rajwansi_rohit's profile picture. IIT Bombay EE 2018 भारतीय
अभियंता, Network Security, Red Team, White Hat, Backend developer, Python, Lang-chain, LLM,

Bug Bounty,

DHH, Music production 🎁

Rohit Rajwansi

@rajwansi_rohit

IIT Bombay EE 2018 भारतीय अभियंता, Network Security, Red Team, White Hat, Backend developer, Python, Lang-chain, LLM, Bug Bounty, DHH, Music production 🎁

Rohit Rajwansi 님이 재게시함

SQL Injection Testing Methodology: A hacker’s checklist for finding SQLi vulnerabilities in web apps 🧵👇


Rohit Rajwansi 님이 재게시함

How to Find Auth Bypasses in Under 30 Minutes medium.com/@Aacle/how-to-… #bugbounty #bugbountytips #bugbountytip


Rohit Rajwansi 님이 재게시함
yanabantai's tweet image.

Rohit Rajwansi 님이 재게시함

this github Repo have nice tips, easy but that easy tips we forget it alot of time, so this a useful resource github.com/tuhin1729/Bug-…


Rohit Rajwansi 님이 재게시함

AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services. By: @0xTib3rius github.com/Tib3rius/AutoR…


Rohit Rajwansi 님이 재게시함

A list of articles, videos, and tools related to the use of AI for OSINT. github.com/ubikron/Awesom…


Gurjar are the cringest peeps around


Rohit Rajwansi 님이 재게시함

🔥FREE CERTIFICATION ALERT ! Claim Your 100% FREE Microsoft Exam Voucher & Get Certified! 🔥 Don't miss this incredible chance to fast-track your career! Earn globally recognized @Microsoft certifications in high-demand fields like **Cybersecurity, Cloud, AI, and Data.** Your…


Rohit Rajwansi 님이 재게시함

labs.hackxpert.com Over 150 smaller labs XSS Playgrounds 9! Full size labs FREE!

theXSSrat's tweet image. labs.hackxpert.com

Over 150 smaller labs
XSS Playgrounds
9! Full size labs
FREE!

Rohit Rajwansi 님이 재게시함

OSINT Kit OSINT Aggregator Tools Location Tracking Marketplaces Domain Information Miscellaneous Image / Video / Media Analysis Operating Systems PGP Key Servers Recording & Auditing github.com/Buddhsen-tripa… #osint #socmint


Rohit Rajwansi 님이 재게시함

#DeepSearch A comprehensive python based tool that maps out hidden digital footprint of a person of interest across multiple platforms using customized search queries. Leave no digital trace behind with DeepSearch! #OSINT #Cybersecurity #BugBounty #InfoSec

d4rk_Intel's tweet image. #DeepSearch 

A comprehensive python based tool that maps out hidden digital footprint of a person of interest across multiple platforms using customized search queries. Leave no digital trace behind with DeepSearch!

#OSINT #Cybersecurity #BugBounty #InfoSec
d4rk_Intel's tweet image. #DeepSearch 

A comprehensive python based tool that maps out hidden digital footprint of a person of interest across multiple platforms using customized search queries. Leave no digital trace behind with DeepSearch!

#OSINT #Cybersecurity #BugBounty #InfoSec
d4rk_Intel's tweet image. #DeepSearch 

A comprehensive python based tool that maps out hidden digital footprint of a person of interest across multiple platforms using customized search queries. Leave no digital trace behind with DeepSearch!

#OSINT #Cybersecurity #BugBounty #InfoSec

Rohit Rajwansi 님이 재게시함

Account takeover via OTP bypass (*code parameter payloads) New video with is out too! youtu.be/wHal3vnj12E #bugbounty

annonimous254z's tweet image. Account takeover via OTP bypass (*code parameter payloads) New video with is out too! youtu.be/wHal3vnj12E #bugbounty
annonimous254z's tweet image. Account takeover via OTP bypass (*code parameter payloads) New video with is out too! youtu.be/wHal3vnj12E #bugbounty
annonimous254z's tweet image. Account takeover via OTP bypass (*code parameter payloads) New video with is out too! youtu.be/wHal3vnj12E #bugbounty

Rohit Rajwansi 님이 재게시함

Whenever i sit to code.

krishdotdev's tweet image. Whenever i sit to code.

Rohit Rajwansi 님이 재게시함

why are u using both nvim and vscode?


Rohit Rajwansi 님이 재게시함

What happens when you type a URL in your browser: You type: google[.]com 1. DNS lookup (domain gets resolved to IP address) 2. TCP handshake (connection established with server) 3. TLS handshake (HTTPS encryption negotiated) 4. HTTP request (browser asks for the page) 5. Server…


Rohit Rajwansi 님이 재게시함

Stop applying on company websites where your resume goes into a black hole. Find the hiring manager on LinkedIn. Send them a message: "I noticed you're hiring for SOC Analyst. I just passed Security+ and built a home lab. Can I send you my resume directly?" 40% response rate.


Rohit Rajwansi 님이 재게시함

Red Team tools

cyber_razz's tweet image. Red Team tools

Rohit Rajwansi 님이 재게시함

Pentesting File Upload Vulnerabilities medium.com/@raihan408548/… #bugbounty #bugbountytips #bugbountytip


Rohit Rajwansi 님이 재게시함
bountywriteups's tweet image.

Loading...

Something went wrong.


Something went wrong.