Mohsin Khan ๐Ÿ‡ฎ๐Ÿ‡ณ (@tabaahi_) 's Twitter Profile
Mohsin Khan ๐Ÿ‡ฎ๐Ÿ‡ณ

@tabaahi_

24 | Full-time Bug Hunter (4+ years) ๐Ÿž | I break apps & hit the gym ๐Ÿ’ป๐Ÿ’ช | Open for Collaboration ๐Ÿค
Discord: discord.com/invite/MxByUgdJ

ID: 1376506308023607296

linkhttp://mokhansec.medium.com calendar_today29-03-2021 12:07:41

7,7K Tweet

17,17K Followers

308 Following

Hussein Daher (@hussein98d) 's Twitter Profile Photo

You think that successfull people are lucky? Destiny saved them and not you? They were working 24 hours a day while you were chilling elsewhere. So stand up and get your shit done.

Sam Curry (@samwcyo) 's Twitter Profile Photo

Client side path traversal is a really fun thing to explore for CSRF and XSS. Revisited an unexploitable blind SSRF which (1) required the authorization header to be sent and (2) passed the authorization header to the provided "url" parameter. This would be account takeover ...

Shreyas Chavhan (@shreyas_chavhan) 's Twitter Profile Photo

I'm creating a group of 6 hackers, and the goal will be to hack together, be consistent, share knowledge, help each other and keep each other accountable on our journey to be great hackers. I'll be picking a few of you, doesn't matter if you are a beginner โฌ‡๏ธ #BugBounty

ashish_r_padelkar (@engi_arp) 's Twitter Profile Photo

Just a general thought: I had a rough day yesterday both in bug bounty and in the trading market. It was quite stressful. But in the evening, I went out to play some tennis ball cricket, played a good innings, and completely forgot about all the stress. The point Iโ€™m trying to

YS (@yshahinzadeh) 's Twitter Profile Photo

Iโ€™m a web guy, so I usually donโ€™t work on non-web applications since my mind doesnโ€™t do binary. With the help of my friend for reverse engineering, I managed to uncover some CVEs. It was very challenging for me, hope you like it: blog.voorivex.team/hacking-veeam-โ€ฆ