v3d_bug's profile picture. Curious to Learn

Ved Parkash

@v3d_bug

Curious to Learn

ปักหมุด

Hey Everyone, do checkout how me and my brother @Zero2Infinity_ bag our 1st $$$$ bounty individually. v3d.medium.com/story-of-bount… #bugbounty #bugbountytips #bugbountytip #bughunter #hacker #cybersecurity #hackerone #bugcrowd

v3d_bug's tweet image. Hey Everyone, do checkout how me and my brother @Zero2Infinity_ bag our 1st $$$$ bounty individually. 

v3d.medium.com/story-of-bount…

#bugbounty #bugbountytips #bugbountytip #bughunter #hacker #cybersecurity #hackerone #bugcrowd

Ved Parkash รีโพสต์แล้ว

🔁 A good wordlist helps discover hidden content... but a custom one reveals what most other bug bounty hunters miss! Incorporating naming conventions, technology-specific and company-specific keywords (such as product names) is how you can craft your own custom wordlist. In…

intigriti's tweet image. 🔁 A good wordlist helps discover hidden content... but a custom one reveals what most other bug bounty hunters miss! 
 
Incorporating naming conventions, technology-specific and company-specific keywords (such as product names) is how you can craft your own custom wordlist.

In…

Ved Parkash รีโพสต์แล้ว

I usually brute-force API paths with "Debug":true parameter and often it leads to reveal internal debug info to reverse proxies exposing API secrets and tokens.

_jensec's tweet image. I usually brute-force API paths with "Debug":true parameter and often it leads to reveal internal debug info to reverse proxies exposing API secrets and tokens.

Ved Parkash รีโพสต์แล้ว

We just dove into our shelf of archived bug bounty write-ups from the most notable hackers! 🤠 In this issue, we selected 5 compelling articles (that are still relevant today) to share with you, from which you can learn something new! 😎 🧵 👇

intigriti's tweet image. We just dove into our shelf of archived bug bounty write-ups from the most notable hackers! 🤠

In this issue, we selected 5 compelling articles (that are still relevant today) to share with you, from which you can learn something new! 😎

🧵 👇

Ved Parkash รีโพสต์แล้ว

A few months ago, @rootxharsh and I gave a talk, sharing the slides here in case they’re helpful to anyone.

S1r1u5_'s tweet image. A few months ago, @rootxharsh and I gave a talk, sharing the slides here in case they’re helpful to anyone.

Ved Parkash รีโพสต์แล้ว

As a homage to the work of @Blaklis_, our Security Researcher @softpoison_ debuts his first research post on reverse engineering a critical unauthenticated RCE in Magento (SessionReaper) CVE-2025-54236 at @SLCyberSec: slcyber.io/assetnote-secu…


Ved Parkash รีโพสต์แล้ว

Late last month, @SLCyberSec Security Researchers Adam Kues (@hashkitten) and Dylan Pindur presented on Finding Critical Vulnerabilities in Adobe Experience Manager at @BSidesCBR. Today, we’re releasing our research post and presentation slides: slcyber.io/assetnote-secu….


Ved Parkash รีโพสต์แล้ว

Found Algolia key in the DOM using my own Chrome extension. It searches the defined keywords in the DOM and JS files. github.com/dirtycoder0124… Exploit the key by following the steps given on hackwithsuryesh.medium.com/algolia-api-ke… #bugbounty #bugbountytips


Ved Parkash รีโพสต์แล้ว

Next.js Security Testing Guide for Bug Hunters and Pentesters deepstrike.io/blog/nextjs-se…


Ved Parkash รีโพสต์แล้ว

Built a JS secrets hunter for my testing workflow 🔍 Nothing new - just a more structured version of existing JS recon tools: ✅ Auto discovery ✅ 40+ patterns ✅ Multi-threaded ✅ Clean output github.com/Mah3Sec/JSHawk #bugbountytips #infosec #CyberSecurity #PenTest


Ved Parkash รีโพสต์แล้ว

🔥Quick tip: Don't miss any JS files changes! They contain a lot of juicy information about your target app.. * Real time JS monitoring, scraping and alerting with advanced MapperPlus engine with history of file.. (Even if the company accidentally exposed the JS file for a…

silentgh00st's tweet image. 🔥Quick tip: 
Don't miss any JS files changes! They contain a lot of juicy information about your target app..
 
* Real time JS monitoring, scraping and alerting with advanced MapperPlus engine with history of file..
 
(Even if the company accidentally exposed the JS file for a…

Jai Shri Ram 🙏🏻...Happy to secure @WhatsApp and received a bounty from @Meta ...WhatsApp is known for being a highly secure application, so finding and reporting a valid bug here means a lot. #bugbounty #bughunter #bughunting #CyberSecurity #hacker #meta #hackerone #bugcrowd

v3d_bug's tweet image. Jai Shri Ram 🙏🏻...Happy to secure @WhatsApp and received a bounty from @Meta ...WhatsApp is known for being a highly secure application, so finding and reporting a valid bug here means a lot.

#bugbounty #bughunter #bughunting #CyberSecurity #hacker #meta #hackerone #bugcrowd

Ved Parkash รีโพสต์แล้ว

FINALLY! I overcame the procrastination wall and published my full breakdown on Dependency Confusion. This post covers my strategy for turning existing research into a 24/7 automated engine. Check out here: sl4x0.medium.com/turning-depend… #bugbountytips #supplychains


Ved Parkash รีโพสต์แล้ว

This is an interesting write-up on turning a limited path traversal into $40K. If you fuzz the target enough, there's always something interesting: medium.com/@HX007/a-journ…


Ved Parkash รีโพสต์แล้ว

Happy Friday! Enjoy our analysis of CVE-2025-36604, a pre-auth Command Inj in Dell's UnityVSA that we discovered and reported in March. labs.watchtowr.com/its-never-simp…


Ved Parkash รีโพสต์แล้ว

If you’re hunting for IDORs or dealing with messy, ID-heavy applications, you need Logger++ in your toolkit. Logger++ is a Burp Suite extension that helps you track, search, and filter requests. It’s particularly powerful when working with large volumes of API traffic and…

Bugcrowd's tweet image. If you’re hunting for IDORs or dealing with messy, ID-heavy applications, you need Logger++ in your toolkit.

Logger++ is a Burp Suite extension that helps you track, search, and filter requests. It’s particularly powerful when working with large volumes of API traffic and…

Ved Parkash รีโพสต์แล้ว

We just released a new article on how we hacked with @adnanthekhan the npm Supply Chain of 36 Million Weekly Installs 🔥 🔗Link: landh.tech/blog/20251003-…

0xLupin's tweet image. We just released a new article on how we hacked with @adnanthekhan the npm Supply Chain of 36 Million Weekly Installs 🔥

🔗Link: landh.tech/blog/20251003-…

Ved Parkash รีโพสต์แล้ว

Just getting started with bug bounty? Learn 4 vulnerability types in 400 seconds! 🤠 A thread! 🧵 👇

intigriti's tweet image. Just getting started with bug bounty? Learn 4 vulnerability types in 400 seconds! 🤠

A thread! 🧵 👇

Ved Parkash รีโพสต์แล้ว

If you're interested in MCP my colleague Kurt has just put up a really good intro to MCP for security engineers that covers what they are and how they work as well as what vulnerabilities they have, plus tools to test them, check it out

InsiderPhD's tweet image. If you're interested in MCP my colleague Kurt has just put up a really good intro to MCP for security engineers that covers what they are and how they work as well as what vulnerabilities they have, plus tools to test them, check it out
InsiderPhD's tweet image. If you're interested in MCP my colleague Kurt has just put up a really good intro to MCP for security engineers that covers what they are and how they work as well as what vulnerabilities they have, plus tools to test them, check it out
InsiderPhD's tweet image. If you're interested in MCP my colleague Kurt has just put up a really good intro to MCP for security engineers that covers what they are and how they work as well as what vulnerabilities they have, plus tools to test them, check it out
InsiderPhD's tweet image. If you're interested in MCP my colleague Kurt has just put up a really good intro to MCP for security engineers that covers what they are and how they work as well as what vulnerabilities they have, plus tools to test them, check it out

Loading...

Something went wrong.


Something went wrong.