@kab33rrr Profile picture

Kabeer 🇮🇳

@kab33rrr

Enterprise Security @zoom 💼 // Bug Bounty Hunter 🪲 // CoD & CSGO 🎮 // Anime🎥

Joined November 2011
Similar User
Basavaraj Banakar🇮🇳 photo

@basu_banakar

Naeem Ahmed Sayed 🇧🇩 photo

@0xNaeem

𝐑𝐀𝐢𝐡𝐚𝐧 ✪ photo

@zapstiko

Nihad photo

@nihad_rekany

Veshraj Ghimire🇳🇵 photo

@GhimireVeshraj

HolyBugx photo

@HolyBugx

Roberto Nunes photo

@0x_Akoko

0xJin photo

@0xJin

Shakti Ranjan Mohanty || 🇮🇳 || photo

@3ncryptSaan

khan mamun photo

@mamunwhh

Deepak Dhiman🇮🇳 photo

@Virdoex_hunter

Leo Rac photo

@leo__rac

Anubhav Singh🇮🇳 photo

@AnubhavSingh_

Imran Huda(Ahhad) photo

@imranHudaA

Reverse Engineering and More photo

@re_and_more

Can't wait to attend @bsidesahmedabad 🤘🏻

Tweet Image 1

Kabeer 🇮🇳 Reposted

People who weren't smarter than you in college but are now doing well in life, not due to luck, but because they have mastered the art of solving difficult problems.


Kabeer 🇮🇳 Reposted

Files Containing Juicy Info inurl:"/.vscode/sftp.json" #bugbounty #bugbountytips #bugbountytip #cybersecurity #ethicalhacking

Tweet Image 1

Thankful for the opportunity ! Excited to attend #bluehatindia May 2024 @MSFTBlueHat #bluehat #microsoft

Tweet Image 1

Kabeer 🇮🇳 Reposted

Successfully bypassed a SSRF WAF by using a combination of IPV6 + Unicode. Payload for Metadata instances: http://[::ⓕⓕⓕⓕ:①⑥⑨。②⑤④。⑯⑨。②⑤④]:80 Check images for response difference between 169.254.169.254 and the above payload I shared 🔥 #bugbounty #infosec #waf

Tweet Image 1
Tweet Image 2

Kabeer 🇮🇳 Reposted

Bug bounty programs are one of the best ways to reward responsible security researchers for helping us better secure our customers. - Stephen Schmidt, Chief Security Officer, Amazon

Tweet Image 1

500$ bounty When you invite users to your product, sometime it can carry hidden fields with the invite request it'll be a good opportunity to check for blind & stored XSS. #bugbountytips #bugbounty

Tweet Image 1

Excited to attend @bsidesgoa See you all there !!

Tweet Image 1

Kabeer 🇮🇳 Reposted

OWASP LLM Top Ten v.1: 🚀 Prompt Injections 💧 Data Leakage 🏖️ Inadequate Sandboxing 📜 Unauthorized Code Execution 🌐 SSRF Vulnerabilities ⚖️ Overreliance on LLM-generated Content 🧭 Inadequate AI Alignment 🚫 Insufficient Access Controls ⚠️ Improper Error Handling 💀 Training…


सदा शिव सर्वदा शिव हर हर महादेव || Proud Indian🇮🇳 Proud Sanatani 🕉️

Tweet Image 1

Kabeer 🇮🇳 Reposted

When you are hunting for blind XSS. Go to forget password and add admin@company .com and add your blind XSS payload on the header. Easy way and it will logged on admin log, if he checked his account you will exploit his account. #bugbountytips

Tweet Image 1

Kabeer 🇮🇳 Reposted

Identified a XSS bug in your target? Don’t be too quick to report it for a Medium bounty. Read this post completely to learn how XSS is escalated to an ATO for much higher bounties 💸 1️⃣ Exploiting Session ID Leakage: XSS can be escalated to Account Takeover by exploiting…


Kabeer 🇮🇳 Reposted

#bugbountytips #bugbounty #cybersecurity #Pentesting #Hacking #bugcrowd #Hackerone #IDOR #XSS #SQLI Craft CMS Remote Code Execution Craft CMS is a flexible and user-friendly content management Affected Versions CMS version 4.0.0-RC1 through 4.4.14 EXPLOIT in Requset…

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.