ѕнαяαт кαιкσℓαмтнυяυтнιℓ 🇮🇳

541 posts

ѕнαяαт кαιкσℓαмтнυяυтнιℓ 🇮🇳 banner
ѕнαяαт кαιкσℓαмтнυяυтнιℓ 🇮🇳

ѕнαяαт кαιкσℓαмтнυяυтнιℓ 🇮🇳

@sharp488

https://t.co/sfzZkMe9r4 Vai, amico, libero da fardelli e paure ☘️☘️☘️ ETHiCaL HaCKeR 🕵🏻‍♂️ BuG BouNtY HuNTeR🐞 GaMeR 🎮 PuN LoVeR 👻

Nerul, Navi Mumbai Katılım Mayıs 2013
315 Takip Edilen337 Takipçiler
Sabitlenmiş Tweet
ѕнαяαт кαιкσℓαмтнυяυтнιℓ 🇮🇳
🐞 𝘉𝘶𝘨 𝘉𝘰𝘶𝘯𝘵𝘺 𝘛𝘪𝘱 : 𝘚𝘱𝘦𝘦𝘥 𝘶𝘱 𝘵𝘦𝘴𝘵𝘪𝘯𝘨 𝘧𝘰𝘳 𝘙𝘉𝘈𝘊 𝘣𝘶𝘨𝘴 𝘰𝘯 𝘩𝘶𝘨𝘦 𝘢𝘱𝘱𝘭𝘪𝘤𝘢𝘵𝘪𝘰𝘯𝘴 𝘵𝘩𝘢𝘵 𝘤𝘰𝘯𝘵𝘢𝘪𝘯 𝘮𝘶𝘭𝘵𝘪𝘱𝘭𝘦 𝘳𝘰𝘭𝘦𝘴 𝘸𝘪𝘵𝘩 𝘵𝘩𝘦 𝘩𝘦𝘭𝘱 𝘰𝘧 𝘉𝘶𝘳𝘱 𝘚𝘶𝘪𝘵𝘦'𝘴 𝘖𝘳𝘨𝘢𝘯𝘪𝘻𝘦𝘳 t𝘢𝘣. 👇
English
4
15
108
15.5K
ѕнαяαт кαιкσℓαмтнυяυтнιℓ 🇮🇳 retweetledi
Bug Bounty Center
Bug Bounty Center@BugBountyCenter·
WAF Bypass Cheat Sheet Cloudflare, Akamai, AWS WAF, ModSecurity, Imperva, F5 BIG-IP, Sucuri, Wordfence, Azure WAF, FortiWeb, Barracuda Detection tips + XSS, SQLi, RCE, SSRF and Path Traversal bypasses for each one Full database with 150+ payloads inside Bug Bounty Center → bugbountycenter.com Try it free for 30 days #BugBounty #BugBountyTips #WAF #WebSec #AppSec #Cybersecurity
Bug Bounty Center tweet media
English
3
139
558
31.4K
ѕнαяαт кαιкσℓαмтнυяυтнιℓ 🇮🇳 retweetledi
bugcrowd
bugcrowd@Bugcrowd·
Manual recon doesn’t scale, especially for hidden URLs. This one-liner surfaces endpoints you didn’t know existed. 👇
bugcrowd tweet media
English
1
43
266
10.6K
ѕнαяαт кαιкσℓαмтнυяυтнιℓ 🇮🇳 retweetledi
Suresh Aydi (xploiterr)
Suresh Aydi (xploiterr)@_xploiterr·
Got the first bounty for 2026 where I make AI editor to execute the XSS which in turn lead to full access by elevating the privileges. #BugBounty @Hacker0x01
Suresh Aydi (xploiterr) tweet media
English
4
3
80
3.8K
ѕнαяαт кαιкσℓαмтнυяυтнιℓ 🇮🇳 retweetledi
Jenish Sojitra
Jenish Sojitra@_jensec·
Sharing my Burp Extension that earned me $200k in 2025 while API testing heavy JS-rich targets. github.com/jenish-sojitra… The tool helps find endpoints, files, internal emails, and some secrets from minified JS. Its goal is to achieve maximum efficiency with reduced noise in results. Contributions and feedbacks are welcome.
Jenish Sojitra tweet media
English
39
410
2.3K
126.4K
ѕнαяαт кαιкσℓαмтнυяυтнιℓ 🇮🇳 retweetledi
Intigriti
Intigriti@intigriti·
Most JWT vulnerabilities go unnoticed as they're notoriously tricky to test for 😬 Yet, when present, they can allow for account takeovers, SQL injections and in-app privilege escalations 🤠 In our latest article, we break down every common JWT attack vector with practical exploitation techniques to help you find more JWT vulnerabilities. Read the article today! 👇 intigriti.com/researchers/bl…
Intigriti tweet media
English
2
42
209
12K
ѕнαяαт кαιкσℓαмтнυяυтнιℓ 🇮🇳 retweetledi
𝕏 Bug Bounty Writeups 𝕏
𝕏 Bug Bounty Writeups 𝕏@bountywriteups·
JShunter JShunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying sensitive data, such as API endpoints and potential security vulnerabilities, making it an essential resource for developers, bug bounty and security researchers. github.com/cc1a2b/JShunter
𝕏 Bug Bounty Writeups 𝕏 tweet media
English
3
131
667
31.7K
ѕнαяαт кαιкσℓαмтнυяυтнιℓ 🇮🇳 retweetledi
Aditi Singh
Aditi Singh@aditi_singghh·
When we decompile an APK and see an unreadable index.android.bundle, it could be Hermes bytecode. Using github.com/P1sec/hermes-d… we can make it readable and look for interesting endpoints, keys, or app flows. #bugbounty
English
7
66
399
25.1K
bugcrowd
bugcrowd@Bugcrowd·
How are you using AI for bug hunting?
English
36
16
200
49.1K
ѕнαяαт кαιкσℓαмтнυяυтнιℓ 🇮🇳 retweetledi
Intigriti
Intigriti@intigriti·
Woa, this #BugBountyTip from @hakluke works surprisingly well! Someone please automate this 🙏 #BugBountyTips
Intigriti tweet media
English
11
208
764
0
ѕнαяαт кαιкσℓαмтнυяυтнιℓ 🇮🇳
1000$ 𝘣𝘶𝘨 𝘣𝘰𝘶𝘯𝘵𝘺 2𝘍𝘈 𝘣𝘺𝘱𝘢𝘴𝘴 𝘷𝘪𝘢 𝘉𝘢𝘴𝘪𝘤 𝘈𝘶𝘵𝘩𝘦𝘯𝘵𝘪𝘤𝘢𝘵𝘪𝘰𝘯 𝘞𝘳𝘪𝘵𝘦-𝘶𝘱 𝘭𝘪𝘯𝘬: @sharp488/2fa-bypass-via-basic-authentication-on-private-bug-bounty-program-93bb457cd065" target="_blank" rel="nofollow noopener">medium.com/@sharp488/2fa-… 𝘝𝘪𝘥𝘦𝘰 𝘗𝘖𝘊 𝘭𝘪𝘯𝘬: youtu.be/ZDEUmR0FEsg?fe…
YouTube video
YouTube
English
0
10
90
7.1K
ѕнαяαт кαιкσℓαмтнυяυтнιℓ 🇮🇳
1000$ 𝘉𝘶𝘨 𝘉𝘰𝘶𝘯𝘵𝘺 2𝘍𝘈 𝘣𝘺𝘱𝘢𝘴𝘴 𝘥𝘶𝘦 𝘵𝘰 𝘊𝘚𝘙𝘍 𝘮𝘪𝘴𝘤𝘰𝘯𝘧𝘪𝘨𝘶𝘳𝘢𝘵𝘪𝘰𝘯 𝘞𝘳𝘪𝘵𝘦-𝘶𝘱 𝘭𝘪𝘯𝘬: @sharp488/2fa-bypass-on-private-bug-bounty-program-due-to-csrf-token-misconfiguration-5a9c82151a1" target="_blank" rel="nofollow noopener">medium.com/@sharp488/2fa-… 𝘝𝘪𝘥𝘦𝘰 𝘗𝘖𝘊 𝘭𝘪𝘯𝘬: youtube.com/watch?v=NJyN7Y…
YouTube video
YouTube
English
0
18
100
7.7K
ѕнαяαт кαιкσℓαмтнυяυтнιℓ 🇮🇳
🐞 𝘉𝘶𝘨 𝘉𝘰𝘶𝘯𝘵𝘺 𝘛𝘪𝘱 : 𝘈𝘭𝘸𝘢𝘺𝘴 𝘳𝘦𝘷𝘪𝘴𝘪𝘵 𝘺𝘰𝘶𝘳 𝘰𝘸𝘯 𝘳𝘦𝘴𝘰𝘭𝘷𝘦𝘥 𝘳𝘦𝘱𝘰𝘳𝘵𝘴 𝘵𝘰 𝘧𝘪𝘯𝘥 𝘱𝘰𝘵𝘦𝘯𝘵𝘪𝘢𝘭 𝘣𝘺𝘱𝘢𝘴𝘴𝘦𝘴. 𝘛𝘩𝘪𝘴 𝘤𝘰𝘶𝘭𝘥 𝘧𝘦𝘵𝘤𝘩 𝘺𝘰𝘶 𝘴𝘰𝘮𝘦 𝘦𝘢𝘴𝘺 𝘣𝘰𝘶𝘯𝘵𝘪𝘦𝘴. 😃
English
1
0
5
444
ѕнαяαт кαιкσℓαмтнυяυтнιℓ 🇮🇳 retweetledi
Intigriti
Intigriti@intigriti·
Do you want to find more vulnerabilities with recon? 🤑 Open this thread (step-by-step guide)! 🧵 👇
Intigriti tweet media
English
6
135
674
51.4K
ѕнαяαт кαιкσℓαмтнυяυтнιℓ 🇮🇳 retweetledi
Godfather Orwa 🇯🇴
Godfather Orwa 🇯🇴@GodfatherOrwa·
@Bugcrowd Sometimes this noises led for P1s such as some calls happening to 3rd party’s , secrets / tokens in js files on other domains affect directly on the scope target as well
English
5
3
99
3.3K