I just published another writeup in my Bug Bounty Hunting Series: "Choosing Your First Program in Bug Bounties: A Beginner’s Guide"
it4chis3c.medium.com/choosing-your-…
Day 18: Mastering Insecure Deserialization Vulnerability
Uncover hidden Insecure Deserialization Vulnerability flaws with advanced payloads & Defense bypass techniques.
Check out the full blog here: it4chis3c.medium.com/day-18-of-30-d…#BugBounty#30daychallenge
Day 17: Mastering Path/Directory Traversal Vulnerability
Uncover hidden Path/Directory Traversal Vulnerability flaws with advanced payloads & Defense bypass techniques.
Check out the full blog here: it4chis3c.medium.com/day-17-of-30-d…#BugBounty#30daychallenge
4K Followers 5K FollowingCoFounder and CEO Nixtree | #Linux Server Security | #CyberSecurity | #Scripting #AWS #Cloud Consultant - Looking for business collaboration.
17 Followers 170 FollowingHello 🤟
i am Jetur Gavli 😎
I'm a Graphic Designer & Video Editor . Always on the look for exciting projects to work on and smart people to collaborate with!
5 Followers 233 FollowingAspiring Computer Science Professional | Passionate about Technology and Leadership | Engaged in Community Building and Knowledge Sharing
11 Followers 228 FollowingCoding aficionado and tech enthusiast. Passionate about creating software solutions that drive innovation. Let’s dive into the world of coding and explore
3K Followers 0 FollowingWe teach OSINT from multiple perspectives. Cybersecurity experts, investigators, law enforcement, and intelligence specialists read us to grow skills faster.
2K Followers 1 FollowingI was sitting alone, lost, in a park. @CircleNinja saw me one day, hired me and that's how I am here full time working at your service. 🤖
14K Followers 4K FollowingWeb AppSec Researcher | #❶ in Microsoft's Top 100 Security Researcher List -2018 | #❹ in Microsoft's Most Valuable Researcher List -2019 & 2020 | Thanks #🆇🆂🆂
83K Followers 16 FollowingTrend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
38K Followers 132 FollowingDetect real, exploitable vulnerabilities. Harness the power of Nuclei for fast and accurate findings without false positives.
37K Followers 183 FollowingNuclei uses a vast templating library to scan applications, cloud infrastructure, and networks to find and remediate vulnerabilities.
286K Followers 72 FollowingPart of @CISAgov, we respond to major incidents, analyze threats, and exchange critical cybersecurity information with partners around the world.
6K Followers 20 FollowingSquareX helps detect, mitigate & threat-hunt web attacks against end-users in real-time, including malicious sites, files, scripts, networks and more.
213K Followers 532 FollowingWe improve the security of apps with community-led open source projects, 260 local chapters, and tens of thousands of members worldwide. Famous for OWASP Top 10
53K Followers 616 FollowingGrzegorz Niedziela - a hacker who documents his hacking journey by creating and curating the best content about bug bounty and offensive security.
192K Followers 0 FollowingWe make learning web hacking and security easier. Online systems, code review, videos & courses that can be used to understand, test and exploit bugs!
109K Followers 2 FollowingMonitor your external network, search the Internet of Things and perform empirical market research. You can also find us on https://t.co/nPLFbFy8R5