Striker satya2 (@tines_io) 's Twitter Profile
Striker satya2

@tines_io

Security Researcher | Bug Hunter | Microsoft HOF

ID: 1285238600150380545

calendar_today20-07-2020 15:42:55

710 Tweet

65 Followers

383 Following

Rami (drunkrhin0) 🇵🇸 (@drunkrhin0) 's Twitter Profile Photo

Want to start bug bounties but don't know where to begin? 🕵️‍♀️💻 You're in luck! I get asked this question daily So, I've put together a small list of resources to help you get started on your bug bounty adventure. 💥 A #bugbountytips thread 🧵 1/10

Striker satya2 (@tines_io) 's Twitter Profile Photo

Bug Type : Sensitive Information Disclosure via phpinfo file Tip : Never ignore the phpinfo files, You may get a lot of Juicy Information #bugbounty #bugbountytips #bughunting #cybersecurity #cyberattack #cyberawareness #informationsecurity #hacker #hackerone #bugcrowd

Bug Type : Sensitive Information Disclosure via phpinfo file

Tip : Never ignore the phpinfo files, You may get a lot of Juicy Information

#bugbounty #bugbountytips #bughunting #cybersecurity #cyberattack #cyberawareness #informationsecurity #hacker #hackerone #bugcrowd
Florian Hansemann (@cyberwarship) 's Twitter Profile Photo

"Microsoft SharePoint Server Elevation of Privilege Vulnerability Exploit (CVE-2023-29357)" #infosec #pentest #redteam socradar.io/microsoft-shar…

"Microsoft SharePoint Server Elevation of Privilege Vulnerability Exploit (CVE-2023-29357)"

#infosec #pentest #redteam 
socradar.io/microsoft-shar…
Luke Stephens (hakluke) (@hakluke) 's Twitter Profile Photo

IPs go in ---> hostnames come out! 🚀 Useful for finding domains and subdomains belonging to a company from their IP addresses! Install now. Link in thread 🧵👇

IPs go in ---> hostnames come out! 🚀

Useful for finding domains and subdomains belonging to a company from their IP addresses! 

Install now. Link in thread 🧵👇
Godfather Orwa 🇯🇴 (@godfatherorwa) 's Twitter Profile Photo

Burp Ex 403 Bypasser 5GC API Parser Active Scan++ Backslash Powered Scanner CO2 IP Rotate J2EEScan JS Link Finder JS Miner Logger++ Log Viewer GAP Distribute Damage IIS Tilde Look Over There Param Miner Software Vulnerability Scanner SAML Raider Autorize Encode IP Asset Discovery

0 day exploit (@0day_exploit_) 's Twitter Profile Photo

Top Microsoft IIS Thread 🧵:👇 Here is how to find IIS bugs 1) Collect a huge number of targets, subdomains, and ports and even brutforceing the targets 2) Short the IIS services nuclei-templates/fuzzing/iis-shortname.yaml #BugBounty #bugbountytips #infosec Godfather Orwa 🇯🇴

Striker satya2 (@tines_io) 's Twitter Profile Photo

I just published How .git folder can be exploited to access sensitive data link.medium.com/972GTHWI1Fb #bugbounty #bugbountytip #cybersecuritytips #infosecurity #bug #hackers #hackerspace #cybersecuritynews #aws #informationsecurity #informationtechnology #cybersecurity #software

Ihtesham Haider (@ihteshamit) 's Twitter Profile Photo

I created a complete FREE ChatGPT mastery guide. This guide will teach you how to unlock the full potential of ChatGPT and make money. (FREE for 24 hours!) To get this guide: • Like/Retweet this tweet • Comment "SEND" • Follow me (So I can DM you)

I created a complete FREE ChatGPT mastery guide.

This guide will teach you how to unlock the full potential of ChatGPT and make money.

(FREE for 24 hours!)

To get this guide:

• Like/Retweet this tweet
• Comment "SEND"
• Follow me (So I can DM you)
Godfather Orwa 🇯🇴 (@godfatherorwa) 's Twitter Profile Photo

Let’s made something new Let’s keep this tweet for question’s You can ask me here in a comment and will answers in a comment , and let’s everyone learn and found some useful questions/answers keep this tweet as reference by re-tweet #bugbounty #bugbountytips #questions ✌️

hugopicanzo (@hugopicanzo) 's Twitter Profile Photo

Without any doubt, this must be the best resource out there about HTML/Javascript behaviors and discrepancies and how to exploit it by huli ! If you want to understand this world on a deeper level Ir eally recommend spending some time studying it! aszx87410.github.io/beyond-xss/en/

VAIDIK PANDYA (@h4x0r_fr34k) 's Twitter Profile Photo

Fuzzing lists - Part 2 Wordlists for few specific Funtions you can use for Specific Purpuses. 1. WEB-INF github.com/orwagodfather/… 2. git_config github.com/random-robbie/… 3. Kubernates / k8s github.com/manojdeshmukh4… 4. log github.com/random-robbie/… 5. pl github.com/orwagodfather/… 6.

𐰚𐰼𐰇𐱅 (@ynsmroztas) 's Twitter Profile Photo

If you encounter the default IIS Windows window, do not forget to add /haproxy and /netdata to your wordlist and scan them, if you gain unauthorized access here, you will earn a reward 🌹🥰 #bugbountytips #BugBounty

If you encounter the default IIS Windows window, do not forget to add /haproxy and /netdata to your wordlist and scan them, if you gain unauthorized access here, you will earn a reward 🌹🥰

#bugbountytips #BugBounty
Harshleen Chawla (@harshleenchawl2) 's Twitter Profile Photo

Search engines for osint🔍📑 leak.sx scylla.sh intelx.io 4iq.com leaked.site hashes.org leakcheck.io vigilante.pw leakcheck.net weleakinfo.to

Godfather Orwa 🇯🇴 (@godfatherorwa) 's Twitter Profile Photo

Slides of my talk in Security BSides Ahmedabad I hope you like it and found it a little bit useful docs.google.com/presentation/d… #bugbounty #bugbountytip #bugbountytips #infosec Thanks for support for all of you and Security BSides Ahmedabad & bugcrowd