Kabeer 🇮🇳
@kab33rrrEnterprise Security @zoom 💼 // Bug Bounty Hunter 🪲 // CoD & CSGO 🎮 // Anime🎥
Similar User
@basu_banakar
@0xNaeem
@zapstiko
@nihad_rekany
@GhimireVeshraj
@HolyBugx
@0x_Akoko
@0xJin
@3ncryptSaan
@mamunwhh
@Virdoex_hunter
@leo__rac
@AnubhavSingh_
@imranHudaA
@re_and_more
People who weren't smarter than you in college but are now doing well in life, not due to luck, but because they have mastered the art of solving difficult problems.
Files Containing Juicy Info inurl:"/.vscode/sftp.json" #bugbounty #bugbountytips #bugbountytip #cybersecurity #ethicalhacking
Thankful for the opportunity ! Excited to attend #bluehatindia May 2024 @MSFTBlueHat #bluehat #microsoft
Successfully bypassed a SSRF WAF by using a combination of IPV6 + Unicode. Payload for Metadata instances: http://[::ⓕⓕⓕⓕ:①⑥⑨。②⑤④。⑯⑨。②⑤④]:80 Check images for response difference between 169.254.169.254 and the above payload I shared 🔥 #bugbounty #infosec #waf
Bug bounty programs are one of the best ways to reward responsible security researchers for helping us better secure our customers. - Stephen Schmidt, Chief Security Officer, Amazon
500$ bounty When you invite users to your product, sometime it can carry hidden fields with the invite request it'll be a good opportunity to check for blind & stored XSS. #bugbountytips #bugbounty
OWASP LLM Top Ten v.1: 🚀 Prompt Injections 💧 Data Leakage 🏖️ Inadequate Sandboxing 📜 Unauthorized Code Execution 🌐 SSRF Vulnerabilities ⚖️ Overreliance on LLM-generated Content 🧭 Inadequate AI Alignment 🚫 Insufficient Access Controls ⚠️ Improper Error Handling 💀 Training…
सदा शिव सर्वदा शिव हर हर महादेव || Proud Indian🇮🇳 Proud Sanatani 🕉️
When you are hunting for blind XSS. Go to forget password and add admin@company .com and add your blind XSS payload on the header. Easy way and it will logged on admin log, if he checked his account you will exploit his account. #bugbountytips
Identified a XSS bug in your target? Don’t be too quick to report it for a Medium bounty. Read this post completely to learn how XSS is escalated to an ATO for much higher bounties 💸 1️⃣ Exploiting Session ID Leakage: XSS can be escalated to Account Takeover by exploiting…
curation of all(most) immunefi bug bounty writeups I could find(till now) github.com/sayan011/Immun…
#bugbountytips #bugbounty #cybersecurity #Pentesting #Hacking #bugcrowd #Hackerone #IDOR #XSS #SQLI Craft CMS Remote Code Execution Craft CMS is a flexible and user-friendly content management Affected Versions CMS version 4.0.0-RC1 through 4.4.14 EXPLOIT in Requset…
United States Trends
- 1. Giants 48,4 B posts
- 2. Jets 37,4 B posts
- 3. Eagles 69,5 B posts
- 4. Panthers 27,3 B posts
- 5. Falcons 22,3 B posts
- 6. Bryce Young 10,1 B posts
- 7. Dolphins 16,9 B posts
- 8. Browns 27,7 B posts
- 9. Sam Darnold 8.779 posts
- 10. #Skol 11,9 B posts
- 11. Vandy 20,9 B posts
- 12. Kirk Cousins 9.385 posts
- 13. Jalen 17,9 B posts
- 14. Vikings 53,4 B posts
- 15. Kadarius Toney 2.033 posts
- 16. Penix 5.510 posts
- 17. Saints 25,9 B posts
- 18. Legette 6.031 posts
- 19. #HereWeGo 9.894 posts
- 20. Derek Carr 2.050 posts
Who to follow
-
Basavaraj Banakar🇮🇳
@basu_banakar -
Naeem Ahmed Sayed 🇧🇩
@0xNaeem -
𝐑𝐀𝐢𝐡𝐚𝐧 ✪
@zapstiko -
Nihad
@nihad_rekany -
Veshraj Ghimire🇳🇵
@GhimireVeshraj -
HolyBugx
@HolyBugx -
Roberto Nunes
@0x_Akoko -
0xJin
@0xJin -
Shakti Ranjan Mohanty || 🇮🇳 ||
@3ncryptSaan -
khan mamun
@mamunwhh -
Deepak Dhiman🇮🇳
@Virdoex_hunter -
Leo Rac
@leo__rac -
Anubhav Singh🇮🇳
@AnubhavSingh_ -
Imran Huda(Ahhad)
@imranHudaA -
Reverse Engineering and More
@re_and_more
Something went wrong.
Something went wrong.