v3d_bug's profile picture. Curious to Learn

Ved Parkash

@v3d_bug

Curious to Learn

고정된 트윗

Hey Everyone, do checkout how me and my brother @Zero2Infinity_ bag our 1st $$$$ bounty individually. v3d.medium.com/story-of-bount… #bugbounty #bugbountytips #bugbountytip #bughunter #hacker #cybersecurity #hackerone #bugcrowd

v3d_bug's tweet image. Hey Everyone, do checkout how me and my brother @Zero2Infinity_ bag our 1st $$$$ bounty individually. 

v3d.medium.com/story-of-bount…

#bugbounty #bugbountytips #bugbountytip #bughunter #hacker #cybersecurity #hackerone #bugcrowd

Ved Parkash 님이 재게시함

A few months ago, @rootxharsh and I gave a talk, sharing the slides here in case they’re helpful to anyone.

S1r1u5_'s tweet image. A few months ago, @rootxharsh and I gave a talk, sharing the slides here in case they’re helpful to anyone.

Ved Parkash 님이 재게시함

As a homage to the work of @Blaklis_, our Security Researcher @softpoison_ debuts his first research post on reverse engineering a critical unauthenticated RCE in Magento (SessionReaper) CVE-2025-54236 at @SLCyberSec: slcyber.io/assetnote-secu…


Ved Parkash 님이 재게시함

Late last month, @SLCyberSec Security Researchers Adam Kues (@hashkitten) and Dylan Pindur presented on Finding Critical Vulnerabilities in Adobe Experience Manager at @BSidesCBR. Today, we’re releasing our research post and presentation slides: slcyber.io/assetnote-secu….


Ved Parkash 님이 재게시함

Found Algolia key in the DOM using my own Chrome extension. It searches the defined keywords in the DOM and JS files. github.com/dirtycoder0124… Exploit the key by following the steps given on hackwithsuryesh.medium.com/algolia-api-ke… #bugbounty #bugbountytips


Ved Parkash 님이 재게시함

Next.js Security Testing Guide for Bug Hunters and Pentesters deepstrike.io/blog/nextjs-se…


Ved Parkash 님이 재게시함

Built a JS secrets hunter for my testing workflow 🔍 Nothing new - just a more structured version of existing JS recon tools: ✅ Auto discovery ✅ 40+ patterns ✅ Multi-threaded ✅ Clean output github.com/Mah3Sec/JSHawk #bugbountytips #infosec #CyberSecurity #PenTest


Ved Parkash 님이 재게시함

🔥Quick tip: Don't miss any JS files changes! They contain a lot of juicy information about your target app.. * Real time JS monitoring, scraping and alerting with advanced MapperPlus engine with history of file.. (Even if the company accidentally exposed the JS file for a…

silentgh00st's tweet image. 🔥Quick tip: 
Don't miss any JS files changes! They contain a lot of juicy information about your target app..
 
* Real time JS monitoring, scraping and alerting with advanced MapperPlus engine with history of file..
 
(Even if the company accidentally exposed the JS file for a…

Jai Shri Ram 🙏🏻...Happy to secure @WhatsApp and received a bounty from @Meta ...WhatsApp is known for being a highly secure application, so finding and reporting a valid bug here means a lot. #bugbounty #bughunter #bughunting #CyberSecurity #hacker #meta #hackerone #bugcrowd

v3d_bug's tweet image. Jai Shri Ram 🙏🏻...Happy to secure @WhatsApp and received a bounty from @Meta ...WhatsApp is known for being a highly secure application, so finding and reporting a valid bug here means a lot.

#bugbounty #bughunter #bughunting #CyberSecurity #hacker #meta #hackerone #bugcrowd

Ved Parkash 님이 재게시함

FINALLY! I overcame the procrastination wall and published my full breakdown on Dependency Confusion. This post covers my strategy for turning existing research into a 24/7 automated engine. Check out here: sl4x0.medium.com/turning-depend… #bugbountytips #supplychains


Ved Parkash 님이 재게시함

This is an interesting write-up on turning a limited path traversal into $40K. If you fuzz the target enough, there's always something interesting: medium.com/@HX007/a-journ…


Ved Parkash 님이 재게시함

Happy Friday! Enjoy our analysis of CVE-2025-36604, a pre-auth Command Inj in Dell's UnityVSA that we discovered and reported in March. labs.watchtowr.com/its-never-simp…


Ved Parkash 님이 재게시함

If you’re hunting for IDORs or dealing with messy, ID-heavy applications, you need Logger++ in your toolkit. Logger++ is a Burp Suite extension that helps you track, search, and filter requests. It’s particularly powerful when working with large volumes of API traffic and…

Bugcrowd's tweet image. If you’re hunting for IDORs or dealing with messy, ID-heavy applications, you need Logger++ in your toolkit.

Logger++ is a Burp Suite extension that helps you track, search, and filter requests. It’s particularly powerful when working with large volumes of API traffic and…

Ved Parkash 님이 재게시함

We just released a new article on how we hacked with @adnanthekhan the npm Supply Chain of 36 Million Weekly Installs 🔥 🔗Link: landh.tech/blog/20251003-…

0xLupin's tweet image. We just released a new article on how we hacked with @adnanthekhan the npm Supply Chain of 36 Million Weekly Installs 🔥

🔗Link: landh.tech/blog/20251003-…

Ved Parkash 님이 재게시함

Just getting started with bug bounty? Learn 4 vulnerability types in 400 seconds! 🤠 A thread! 🧵 👇

intigriti's tweet image. Just getting started with bug bounty? Learn 4 vulnerability types in 400 seconds! 🤠

A thread! 🧵 👇

Ved Parkash 님이 재게시함

If you're interested in MCP my colleague Kurt has just put up a really good intro to MCP for security engineers that covers what they are and how they work as well as what vulnerabilities they have, plus tools to test them, check it out

InsiderPhD's tweet image. If you're interested in MCP my colleague Kurt has just put up a really good intro to MCP for security engineers that covers what they are and how they work as well as what vulnerabilities they have, plus tools to test them, check it out
InsiderPhD's tweet image. If you're interested in MCP my colleague Kurt has just put up a really good intro to MCP for security engineers that covers what they are and how they work as well as what vulnerabilities they have, plus tools to test them, check it out
InsiderPhD's tweet image. If you're interested in MCP my colleague Kurt has just put up a really good intro to MCP for security engineers that covers what they are and how they work as well as what vulnerabilities they have, plus tools to test them, check it out
InsiderPhD's tweet image. If you're interested in MCP my colleague Kurt has just put up a really good intro to MCP for security engineers that covers what they are and how they work as well as what vulnerabilities they have, plus tools to test them, check it out

Modi ji be like: म्हारी मार L.A त लाहौर तक 💀

#OperationSindoor on the games field. Outcome is the same - India wins! Congrats to our cricketers.



Ved Parkash 님이 재게시함

$1,000 GIVEAWAY 🎁‼️ Here’s how to enter: 1️⃣ Fill out the ITMOAH survey 2️⃣ Like this post 3️⃣ Comment your fave tool 4️⃣ Repost bc your friends deserve a chance too Giveaway closes Sept 30 at 11:59pm ET. One hacker takes home $1K. 20 others will score $200 each. Already filled…

Bugcrowd's tweet image. $1,000 GIVEAWAY 🎁‼️

Here’s how to enter:
1️⃣ Fill out the ITMOAH survey
2️⃣ Like this post
3️⃣ Comment your fave tool 
4️⃣ Repost bc your friends deserve a chance too

Giveaway closes Sept 30 at 11:59pm ET. One hacker takes home $1K. 20 others will score $200 each. Already filled…
Bugcrowd's tweet image. $1,000 GIVEAWAY 🎁‼️

Here’s how to enter:
1️⃣ Fill out the ITMOAH survey
2️⃣ Like this post
3️⃣ Comment your fave tool 
4️⃣ Repost bc your friends deserve a chance too

Giveaway closes Sept 30 at 11:59pm ET. One hacker takes home $1K. 20 others will score $200 each. Already filled…

Ved Parkash 님이 재게시함

How do they even make $20000+ from the same Public Target?? One of the key Techniques: Differential Analysis.🧵👇 #bugbountytips


Loading...

Something went wrong.


Something went wrong.