_mrd7_'s profile picture. Security enthusiast ❤️ | OSCP student |

MRD7

@_mrd7_

Security enthusiast ❤️ | OSCP student |

مثبتة

Bug bounty has changed my life. Thank you to the bug bounty platforms and all the programs. @Hacker0x01 @Bugcrowd Before After

_mrd7_'s tweet image. Bug bounty has changed my life. Thank you to the bug bounty platforms and all the programs. 
@Hacker0x01 @Bugcrowd  

Before                                         After
_mrd7_'s tweet image. Bug bounty has changed my life. Thank you to the bug bounty platforms and all the programs. 
@Hacker0x01 @Bugcrowd  

Before                                         After

Can we make a thread of good Client side resources link/blogs. What resources/blogs do you read or have read to learn about Client-side-security. Let me start. 1. vitorfalcao.com 2. sudistark.github.io 3. matanber.com/blog


Hello everyone, my blogs were not updated for quite some time. So, I'm sharing my notes which I took while learning about web cache deception. PS: These are not original notes. Many parts of this blogs are taken from other resources. So credit to them. medium.com/@mrd17x/web-ca…


Hello members, I'm looking for a job. Are there any in-office opportunities available for an Application Security (AppSec) role in the Delhi-NCR region?


Good opportunity for people to learn Check this out. @ThisIsDK999 @Hacker0x01

So… We’re hosting something special👀 At @Hacker0x01 India West Club :- 📍 Goa 📅 Aug 23-24 🧠 H1 HackerHouse - 2 days of learning, hacking & vibing together. We’ll pick a target, hack, collab & (find 0days?). 🎯 Focused Yet Fun! Link - h1.community/e/m9gwzn/ OR Send me a DM!



Hey, @grok, who was the first person who started posting this? "Hey, @grok, who was the most famous person to visit my profile? It doesn't need to be a mutual, don't tag them, just say who it was?"


What a write-up!

How I reverse-engineered an Android app, bypassed custom encryption layer, achieved server-side RCE, and earned a $5000 bounty. read the full story here (TLDR; but worth reading) blog.voorivex.team/from-an-androi…

YShahinzadeh's tweet image. How I reverse-engineered an Android app, bypassed custom encryption layer, achieved server-side RCE, and earned a $5000 bounty. read the full story here (TLDR; but worth reading)

blog.voorivex.team/from-an-androi…


Lol, today I learned how to open IPV6 address in a browser. 🤯 IP: 2600:1xx4:bxxx:2xx::3xxx URL: https://[IP] Note: IP needs to be put inside square bracket.


Here are my stats of March 2024 📊 Total Bounty: = $100 💰 Total Reports: 6 🔺 Triaged: 2 [Bounty Pending] Duplicate: 2 Resolved: 1 💚 Pending: 1

Here are my stats of Feb 2024 📊 Total Bounty: 2k+3K+100 = $5100 💰 Total Reports: 3 🔻 Informative: 0 Duplicate: 0 Resolved: 2 💚 Pending: 1



Here are my stats of Feb 2024 📊 Total Bounty: 2k+3K+100 = $5100 💰 Total Reports: 3 🔻 Informative: 0 Duplicate: 0 Resolved: 2 💚 Pending: 1

Update: Pending report is paid now. ✅ Here are my final stats of January 2024 📊 Total Bounty: (5000+50)x2 = $10100 Total Reports: 6 Informative: 2 Duplicate: 2 Accepted: 2



Loading...

Something went wrong.


Something went wrong.