Ashudh Atma Profile
Ashudh Atma

@AtmaAshudh

Followers
1
Following
33
Media
0
Statuses
30

Joined October 2019
Don't wanna be here? Send us removal request.
@intigriti
Intigriti
5 years
out of scope bug your crush ๐Ÿค [rejected]
16
27
203
@Pethuraj
Pethuraj M
5 years
Scilla - ๐Ÿดโ€โ˜ ๏ธ Information Gathering tool ๐Ÿดโ€โ˜ ๏ธ - DNS / Subdomains / Ports / Directories enumeration https://t.co/m3RtMwPWVn #bugbounty #owasp #cybersecurity
1
87
236
@Alra3ees
Emad Shanab - ุฃุจูˆ ุนุจุฏ ุงู„ู„ู‡
5 years
Quick test all the hosts for LFI via @pdiscoveryio httpx:- https://t.co/J8iYZil1B0 httpx -l allhosts -paths /root/list.txt -threads 100 -random-agent -x GET,POST,PUT -title -tech-detect -status-code -follow-redirects -title -mc 200 -match-regex "root:[x*]:0:0:"
4
129
292
@pdnuclei
Nuclei by ProjectDiscovery
5 years
[BLOG] - Secrets Scanning with Nuclei Blog - https://t.co/6sAcKUP4uf #hackwithautomation #pentest #bugbounty #secrets
1
72
225
@impratikdabhi
Pratik Dabhi
5 years
Check out this Awesome blog by @sidxparab https://t.co/7negzgF3mp
0
41
90
@Shre_yy
Shreyal Jain
5 years
Found two SQL injections๐Ÿฅณ In collaboration with @e11i0t_4lders0n Time Based SQLi Payload used: 'xor(if(now()=sysdate(),sleep(10),0))or' Boolean Based Blind SQLi payload used: 1 AND 1726=1726 Thanks @_codeh4ck3r for the help!
20
93
500
@intigriti
Intigriti
5 years
APKLeaks is a very efficient tool for extracting links and secrets from mobile .apk applications quickly. Thanks for the #BugBountyTip, @_superhero1! #BugBountyTips
6
158
458
@j_opdenakker
John Opdenakker
5 years
Where do Russian Hackers store their exploits? /ussr/bin/
73
443
3K
@theXSSrat
The XSS Rat - Proud XSS N00b :-)
5 years
Please do it right ๐Ÿ˜‚๐Ÿ˜‚ if you rip my courses, donโ€™t rip the free versions ๐Ÿ˜… also for the other courses, at least rip my latest versions. That notes is old. Also remove the tracker image you can only see by downloading courses. It looks bad for a hacker to not notice that ๐Ÿ˜ณ
4
7
40
@theXSSrat
The XSS Rat - Proud XSS N00b :-)
5 years
Oh wow!!! He hacked my course coupons ๐Ÿ˜ฑ๐Ÿ˜ฑ๐Ÿ˜ฑ
2
2
26
@avanish46
Avanish Pathak
5 years
If you want to get started with android application security, I have summarised all the resources in one place and blogged about it. Do give it a read and I hope you find it useful. Thanks @cobalt_io for giving me this opportunity โœŒ๏ธ #android #security https://t.co/W8xgzbw4V0
5
171
365
@theXSSrat
The XSS Rat - Proud XSS N00b :-)
5 years
Hacking is important. But you know what matters more? Keeping a healthy mind and relaxing every now and then โค๏ธ
12
8
234
@theXSSrat
The XSS Rat - Proud XSS N00b :-)
5 years
FREE @udemy COURSE ๐Ÿšจ๐Ÿšจ PLEASE SHARE THIS LINK WITH AS MANY PEOPLE AS YOU CAN <3 https://t.co/weWAcSLnS4 Thank you so much to all of you who support my work in any way shape or form. Limited time offer free course, coupon expires on 09.06.21 23:59 GMT+1
19
54
128
@theXSSrat
The XSS Rat - Proud XSS N00b :-)
5 years
BURP SUITE PRO GIVEAWAYYYYYYYY ๐Ÿ˜ฑ๐Ÿ˜ฑ๐Ÿ˜ฑ๐Ÿ˜ฑ๐Ÿ˜ฑ
6
3
35
@theXSSrat
The XSS Rat - Proud XSS N00b :-)
5 years
Still 3 codes left, only 2 out of 20 000 hackers have been able to figure it out so far ... can you?
0
1
14
@theXSSrat
The XSS Rat - Proud XSS N00b :-)
5 years
A practical demonstration of my bug bounty methodology v3 is now free without paywall on github: https://t.co/aGKSwk4rK8 #bugbountytips #infosec #hacking #BugBounty
2
75
195
@theXSSrat
The XSS Rat - Proud XSS N00b :-)
5 years
hailo mitron. main kahana chaahata hoon ki main tumase pyaar karata hoon! haracheej ke lie dhanyavaad How much did i fuck up?
43
11
131
@Alra3ees
Emad Shanab - ุฃุจูˆ ุนุจุฏ ุงู„ู„ู‡
5 years
Subdomains brutforce wordlists collection:- https://t.co/UyA6WuXXg5
Tweet card summary image
github.com
Contribute to emadshanab/Subdomains-brutforce-wordlists-collection development by creating an account on GitHub.
0
67
152
@SMHTahsin33
Syed Mushfik Hasan Tahsin
5 years
Don't Leave any bug just like that after resolve, test a bypass on that..who knows what might happen ๐Ÿ™†โ€โ™€๏ธ Initial Payload : javascript:alert(); Fix: **Filters out ()** Bypass: javascript:alert``;๐Ÿ’โ€โ™€๏ธ
4
31
142