@Midhunryann Profile picture

.

@Midhunryann

1.Bug hunter 2.Traveller 3. Google, Apple, Microsoft, zoho 50+ hall of fames https://t.co/JApATvMpww Engineer

Similar User
Pratik Yadav photo

@pratikyadav7_

Armaan Pathan photo

@armaancrockroax

pwnmachine photo

@princechaddha

Wh11teW0lf photo

@Wh11teW0lf

Walid Hossain photo

@walidhossain010

Dani | Vulnerable 💔❤️‍🩹 photo

@my_r3in3

Mauricio photo

@FirewallFiasco

@v!b$123! photo

@vibs123i

Kishan Kumar (n00biel3_b0y) photo

@hst_kishan

Chavda Zeel photo

@ChavdaZeel

TariKul IsLam photo

@sa1tama0

Yusuf Aydın photo

@h1_yusuf

Deepak Holani photo

@w_hat_boy

Gaurav Narwani photo

@gauravnarwani97

M. Qasim Munir photo

@Savitar0x01

. Reposted

🚀 IDOR

Tweet Image 1
Tweet Image 2
Tweet Image 3

. Reposted

You can now probe for password-reset hijacking via DNS poisoning directly in Burp Suite, using the DNS Analyzer extension from @sec_consult! Can't wait to try this out. sec-consult.com/blog/detail/dn…


. Reposted

In the spirit of excessive automation, I've added AI-assisted summaries for every nomination for the Top 10 web hacking techniques of 2023. Take a look and let me know what you think - helpful or pointless? portswigger.net/research/top-1…


. Reposted

HackerOne disclosed a bug submitted by @0xacb: hackerone.com/reports/2101076 #hackerone #bugbounty

Tweet Image 1

. Reposted

If you're looking for long term bug bounty tips, @JonathanBouman is your man. He's been hacking Amazon (almost exclusively) for more than 6 years! Here's how he stays productive:

Tweet Image 1

. Reposted

“Command Injection by Uploading Image” by Siva Sankar medium.com/@Cyber_siva/co…

Tweet Image 1

. Reposted

python-multipart (which is also used by FastAPI and Starlette in form requests) is vulnerable to ReDos: github.com/Kludex/python-… 1. Find requests that use `application/x-www-form-urlencoded` as a Content-type (basically many form requests) or if you're code reviewing, you may…


Yay, I was awarded a $500 bounty on @Hacker0x01! hackerone.com #TogetherWeHitHarder


. Reposted

Bypass Url Parser by @TheLaluka Checking the source, I can confirm many of these methods have worked for me in the past. Including a string of auth bypasses for $30k on a bounty platform. Excited to test tool instead of doing it all manually 🤩 github.com/laluka/bypass-…


. Reposted

A lucky #XSS payload to #bypass a #whitelist. 1'"<S><A HRef=tel:/*%26apos;;/*%26quot;;/*%26lt;s%26gt;%26lt;Img/Src/*/O%26%2378;Error=alert(1)//%26gt; Title=tel:/*%26apos;;/*%26quot;;/*%26lt;s%26gt;%26lt;Img/Src/*/O%26%2378;Error=alert(1)//%26gt;> Ref: brutelogic.com.br/blog/bypassing…


. Reposted

Here's a quick hack to easily find SSRF vulnerabilities! 🤑 Open your proxy interceptor and set the following match & replace rule! This will replace any URL in your incoming requests with your canary token! 👇

Tweet Image 1

. Reposted

After a really long time only focused on manual web security stuff, almost everything has started to feel like a QA checklist. There are definitely people doing novel research and dropping crazy bugs, but I think a lot of the big stepping stones require people to build really…


. Reposted

Thought I'd share this remote code execution on one of the main sites for a large H1 target from a year ago. I found this one by being persistent and using Param Miner by @albinowax . After Param Miner discovered the header it was all manual testing to detect the template engine…

Tweet Image 1

. Reposted

The year is 2016. I was in my bedroom, staring at the screen. “ZERODIUM Payouts for Mobiles” One zero, two zero, three zero… wtf! The reward could be up to one million US dollars? That’s a one bedroom apartment in Hong Kong, whatever this RCE is, I’m going to learn…


. Reposted

You can find slides of my @bsidesahmedabad talk from here: docs.google.com/presentation/d… I hope you will like it feel free to dm if you have any questions.


. Reposted

Just created a repo for slides from BSides Ahmedabad 2024! 🚀🎉 ( @bsidesahmedabad ) Explore it here: github.com/thecyberneh/BS… If you have any slides to share, feel free to send a PR! #BugBounty


. Reposted

Let's gooooo, my write up is ready English writeup on medium: ro0od.medium.com/from-simple-re… Arabic video in YT channel: youtu.be/lcfwvb1-GLM #bugbountytips #BugBounty


. Reposted

By popular request: cspbypass.com is now completely open source: github.com/renniepak/CSPB… I also added a small feature that lets you link specific searches, for example: cspbypass.com/#paypal


. Reposted

Upgrade your SSRF, CORS & Open Redirect testing with our new URL Validation Bypass cheat sheet, containing all known techniques! portswigger.net/web-security/s…


Loading...

Something went wrong.


Something went wrong.