Shivam Pandey

@shivam31200

I am getting started with bug bounty Acknowledged by etc

Mumbai, India
Vrijeme pridruživanja: rujan 2018.

Tweetovi

Blokirali ste korisnika/cu @shivam31200

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @shivam31200

  1. Prikvačeni tweet
    28. kol 2019.

    GitHub is great to recon abt target Recon : .org:target template actually gives template engine which has been used so it’s easy win for SSTI

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  2. proslijedio/la je Tweet
    prije 5 sati
    Poništi
  3. proslijedio/la je Tweet
    prije 13 sati

    Doctors in Thailand say they have successfully treated two Wuhan coronavirus patients with a combination of drugs used in HIV and flu treatments, the country's Health Ministry has announced.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    prije 11 sati

    Alhamdulillah. Just got my first RCE in 2020 at . Tips: When you can't execute one liner reverse shell on your web shell (because some char was blocked), then try to download those shell to server and execute it via your web shell. style. ماشاءالله

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    2. velj

    Biggest U-turn of till date. This video should reach every Citizen across Delhi.

    Poništi
  6. proslijedio/la je Tweet
    prije 24 sata

    There's a new repository for payload generators and helper scripts for ffuf. I wrote a HTTP basic authentication payload generator as an example. Contributions are more than welcome, it's show & tell time!

    Poništi
  7. proslijedio/la je Tweet
    2. velj

    WooT! There is always a way. New short write up! Chain the bugs till you get what you want. Some steps were not mentionned. RT, Like and Comments are appreciated. For any pentest work DM me:) 🎉🎉

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  9. Poništi
  10. proslijedio/la je Tweet
    1. velj

    NEW BLOG POST ON RECON ON SHODAN PUBLISHED BY ME DO TAKE A READ AND SHARE 🙏

    Poništi
  11. proslijedio/la je Tweet
    1. velj

    Project-Black - Pentest/BugBounty Progress Control With Scanning Modules

    Poništi
  12. proslijedio/la je Tweet
    2. velj
    Poništi
  13. proslijedio/la je Tweet
    1. velj

    New video! The first episode of Bug in Focus is here and we talk about RCEs. What they are, how people find them & highlight some interesting RCEs. Also, I do a demo of command and code execution. I'm REALLY happy with this video

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    1. velj

    Security researcher tracks down one of the REvil ransomware distributors to a Russian named "Alexander Taker"

    Poništi
  15. proslijedio/la je Tweet
    31. sij

    Cloudflare XSS Bypass <a"/onmouseover=(confirm)('clodflare-bypass-doskey_history')>click

    Poništi
  16. proslijedio/la je Tweet
    31. sij

    A Not-So-Blind RCE with SQL Injection by

    Poništi
  17. proslijedio/la je Tweet
    1. velj

    I just got a fancy idea to create strings in without using dangerous characters 😃 Inspired by challenge from .

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    31. sij
    Odgovor korisnicima i sljedećem broju korisnika:

    Here is an explanation why it works and more bypasses

    Poništi
  19. proslijedio/la je Tweet
    29. stu 2018.

    Exploiting post message to steal and replace user’s cookies

    Poništi
  20. proslijedio/la je Tweet
    8. pro 2018.
    Poništi
  21. proslijedio/la je Tweet
    21. pro 2017.

    DNSTrails () is pretty nice for recon, you can enumerate domains of a specific organisation (eg. Uber Technologies Inc.) using: curl hxxps://app.securitytrails.com/api/whois/list/organization/Uber%20Technologies%2C%20Inc.?page=1 | jq .

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·