered Security tweet media
English
138
118
172
10.9K