Rahul Raj

@rahulr4j

I hack things for fun and little bit profit too ;)

Chennai, India
Vrijeme pridruživanja: rujan 2014.

Tweetovi

Blokirali ste korisnika/cu @rahulr4j

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @rahulr4j

  1. 1. stu 2019.

    In October, I submitted 10 vulnerabilities to 1 program on .

    Poništi
  2. 24. lis 2019.

    Yay, I was awarded a $12,600 bounty on ! This submission was done during Delhi Meetup.

    Poništi
  3. 17. ruj 2019.
    Poništi
  4. 4. ruj 2019.

    Its been 3 weeks. Can you please intervene?

    Prikaži ovu nit
    Poništi
  5. 13. kol 2019.

    can you please have a look into this issue?

    Prikaži ovu nit
    Poništi
  6. 12. kol 2019.

    Some of the program on are very irresponsive. Reported a high severity bug but team marked it very low and awarded low bounty. Asked for explanation on cvss decision but after 20 days still no response. Opened support ticket but it was also closed without resolution

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    9. srp 2019.

    Yay, We were awarded a $5,000 bounty on for blind SSRF.

    Poništi
  8. 6. svi 2019.

    Hello , Can you please open up your DM or follow me back? I want some conversation with you. 🙂

    Poništi
  9. 15. velj 2019.

    What's the issue with some of the staff. If a report is duplicate, why they don't add you as an external hacker to that report? The mistake of an triager could have cost me 5k bounty only because they didn't added me to the original report. 😐

    Poništi
  10. proslijedio/la je Tweet
    11. ožu 2018.

    Everytime when someone asks me where do you learn hacking?👇

    Poništi
  11. 25. sij 2018.

    Trying vultr with custom built kali linux iso

    Poništi
  12. proslijedio/la je Tweet
    2. pro 2017.
    Poništi
  13. proslijedio/la je Tweet
    1. pro 2017.

    🇺🇸: XXE OOB extracting via HTTP+FTP using single opened port 🇷🇺: XXE – OOB-извлечение данных по HTTP+FTP через единственный открытый порт

    Poništi
  14. proslijedio/la je Tweet

    This just out: Stored Cross-Site Scripting Vulnerability in 4.8.1 by

    Poništi
  15. 7. ruj 2017.

    Believe me is a masterpiece. Already got couples of on a private program. Thanks

    Poništi
  16. proslijedio/la je Tweet
    13. kol 2017.
    Poništi
  17. proslijedio/la je Tweet
    17. srp 2017.
    Poništi
  18. 5. srp 2017.

    Indian Companies needs much more programs, found some sites with more than 12 million users personal data leaking.

    Poništi
  19. 12. lip 2017.

    Got my first private program invite at Feeling excited 😆

    Poništi
  20. 1. lip 2017.

    It's disheartening to see company closing bug as informative even when users data is leaking through 3rd party services used by that company

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·