Piyush Kumar

@SilverPoision

Full Stack Web Developer, Bug Hunter, Data Analyst, AI/ML and Tech enthusiast.

Ballia U.P India
Vrijeme pridruživanja: ožujak 2017.

Tweetovi

Blokirali ste korisnika/cu @SilverPoision

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SilverPoision

  1. Prikvačeni tweet
    17. lip 2019.

    So the time has come to release the Beast from the cage and let him make some noise around our community. Rock-On a tool that I made is now live on Github and ready to rock. Check it's full guid on Github: and stay tuned for a good blog post describing it

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    24. sij

    Cross-Site Websocket Hijacking bug in Facebook that leads to account takeover By Bounty: $12500

    Poništi
  3. proslijedio/la je Tweet
    21. sij

    My main takeaway is that, in the bug bounty world, you may have a duplicate for the XSS but not for the RCE (for the exact same vector) 🤪

    Poništi
  4. proslijedio/la je Tweet
    21. sij

    Wondering what snakes 🐍 and SSTIs have in common? What the best Linux 🐧distro is or how to find bugs in API's 🦧? The latest edition of our provides all the answers -- and more! 👇👇👇

    Poništi
  5. proslijedio/la je Tweet
    19. sij
    Odgovor korisnicima

    This repo contains data dumps of Hackerone and Bugcrowd scopes(i.e. the domains that are eligible for bug bounty reports) in both text and JSON format and the interesting part is it is updated hourly :)

    Poništi
  6. proslijedio/la je Tweet
    19. sij

    Interesting list of 876 bug bounty programs by company: bounty/programs-list.csv at 3bed32ee073a0a673a33da8feb8f3af324aefc75 · yesnet0/bounty · GitHub

    Poništi
  7. proslijedio/la je Tweet
    14. sij

    Back to blogging! CSRF-protected forms, Intruder, and no macros. A step-by-step walkthrough based on that you can follow along at home...

    Poništi
  8. proslijedio/la je Tweet
    12. sij

    JSON Hijacking, SOP Bypass Technic with Cache-Control New post by , , , , , ,

    Poništi
  9. Poništi
  10. proslijedio/la je Tweet
    10. sij

    I just published "Hunting Good Bugs with only <HTML>" I hope you enjoy this post!

    Poništi
  11. proslijedio/la je Tweet
    9. sij

    I've just published my research on the Two Factor Authentication security subject . I had fun and enjoyed writing this one, hope you'll enjoy reading! Have a good read! 🙂

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    9. sij

    Have reproduced Citrix SSL VPN pre-auth RCE successfully on both local and remote. Interesting bug!

    Poništi
  13. proslijedio/la je Tweet
    8. sij

    Pro tip: do not conduct automated testing on contact forms, as this may end up being annoying for the people on the other side. 😅

    Poništi
  14. proslijedio/la je Tweet

    We are excited to announce the Microsoft Identity Research Project Grant, a new opportunity in partnership with the security community to help protect Microsoft customers, with grant awards of up to $75,000 USD. For more information please visit

    Poništi
  15. proslijedio/la je Tweet
    25. pro 2019.

    Here it is the first part of my blog post about request smuggling: Crossing The Borders : The illegal trade of HTTP requests

    Poništi
  16. proslijedio/la je Tweet
    24. pro 2019.
    Poništi
  17. proslijedio/la je Tweet
    16. pro 2019.

    Are you a student interested in making a career in Penetration Testing? We will be giving a seat in our Web Application Hacking - Pro Level training, free of cost, to someone in need. Retweet to spread the word. Tag friends you want to recommend.

    Poništi
  18. proslijedio/la je Tweet
    13. pro 2019.
    Poništi
  19. proslijedio/la je Tweet
    12. pro 2019.

    Now use your favorite Google Dorks techniques to find vulnerabilities and earn Bounties. with the help of this customized The Bounty Dorks cheat sheet.

    Poništi
  20. proslijedio/la je Tweet
    10. pro 2019.

    In the latest edition of our , you'll learn how to use unicode for shorter XSS payloads, how to get ☎️ numbers for free, we look back on 's session leakage incident this week (+ their excellent response) and much more! 👇👇👇

    Poništi
  21. proslijedio/la je Tweet
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·