hack1or0's profile picture.

Sunny

@hack1or0

You might like

Hello Everyone Anyone looking for BSides Ahmadabad individual passes at much discounted price.


Ok fam. I’m giving away TWO free tickets to my course which takes place in two/three weeks. All you have to do to win is like, retweet this tweet, and reply with “tbhmlive.com!” I’ll pick winners next week! If you haven’t seen my course, check out the link!



Sunny reposted

Ok fam. I’m giving away TWO free tickets to my course which takes place in two/three weeks. All you have to do to win is like, retweet this tweet, and reply with “tbhmlive.com!” I’ll pick winners next week! If you haven’t seen my course, check out the link!


Sunny reposted

====================== ⚡ Exposing Django Debug Panel and Sensitive Infrastructure Information at …vaterelay.nonprod.cloudops.mozgcp.net 👨🏻‍💻 aliend89 ➟ Mozilla Core Services 🟨 Low 💰 None 🔗 hackerone.com/reports/2078707 ====================== #bugbounty #bugbountytips #cybersecurity #infosec

h1Disclosed's tweet image. ======================
⚡ Exposing Django Debug Panel and Sensitive Infrastructure Information at …vaterelay.nonprod.cloudops.mozgcp.net 
👨🏻‍💻 aliend89 ➟ Mozilla Core Services 
🟨 Low
💰 None
🔗 hackerone.com/reports/2078707
======================
#bugbounty #bugbountytips #cybersecurity #infosec

Sunny reposted

"Ways I followed to Bypass ‘403’ — Your checklist" is a fantastic article written by Suprajabaskaran where they have discussed in depth about different tricks to bypass 403 in web applications. Read here: infosecwriteups.com/ways-i-followe…


Sunny reposted

GraphQL has changed the way developers interact with APIs. Many apps use GraphQL to source data, so it's a good thing to know as a dev. In this course, you'll learn everything you need to know to create robust & efficient data-driven applications. freecodecamp.org/news/graphql-d…


Sunny reposted

"Hey I've been testing this website and I found nothing" ⏭️ how much time have you spent? ⏭️ did you read the documentation and fully understand the application's logic? ⏭️ did you bruteforce directories, files and parameters? ⏭️ if yes, how many entries in your wordlist ? Have…


Sunny reposted

Don't buy KNOXSS! 😯 (Yet) We are preparing new special prices for you! If you used it before or want to try it by now in your bug hunting workflows (with our API automation) or your security assessments, wait a little more to get your subscription! RT and spread the word! 😀


Sunny reposted

The @NahamSec Hacking APIs book giveaway! Giving out 10 signed print copies and I'll ship them anywhere 🌎🌍🌏 One entry per: ♥️ Like 🔁 RT Ends in 48 hours! Don't want to wait? Pick up a copy over @nostarch. nostarch.com/hacking-apis


Sunny reposted

I've been getting a number of DM's from people starting their Bug Bounty journey, asking for help where to start. My journey started here: bugbountyhunter.com/methodology/zs… Read it. Apply it. Do it 🤘 Thanks to @zseano and @BugBountyHunt3r! #bugbountytip


Sunny reposted

I have 2 PWK vouchers to giveaway! Two ways to win 1. Join my discord & react to the message posted in announcements. (discord.gg/DWGgpFpm) 2. Like and respond to this tweet with #nahomies Big thank you to our #nahamcon2022 sponsor, @offsectraining for making this happen.


Sunny reposted

CSRF: - Check if the token is present on any form it should be - Server checks if the token length is correct - Server checks if parameter is there - Server accepts empty parameter - Server accepts responds without CSRF token - Token is not session bound


Sunny reposted

Giveaway time! We are going to send a t-shirt and few goodies to one person who follows @PentesterLab and likes this tweet !! And we are going to give a 1-year voucher to someone who RT this tweet!


Sunny reposted

Giveaway time! We are going to send a t-shirt and few goodies to one person who follows @PentesterLab and likes this tweet !! And we are going to give a 1-year voucher to someone who RT this tweet!


Sunny reposted

Do you ever wonder about the vulnerabilities you've missed? Why didn't they show themselves - and will they be discovered by somebody else later? Catch "Hunting evasive vulnerabilities: finding flaws that others miss" by @albinowax at Nullcon Berlin portswigger.net/research/talks…

portswigger.net

Upcoming Conference Talks - PortSwigger Research

Upcoming Conference Talks - PortSwigger Research


Sunny reposted

I want to build a larger following for @haksecio, but I'd rather give to the hacker community than pay for Twitter ads. So - I'm giving away 5x @PentesterLab subscriptions, randomly selected from people who follow @haksecio and RT this tweet. ♥️


Sunny reposted

GIVEAWAY TIMEEEEE 🌈🌈🌈 1 of you will get our new product "Pentesting emulation: A-Z" for free <3 Rules: - Comment and share post - You have 24 hours - I will DM the winner. Keep your DMs open for the duration of the contest please. thexssrat.podia.com/pentesting-ass…


Sunny reposted

What if I am passing origin as https:// domain.com And getting only ACAO:https:// But this header is not present access-control-allow-credentials:true Is it vulnerable?


Sunny reposted

I will be sending our new ethical hacking guide for free to a random amount of people in the comments who have also retweeted this tweet. You do NOT want to miss this highly acclaimed course that is more complete than this industry has seen so far. 24 hour deadline


United States Trends

You might like

Loading...

Something went wrong.


Something went wrong.