@pandeyva Profile picture

Varun

@pandeyva

Nooby Tech !!

Similar User
Tahmid Niloy photo

@TahmidNil

0zxyx photo

@0zxyx

B19R8A14 photo

@B19R8A14

Believe😊 photo

@Bel_i_e_v_e

Cristing photo

@Jayway50063422

Sourabh_tomar_official photo

@sourabh_tomar_

Sahin islam photo

@i_am_sahinislam

Iftekhar_ul Haque photo

@Hyperio44159824

Tushar photo

@sickhuntt

Shubham photo

@The_Cyber_Lycan

jake green photo

@Rando2217

shady photo

@_shday

Infoneeds photo

@Infoneeds1

Rezn photo

@HanggoroSeto

M Qeradan photo

@QeradanM

Varun Reposted

🔥 Filter out noise in Burp Suite 🔥 ➡️ While you are testing with Burp Suite, you may want to add these patterns into the Burp Suite > Proxy > Options > TLS Pass Through settings: .*\.google\.com .*\.gstatic\.com .*\.googleapis\.com .*\.pki\.goog .*\.mozilla\..* 📃 Now all…

Tweet Image 1

Varun Reposted

Easy Account Take Over 1.Go to web.archive.org 2. Put the domain and search for urls 3. Type in the filter ( %40 ) and search 4. Get a lot of urls that have a parameter leaks the email and password of the users By: @Sayed_v2 credit: @RootMoksha #BugBounty

Tweet Image 1

Varun Reposted

🔥 Found SQL Injection to Account Takeover Manually :) 1. Enter mobile number to login intercept {"mobile_number":"8888888888"} >> 200 {"mobile_number":"8888888888'"} >> 500 {"mobile_number":"8888888888''"} >> 200 credit: @bbr_bug #bugbountytips

Tweet Image 1

Varun Reposted

Bypassed SQLi in Philippine Government,Ghauri is Excellient tool for finding timebased blind sqli..

Tweet Image 1

Varun Reposted

Hacking devices are great. Here are hacker tools you should know. They are awesome.

Tweet Image 1

Varun Reposted

I spoke with yet another scammer today. I don't know why I do this, but here we go. It all started with a few annoying Whatsapp messages trying to scam me. But we ended up wishing each other good luck 😂 1/n

Tweet Image 1

Varun Reposted

How I Automate Finding Amazon S3 Buckets Using A Simple Python Script From internet 🛜 medium.com/@gradillagusta


Varun Reposted

Planning to add a bypassing secuity controls primer and a payload mutation section to TBHMLive.com I dont know if it will fit in 2 days anymore! 😬😅


Varun Reposted

Do Not Stop at One Attack ! by: Yappare credit: @Pwn4arn #bugbountytips #BugBounty

Tweet Image 1

Varun Reposted

My friend just created his new site and said he found a clever way to translate his new blog! 😎 But something looks off... can you tell what it is? 🤔

Tweet Image 1

Varun Reposted

Here are the top 25 parameters that could be vulnerable to server-side request forgery (SSRF) vulnerability. Credits:@trbughunters #bugbountytips #BugBounty #bugbountytip #bugbounty

Tweet Image 1

Varun Reposted

🚨Alert🚨CVE-2023-49070:Critical Pre-auth RCE Vulnerability Discovered in Apache OFBiz 🔗 Hunter:hunter.how/list?searchVal… Dorks 👇👇👇 FOFA app="Apache_OFBiz" 📰Refer to securityonline.info/cve-2023-49070… #infosec #infosecurity #Infosys #Vulnerability #cybersecurity

Tweet Image 1

Varun Reposted

echo "sleep 0.1" >> ~/.bashrc Every time the target opens a terminal, a 100 millisecond delay is added. It becomes annoying when the delay adds up gradually and reaches seconds.

You found an RCE... What's the first command that you're executing? 😎️



Varun Reposted

JWT Token Bypasses #2 1. Capture the JWT token. 2. If the algorithm is RS256 change to HS256 and sign the token with the public key (which you can get by visiting jwks Uri / mostly it will be the public key from the site's https certificate) (1/2) Credits:@HackerHumble #BugBounty


Varun Reposted

If you get a reverse shell on Ubuntu 18.04.x or can run remote code execution, you should definitely try this exploit on that server or workspace ; raw.githubusercontent.com/ThrynSec/CVE-2… #RCE #privilegeescalation #BugBounty #bugbountytip

Tweet Image 1
Tweet Image 2

Varun Reposted

Help #FBI & #NSA locate American hacker, Milenko Vidakovic, also known as “Kabuto” Wanted for: Computer Intrusion; Conspiracy; Intentional Damage to a Protected Computer; Threats Relating to a Protected Computer; Aiding and Abetting.

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.