Vikas Rawat

@Mr_R0w07

Saving the world, one bit at a time! :) Infosec Addict. I do bug bounties sometimes.

http://127.1/home/India/
Vrijeme pridruživanja: rujan 2017.

Tweetovi

Blokirali ste korisnika/cu @Mr_R0w07

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Mr_R0w07

  1. Prikvačeni tweet
    14. lis 2019.

    My inspiration was MrRobot and i am MrRawat So combined them and it became Mr Rowot Used leet language and it became mr_r0w07 '0w0' which is somewhat UwU (emoji) but eyes opened r_r if you notice is emoji with eyes looking on one side. There's a james bond reference too with 007

    Poništi
  2. proslijedio/la je Tweet
    prije 10 sati
    Odgovor korisnicima

    nothing fancy. Open the domain, view source code, find all external relative URLs (mainly social media links), visit them, if there's no account (404 error) with that name then claim it! :)

    Poništi
  3. proslijedio/la je Tweet
    3. velj

    1/ The 31st HTB box I solve in preparation for the OSCP. Initial Foothold - verbose error message + blind SQLi + PHP type juggling vulnerability + lack of input validation on upload functionality + cleartext creds + reuse of creds

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    3. velj

    99 smart phones in a pull-cart = instant traffic jam

    Poništi
  5. proslijedio/la je Tweet

    If Microsoft Teams is down for you... Remember it's Office *365* and there are 366 days in 2020.

    Poništi
  6. proslijedio/la je Tweet
    3. velj

    My Hacking Channel is now LIVE! Check out my first video (the USB-C one) and get ready for much more! I will be putting my streaming archives here from now on. :)

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    2. velj

    This morning I received an unsolicited dick pic via from a man I do not know. What follows is a beautiful story I wove about an app I made up, that should exist. Enjoy!

    Poništi
  8. 3. velj

    My tweet won't give them enough publicity but heck, for every Tweet, will donate $1 to , So why not?

    Poništi
  9. proslijedio/la je Tweet
    27. sij

    looking for some new dirs to bruteforce?

    Poništi
  10. 11. sij
    Poništi
  11. proslijedio/la je Tweet
    8. sij
    Prikaži ovu nit
    Poništi
  12. 5. sij
    Poništi
  13. proslijedio/la je Tweet
    4. sij

    THREAD: list of links where you can make donations to fight fires in Australia. if you can't donate, PLEASE share, speak out, relay the information, we are facing an extreme climate emergency and Australia needs our help.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    4. sij

    Introducing MemLabs - Educational, CTF-styled labs for individuals interested in Memory Forensics, is now released. Link: Author:

    Poništi
  15. 29. pro 2019.

    Update: 1.Initially 500rep goal on was for burp pro trial but i signed up before and ain't eligible. At 440 rep rn, compared to 150rep when i tweeted this. Reported 2 valid bugs to & got few external HOF, so ig it's a good compensation.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    22. pro 2019.

    I make damn good $ for my age. But I work my ass off everyday for what I earn. I grew up poor, I grew up getting shot at, I grew up watching my family ruin their lives. I didn't want to be that. I kept studying, kept working, always trying to be better. You can do it.

    Poništi
  17. proslijedio/la je Tweet
    22. pro 2019.

    Holy shit you guys! It’s dropped and already live on Spotify and Anchor!! The topic is paths to infosec with some suggestions for those trying to get into infosec. We hope you enjoy as much as we enjoyed making it! Be kind...we are new😬 Cc: , ,

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    21. pro 2019.

    New writeup, one of my favorite bugs 🤠 - Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty Featuring...

    Poništi
  19. proslijedio/la je Tweet
    13. pro 2019.

    Hi, If you want to know how SSRF Vulnerability was exist in Vimeo, you should read: Reported through ;)

    Poništi
  20. proslijedio/la je Tweet
    12. pro 2019.

    Good news! Stalker is now ready for fuzzing and my frida-fuzzer is ready to fuzz APIs of Android apps. With a logic inspired by AFL, it has a libFuzzer-like harness interface. The project is in his early stage, look at the TODOs to contribute.

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    7. pro 2019.

    I recently exploited an XXE with a very cool trick and wrote a blog post tl;dr; Exploiting XXE to read files when HTTP OOB is not allowed but errors are enabled :D

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·