v3d_bug's profile picture. Curious to Learn

Ved Parkash

@v3d_bug

Curious to Learn

置頂

Hey Everyone, do checkout how me and my brother @Zero2Infinity_ bag our 1st $$$$ bounty individually. v3d.medium.com/story-of-bount… #bugbounty #bugbountytips #bugbountytip #bughunter #hacker #cybersecurity #hackerone #bugcrowd

v3d_bug's tweet image. Hey Everyone, do checkout how me and my brother @Zero2Infinity_ bag our 1st $$$$ bounty individually. 

v3d.medium.com/story-of-bount…

#bugbounty #bugbountytips #bugbountytip #bughunter #hacker #cybersecurity #hackerone #bugcrowd

Ved Parkash 已轉發

Late last month, @SLCyberSec Security Researchers Adam Kues (@hashkitten) and Dylan Pindur presented on Finding Critical Vulnerabilities in Adobe Experience Manager at @BSidesCBR. Today, we’re releasing our research post and presentation slides: slcyber.io/assetnote-secu….


Ved Parkash 已轉發

Found Algolia key in the DOM using my own Chrome extension. It searches the defined keywords in the DOM and JS files. github.com/dirtycoder0124… Exploit the key by following the steps given on hackwithsuryesh.medium.com/algolia-api-ke… #bugbounty #bugbountytips


Ved Parkash 已轉發

Built a JS secrets hunter for my testing workflow 🔍 Nothing new - just a more structured version of existing JS recon tools: ✅ Auto discovery ✅ 40+ patterns ✅ Multi-threaded ✅ Clean output github.com/Mah3Sec/JSHawk #bugbountytips #infosec #CyberSecurity #PenTest


Ved Parkash 已轉發

🔥Quick tip: Don't miss any JS files changes! They contain a lot of juicy information about your target app.. * Real time JS monitoring, scraping and alerting with advanced MapperPlus engine with history of file.. (Even if the company accidentally exposed the JS file for a…

silentgh00st's tweet image. 🔥Quick tip: 
Don't miss any JS files changes! They contain a lot of juicy information about your target app..
 
* Real time JS monitoring, scraping and alerting with advanced MapperPlus engine with history of file..
 
(Even if the company accidentally exposed the JS file for a…

Jai Shri Ram 🙏🏻...Happy to secure @WhatsApp and received a bounty from @Meta ...WhatsApp is known for being a highly secure application, so finding and reporting a valid bug here means a lot. #bugbounty #bughunter #bughunting #CyberSecurity #hacker #meta #hackerone #bugcrowd

v3d_bug's tweet image. Jai Shri Ram 🙏🏻...Happy to secure @WhatsApp and received a bounty from @Meta ...WhatsApp is known for being a highly secure application, so finding and reporting a valid bug here means a lot.

#bugbounty #bughunter #bughunting #CyberSecurity #hacker #meta #hackerone #bugcrowd

Ved Parkash 已轉發

FINALLY! I overcame the procrastination wall and published my full breakdown on Dependency Confusion. This post covers my strategy for turning existing research into a 24/7 automated engine. Check out here: sl4x0.medium.com/turning-depend… #bugbountytips #supplychains


Ved Parkash 已轉發

This is an interesting write-up on turning a limited path traversal into $40K. If you fuzz the target enough, there's always something interesting: medium.com/@HX007/a-journ…


Ved Parkash 已轉發

Happy Friday! Enjoy our analysis of CVE-2025-36604, a pre-auth Command Inj in Dell's UnityVSA that we discovered and reported in March. labs.watchtowr.com/its-never-simp…


Ved Parkash 已轉發

If you’re hunting for IDORs or dealing with messy, ID-heavy applications, you need Logger++ in your toolkit. Logger++ is a Burp Suite extension that helps you track, search, and filter requests. It’s particularly powerful when working with large volumes of API traffic and…

Bugcrowd's tweet image. If you’re hunting for IDORs or dealing with messy, ID-heavy applications, you need Logger++ in your toolkit.

Logger++ is a Burp Suite extension that helps you track, search, and filter requests. It’s particularly powerful when working with large volumes of API traffic and…

Ved Parkash 已轉發

We just released a new article on how we hacked with @adnanthekhan the npm Supply Chain of 36 Million Weekly Installs 🔥 🔗Link: landh.tech/blog/20251003-…

0xLupin's tweet image. We just released a new article on how we hacked with @adnanthekhan the npm Supply Chain of 36 Million Weekly Installs 🔥

🔗Link: landh.tech/blog/20251003-…

Ved Parkash 已轉發

Just getting started with bug bounty? Learn 4 vulnerability types in 400 seconds! 🤠 A thread! 🧵 👇

intigriti's tweet image. Just getting started with bug bounty? Learn 4 vulnerability types in 400 seconds! 🤠

A thread! 🧵 👇

Ved Parkash 已轉發

If you're interested in MCP my colleague Kurt has just put up a really good intro to MCP for security engineers that covers what they are and how they work as well as what vulnerabilities they have, plus tools to test them, check it out

InsiderPhD's tweet image. If you're interested in MCP my colleague Kurt has just put up a really good intro to MCP for security engineers that covers what they are and how they work as well as what vulnerabilities they have, plus tools to test them, check it out
InsiderPhD's tweet image. If you're interested in MCP my colleague Kurt has just put up a really good intro to MCP for security engineers that covers what they are and how they work as well as what vulnerabilities they have, plus tools to test them, check it out
InsiderPhD's tweet image. If you're interested in MCP my colleague Kurt has just put up a really good intro to MCP for security engineers that covers what they are and how they work as well as what vulnerabilities they have, plus tools to test them, check it out
InsiderPhD's tweet image. If you're interested in MCP my colleague Kurt has just put up a really good intro to MCP for security engineers that covers what they are and how they work as well as what vulnerabilities they have, plus tools to test them, check it out

Modi ji be like: म्हारी मार L.A त लाहौर तक 💀

#OperationSindoor on the games field. Outcome is the same - India wins! Congrats to our cricketers.



Ved Parkash 已轉發

$1,000 GIVEAWAY 🎁‼️ Here’s how to enter: 1️⃣ Fill out the ITMOAH survey 2️⃣ Like this post 3️⃣ Comment your fave tool 4️⃣ Repost bc your friends deserve a chance too Giveaway closes Sept 30 at 11:59pm ET. One hacker takes home $1K. 20 others will score $200 each. Already filled…

Bugcrowd's tweet image. $1,000 GIVEAWAY 🎁‼️

Here’s how to enter:
1️⃣ Fill out the ITMOAH survey
2️⃣ Like this post
3️⃣ Comment your fave tool 
4️⃣ Repost bc your friends deserve a chance too

Giveaway closes Sept 30 at 11:59pm ET. One hacker takes home $1K. 20 others will score $200 each. Already filled…
Bugcrowd's tweet image. $1,000 GIVEAWAY 🎁‼️

Here’s how to enter:
1️⃣ Fill out the ITMOAH survey
2️⃣ Like this post
3️⃣ Comment your fave tool 
4️⃣ Repost bc your friends deserve a chance too

Giveaway closes Sept 30 at 11:59pm ET. One hacker takes home $1K. 20 others will score $200 each. Already filled…

Ved Parkash 已轉發

How do they even make $20000+ from the same Public Target?? One of the key Techniques: Differential Analysis.🧵👇 #bugbountytips


Ved Parkash 已轉發

We just dove into our shelf of archived bug bounty write-ups from the most notable hackers! 🤠 In this issue, we selected 5 compelling articles (that are still relevant today) to share with you, from which you can learn something new! 😎 🧵 👇

intigriti's tweet image. We just dove into our shelf of archived bug bounty write-ups from the most notable hackers! 🤠

In this issue, we selected 5 compelling articles (that are still relevant today) to share with you, from which you can learn something new! 😎

🧵 👇

Ved Parkash 已轉發

I just posted about a really cool AI security concept that can lead to more bugs! Use it the next time you’re hacking an AI application 😊 josephthacker.com/ai/2025/09/24/…


🇮🇳🫡

Intermediate Range Agni-Prime Missile was successfully tested on 24 Sep 2025 from a Rail based Mobile launcher. This will be a force multiplier to strategic forces, with a game changer road cum rail missile system



Loading...

Something went wrong.


Something went wrong.