@The_Cyber_Lycan Profile picture

Shubham

@The_Cyber_Lycan

Independent Security Researcher 💚

Similar User
Infoneeds photo

@Infoneeds1

Zodiac photo

@TopsecretArtpc

R3n0v4 photo

@R3n0v41

70rpedo photo

@70rpedo

Rajesh sagar photo

@rajeshsagar777

Gabriel photo

@gabriel05x

Varun photo

@pandeyva

ukuku photo

@0xUkuku

ApinLusen photo

@ApinLusen

four0four photo

@f0ur0four

Boukhlif Moussa 🇩🇿 photo

@BoukhlifMoussa

Romiyo karki photo

@Dr_Tomato1337

T Y photo

@lubabalotywabi

marcello bravo photo

@marcelinobravo3

Sumeet darekar photo

@noobstain_

Pinned

My first P1 severity bug Thanks to @shubzyernale and @sunilyedla2 for their guidance #infosec #bugcrowd

Tweet Image 1

Shubham Reposted

Read “How I bypassed the registration validation and logged-in with the company email“ by Khaledyassen on Medium: infosecwriteups.com/how-i-bypassed…


Shubham Reposted

My step by step process on how I do Bug Bounty Hunting: From finding targets to Submission of the… pwndecoco.medium.com/my-step-by-ste… #bugbounty #bugbountytips #bugbountytip


Shubham Reposted

📚 Bypass 429 (Too Many Requests) ➡️ Adding Null Byte ( %00 ) or CRLF ( %09, %0d, %0a ) at the end of the Email can bypass rate limit. 📄 Request POST /ForgotPass.php HTTP/1.1 Host: target.com ... email=victim@gmail.com%00 #bugbounty #bugbountytips #bugbountytip


Shubham Reposted

🔰 Rate limiting bypass using Headers X-Originating-IP: 127.0.0.1 X-Forwarded-For: 127.0.0.1 X-Remote-IP: 127.0.0.1 X-Remote-Addr: 127.0.0.1 X-Client-IP: 127.0.0.1 X-Host: 127.0.0.1 X-Forwared-Host: 127.0.0.1 # Double X-Forwarded-For header example X-Forwarded-For:…


Shubham Reposted

🚀 ffuf Commands ➡️ Simple Scan ffuf -w /opt/dirsearch/small.txt -u http://10.10.118.46/FUZZ ➡️ Ignoring particular status code ffuf -w /opt/dirsearch/big.txt -u http://10.10.191.30:80/FUZZ -fc 401 ➡️ VHOST Fuzzing ffuf -w…


Shubham Reposted

🪲IDOR hunting by @MDishant34837 ⭐Credit: Dishant Modi 👇Great Medium Article: medium.com/@dsmodi484/fin…


Shubham Reposted

Recently decided to start note-taking on whatever I read - blogs, courses etc. Since everything I read is already public, I don't see any point in keeping those notes to myself. Now that I'm consistent with it, here's where everything will be: shreyaschavhan.notion.site/Bug-Bounty-Not… #bugbounty

Tweet Image 1

Shubham Reposted

👇Wordlists specially for API routes fuzzing wordlists-cdn.assetnote.io/data/automated/

Tweet Image 1

Shubham Reposted

🔥 Filter out noise in Burp Suite 🔥 ➡️ While you are testing with Burp Suite, you may want to add these patterns into the Burp Suite > Proxy > Options > TLS Pass Through settings: .*\.google\.com .*\.gstatic\.com .*\.googleapis\.com .*\.pki\.goog .*\.mozilla\..* 📃 Now all…

Tweet Image 1

Shubham Reposted

Interesting Story of an Account Takeover Vulnerability . Hey all , This is my first blog about account takeover vulnerability. Give it a check . Hope you all like it . #bugbounty #cybersecurity medium.com/@deepanshudev3


Shubham Reposted

Unlocking Admin Privileges: How I Exploited an IDOR Vulnerability medium.com/@cybsersec/unl… #bugbounty #bugbountytips #bugbountytip


Shubham Reposted

🐛 A Tale of 2 Bugs: How I Found Hidden Gems with 20 mins of Recon Blog: muqsitbaig.com/blog/a-tale-of… Follow for more infosec content every day (@mqst_) ♥ #cybersecurity #infosec #bugbountytips

Tweet Image 1
Tweet Image 2
Tweet Image 3

Shubham Reposted

🪲Hunting for Hidden API Endpoints Using Katana and Hakraler Credit: Anas H Hmaidy medium.com/@anasbetis023/…


Shubham Reposted

2nd Series - Dorking in clouds ☁️ x.com/adityashende17…

Dorking Clouds 🌩️ Have you thought of targeting Google Dorking techniques for cloud storage, CDNs, and more. Check out these 👇 Find Invoices site:*.s3.amazonaws.com -www Uber Invoice Breakdown: -Targets Amazon S3 buckets with Uber-related invoice files. -Excludes common…

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4


Loading...

Something went wrong.


Something went wrong.