progprnv

35 posts

progprnv

progprnv

@progprnv

Bug bounty hunter /\ Security Researcher

เข้าร่วม Ocak 2021
51 กำลังติดตาม8 ผู้ติดตาม
progprnv
progprnv@progprnv·
Ranked #5 🌍 on Hackerone VDP Q1 2026 Leaderboard. Not a big fan of VDPs... I usually hunt on Bugcrowd for BBP and when I burnout I come to hit on @Hacker0x01 #bugbounty
progprnv tweet media
English
0
0
1
30
progprnv
progprnv@progprnv·
No burpsuite, No proxy intercept Just simple logic flaws.. Rewarded $$$ from @Hacker0x01 Tip: Read documentation for atleast 30 minutes before you give up on your program #hackerone #bugbounty #cybersec
progprnv tweet media
English
0
0
1
59
progprnv
progprnv@progprnv·
iykyk
progprnv tweet media
Suomi
0
0
0
38
progprnv
progprnv@progprnv·
Just some VDP stuffs Testing Time: 5 hours Reported and Resolved within a month. Tip: Read documentation atleast for 30 mins after using Target application. #BugBounty #Cybersecurity
progprnv tweet media
English
0
0
1
54
Om
Om@Om_Codes_·
Twitter is cool. But it’s 100x better when you connect with people who code daily If you’re into tech, AI, DSA, Web development, Web3 or programming, say hi
English
1.3K
61
2.3K
92.4K
progprnv
progprnv@progprnv·
Sensitive information vulnerability checklist 1. Fuzz every stag subdomain 2. target - stag - .com/{Fuzz} 3. If got hit on any path 200 OK 4. Then target - stag - .com/valid_path/{Fuzz} 5. Repeat until you hit a sensitive page or endpoint and check it's src code #BugBounty
English
0
0
0
43
progprnv รีทวีตแล้ว
Coffin
Coffin@lostsec_·
I miss the early Twitter BBP community where people actually shared tips and lessons from their findings. Nowdays my feed is flooded with bounties screenshots, tools and there paid services promos and courses ads. It’s just not the same vibe anymore..
English
35
30
471
17.1K
progprnv
progprnv@progprnv·
While playing with authorize tool try to inject bxss payload along with any cookie paramter 🍪
English
0
0
0
18
progprnv
progprnv@progprnv·
@CyberScanDev It's a self hosted prgm bro, I also got amazed. Weirdest ever. You can also bypass by putting three payloads at the same time. <h1>hel</h1><h1>hel</h1><h1>hel</h1> Since it's a vdp I didn't tried to go in-depth.
English
1
0
1
9
_
_@CyberScanDev·
@progprnv There is no logic😂
English
1
0
0
14
progprnv
progprnv@progprnv·
Weird Htmli bypass Injected: <h1>hello</h1> Reflected as hello<> <> and other tags not allowed when it's closed. Payload crafted: <h<h1>>hello<</h1>/h1> Done. Deep dive into knowing how server behave #bugbounty
English
1
0
1
45
progprnv
progprnv@progprnv·
Finally Automated Blind XSS Testing Toolkit Released🚀 ✅ Link: bit.ly/3GRjZzC
progprnv tweet media
English
0
0
1
58
progprnv
progprnv@progprnv·
Just search "filename:.npmrc _auth" on GitHub for NPM Credentials Leak thank me later :)
English
0
0
0
63