Sparsh Kulshrestha

@d0tdotslash

OSCP | Bug Bounty Hunter | lead volunteer | | CS Undergrad | 20 y/o

Haldwani-Kathgodam, India
Vrijeme pridruživanja: prosinac 2014.

Tweetovi

Blokirali ste korisnika/cu @d0tdotslash

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @d0tdotslash

  1. Prikvačeni tweet
    30. pro 2019.

    I'm happy to announce that I'm officially an . It was a great learning experience, thank you for such a fun journey.

    Poništi
  2. proslijedio/la je Tweet

    Hurry up, guys!!! The last four days to Submit Call for Nominations and chance to win Xbox, Hak5 gear, PentesterLab Pro Subscription, unique Swags. Submit your bugs for Nomination here

    Poništi
  3. proslijedio/la je Tweet
    prije 22 sata
    Poništi
  4. proslijedio/la je Tweet
    2. velj

    Mistakes do happen whenever we try and do something in a good spirit. But that doesn't mean that the spirit is to be suppressed. Cheers to the team for their efforts of providing an open and free security conference ❤️💥 Let's promote open learning !!!

    Poništi
  5. proslijedio/la je Tweet
    2. velj

    WooT! There is always a way. New short write up! Chain the bugs till you get what you want. Some steps were not mentionned. RT, Like and Comments are appreciated. For any pentest work DM me:) 🎉🎉

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    2. velj

    On behalf of everyone at Thanks to , for a very generous sponsorship for the upcoming conference. It has really sent a buzz through the entire team.

    Poništi
  7. proslijedio/la je Tweet
    31. sij

    So I just found out about the Application for a Pardon I can send to .. I am going to try and request a pardon to have all of my rights restored from my previous hacking convictions. I am going to need character witnesses for this process... 1/x

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    2. velj

    Are you an expert in bug bounty? is recognizing researchers and are honoring them! Call for nominations are open, submit your bugs to win amazing prizes like Xbox, hac5 gadgets, pentersterlab subscriptions & unique Swags

    Poništi
  9. proslijedio/la je Tweet
    1. velj

    Here is my writeup for Facebook's BountyCon 2020 CTF. Was not able to give much time but enjoyed solving a couple of challenges.🧑‍💻

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    31. sij
    Poništi
  11. proslijedio/la je Tweet
    1. velj

    Important update : CTF will start 1 p.m onwards today. We will start sending the invites from 12:30 p.m . Let us know in case you don't receive it. Get your team ready for some fun!

    Poništi
  12. proslijedio/la je Tweet
    31. sij

    is proud to welcome all security researchers to by . Share knowledge through different bug bounty programs, learn report writing and a lot more from experts

    Poništi
  13. proslijedio/la je Tweet
    31. sij

    We are thrilled to introduce our Review Committee member Thank you, Laurie Mercer, for taking the time out from your busy schedule and to be part of our review committee. more info:

    Poništi
  14. proslijedio/la je Tweet

    Every pentester's core focus is to sharpen their skills so they can hunt more efficiently. Boost their level up by working with handpicked core across the globe. We are glad Cobalt is coming to OWASP Seasides. Thank you for supporting us !

    Poništi
  15. proslijedio/la je Tweet
    30. sij

    We express our sincere gratitude for your contribution to Hope you know, how much you value for us 😍 looking forward to your amazing "cmd+ctl" training

    Poništi
  16. proslijedio/la je Tweet
    30. sij

    Just two days to go for CTF@Seasides by Get your teams ready and register if you haven't already. Prize: Xbox (Winner has to be physically present at the venue on the dates of Conference)

    Poništi
  17. proslijedio/la je Tweet
    29. sij
    Odgovor korisnicima i sljedećem broju korisnika:

    Try this: cat domains.txt | while read domain; do if host -t A "$domain" | awk '{print }' | grep -E '^(192\.168\.|172\.1[6789]\.|172\.2[0-9]\.|172\.3[01]\.|10\.)' &>/dev/null; then echo ; fi; done Disclaimer: wrote it just now and haven't tested it much :-P

    Poništi
  18. proslijedio/la je Tweet
    29. sij

    For your very generous contribution to our 2th annual conference, we at want to send warm thanks and appreciation and hope you know how much you are valued.

    Poništi
  19. proslijedio/la je Tweet
    29. sij

    Solder this super cool Blinky LED badge by on your own at Thank you for supporting us !!

    Poništi
  20. proslijedio/la je Tweet
    29. sij

    OWASP Seasides presents a workshop for all cybersecurity enthusiasts : "Decoding the Art of Red Teaming" by and . Register at:

    Poništi
  21. proslijedio/la je Tweet
    29. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·