@OuLrishi Profile picture

RISHi 🇮🇳

@OuLrishi

Joined November 2021
Similar User
MamRezzSr photo

@MamRezzSr

새이 photo

@akeisae

Sadra photo

@MrMSA16

NFF Southern Arizona Chapter photo

@NFFsoArizona

Aman Singh !!🇮🇳!! photo

@hackeriron1

Freddy Calderon photo

@DANGER_TATTS

单纯色 photo

@chooooperr

いすけ ( ̄▽ ̄)/ ❤️ Memecoin (Merlin🔮🧙)$ODY photo

@Kingod22

kirk :) photo

@kirkcobained

gundi Stefan photo

@ademdqtkn1

CryptoKittyMagic photo

@CryptoKityMagic

Coach Winstead photo

@coachwinstead13

Novayork (💙,🧡) photo

@Novayork1234

Massey Latoya.L2.hft(✸,✸) photo

@MasseyLatoya1

dqd photo

@Taogqidt

RISHi 🇮🇳 Reposted

⚡𝗔𝗰𝗰𝗼𝘂𝗻𝘁 𝗧𝗮𝗸𝗲𝗼𝘃𝗲𝗿 (𝗔𝗧𝗢) 𝗕𝘂𝗴 𝗕𝗼𝘂𝗻𝘁𝘆 𝗧𝗶𝗽𝘀 𝗳𝗼𝗿 𝗡𝗲𝘄 𝗕𝘂𝗴 𝗛𝘂𝗻𝘁𝗲𝗿𝘀⚡ 👉Account Takeover (ATO) is a critical security issue where an attacker gains unauthorized access to a user's account. As a new bug hunter, understanding how to identify…


RISHi 🇮🇳 Reposted

#GIVEAWAY Let’s turn your retweets into ₹₹₹! - For every retweet, we’ll add ₹11 to the prize pool. - 50% of the pot goes to ONE lucky retweeter. - The other 50%? Donated to help the poor and needy. Suppose there are 10k retweets: 10k*11 = Rs. 1.1 Lacs 🤯 How to…


RISHi 🇮🇳 Reposted

Happy #KartikaPurnima Everyone! Odisha celebrates its rich maritime history today. The ancient Odisha, known as Kalinga, was a great maritime power from about 7th B.C to 13th Century A.D. ଆ କା ମା ବୈ, ପାନ ଗୁଆ ଥୋଇ, ପାନ ଗୁଆ ତୋର, ମାସକ ଧରମ ମୋର… #OdishaFestivals #KartikPurnima2024

manas_muduli's tweet image. Happy #KartikaPurnima Everyone!

Odisha celebrates its rich maritime history today. The ancient Odisha, known as Kalinga, was a great maritime power from about 7th B.C to 13th Century A.D.

ଆ କା ମା ବୈ, ପାନ ଗୁଆ ଥୋଇ, ପାନ ଗୁଆ ତୋର, ମାସକ ଧରମ ମୋର…

#OdishaFestivals #KartikPurnima2024
manas_muduli's tweet image. Happy #KartikaPurnima Everyone!

Odisha celebrates its rich maritime history today. The ancient Odisha, known as Kalinga, was a great maritime power from about 7th B.C to 13th Century A.D.

ଆ କା ମା ବୈ, ପାନ ଗୁଆ ଥୋଇ, ପାନ ଗୁଆ ତୋର, ମାସକ ଧରମ ମୋର…

#OdishaFestivals #KartikPurnima2024

Ro mat bhai yeah month mai bhi hogya aaja sath mai daru pite

I am officially unemployed. F*CK YEAH. F*CK YOU CORPORATE



Try karlo kya pata 5000 mil jaye

Giving away ₹500 this #ChildrensDay Today we’re that rishtedar asking: "Beta, aage kya karoge?" Socho.. Then, find people who's literally living your dream topmate.click/10-years Rs. 500 rn for EVERY booking Agli bar relative ne pucha to u don't need to hesitate :P



RISHi 🇮🇳 Reposted

Will keep hunting for more OAuth bugs tomorrow. Also many people were asking for the resources I used to learn about OAuth, so here they are: 1. App-Sec Cheat Sheet: 0xn3va.gitbook.io/cheat-sheets/w… 2. Portswigger: portswigger.net/web-security/o… 3. Reports: github.com/reddelexc/hack…


RISHi 🇮🇳 Reposted

Giving away ₹500 this #ChildrensDay Today we’re that rishtedar asking: "Beta, aage kya karoge?" Socho.. Then, find people who's literally living your dream topmate.click/10-years Rs. 500 rn for EVERY booking Agli bar relative ne pucha to u don't need to hesitate :P


RISHi 🇮🇳 Reposted

Hear me out A chrome extension that helps people get better at DSA / Leetcode questions. Doesn't give answers directly, helps you navigate the problem, gives hints when asked, and so on. Solidifies your understanding of patterns. There's your product idea.

I personally find GPT the best way to do LC questions. Okay so hear me out , when I was a total beginner I used to see a question, think about it for 5 min then used to proceed straight to yt video solution. But I made it a point to revisit questions and I didn’t remember shit.



RISHi 🇮🇳 Reposted

On 10th April I had reported 6 admin panel access on different programs. By using @osintleak it was an easy find tbh 🙌 Admin panel tips: 1: leaked creds via osintleak.com 2: auth bypasses. 3: by analyzing js files for creds and secrets. #BugHunting #adminpanel 1/*

by6153's tweet image. On 10th April I had reported 6 admin panel access on different programs. By using @osintleak it was an easy find tbh 🙌
Admin panel tips:
1: leaked creds via <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/echor37XqF">osintleak.com</a>
2: auth bypasses.
3: by analyzing js files for creds and secrets.
#BugHunting #adminpanel
1/*

RISHi 🇮🇳 Reposted

I will gift a latest M4 Mac Mini to one person who repost this. I am doing this to promote MoAIjobs.com, a job board to find jobs in AI. ⏱️Deadline: 7th november, 2024. Let's go. 🔥🚀

NithurM's tweet image. I will gift a latest M4 Mac Mini to one person who repost this.

I am doing this to promote <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/1nfxuy4Qu1">MoAIjobs.com</a>, a job board to find jobs in AI.

⏱️Deadline: 7th november, 2024.

Let's go. 🔥🚀

RISHi 🇮🇳 Reposted

Scenario: 1. Two admin accounts: account 1 and account 2 2. Account 2 invites itself as admin with the same email, gets an invite link 3. Account 1 removes account 2 from the organization 4. Account 2 uses the old invite link to rejoin Is this a far-fetched scenario or a bug???


RISHi 🇮🇳 Reposted

Time for a 4 digit Bounty? Here is a list of writeups for Common Misconfiguration that made me $$$$ bounty!!!! You have to check out #8 - it's amazing!


RISHi 🇮🇳 Reposted

OAuth endpoint OpenRedirect via redirect_uri parameter 👇Dork to find H1 reports site:hackerone.com inurl:reports "Open Redirect" "redirect_uri"

KonwarAbhi98099's tweet image. OAuth endpoint OpenRedirect via redirect_uri parameter

👇Dork to find H1 reports
site:<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/deovwb49Dq">hackerone.com</a> inurl:reports "Open Redirect" "redirect_uri"

RISHi 🇮🇳 Reposted

JWT Authentication Bypass leads to Admin Control Panel Credit: hohky medium.com/@hohky_/jwt-au…


RISHi 🇮🇳 Reposted

✨Google Intern 2025 Interview Process✨ 1. Resume Submission 2. Online Assessment 3. Technical Round 1 4. Technical Round 2 Verdict : Rejected 🥲


RISHi 🇮🇳 Reposted

How I Took Over All Mail Operations Of A Client A thread. 🪡🧵 #bugbounty #infosec #javascript 1/n

kuldeepdotexe's tweet image. How I Took Over All Mail Operations Of A Client

A thread. 🪡🧵

#bugbounty #infosec #javascript

1/n

Loading...

Something went wrong.


Something went wrong.