
Biswajeet Ray๐ฎ๐ณ
@BiswajeetRay7
Followers
616
Following
9K
Media
682
Statuses
10K
Indian Security Researcher | Pentester | Analyst | #OSINT ๐#SOCMINT #GEOINT | Research & Analysis | Secured Microsoft, IBM, NASA & more | National Security.
India
Joined October 2017
Finally after lot's of hardwork and failure. Got Hall Of Fame from Microsoft. ๐คฉ #bugbounty #infosec #cybersecurity #recon #microsoft #security #bugbountytips #acknowledgment #osint #msrc #websecurity #pentesting #linux #vulnerability #india #bug #flaws
@microsoft
4
4
25
1) subfinder -d https://t.co/Lt4RvWuTYw -all -silent | httpx -silent -status-code -title -tech-detect -o alive.txt โ enumerate subs and keep only live, fingerprinted targets to pivot hard. 2) ffuf -u https://t.co/vH3zjxBzOe -w
target.com
Shop Target online and in-store for everything from groceries and essentials to clothing and electronics. Choose contactless pickup or delivery today.
0
31
169
Sensitive info leak via google dork site:.target.com ( "date of birth" OR confidential OR "internal use only" OR "balance sheet" OR "profit and loss" OR "banking details" OR "source code" OR "national id" OR "top secret" ) (ext:pdf OR ext:doc OR ext:ppt OR ext:txt OR ext:csv)
6
58
456
๐ Complete Guide: The SQL Injection Knowledge Base Website: https://t.co/blWAJczlQ8 author: Roberto Salgado #infosec
2
74
274
I used Email: attacker@gmail.com'\"<svg/onload=alert(document.cookie)>
๐ Website: "Please enter your email" ๐ You: "test-(${{7*7}})@intigriti.me"
1
33
228
Easy Confirming SQLi: Entry point detection:- ' " ` ') ") `) ')) ")) `)) #sqli #bugbountytip
3
27
148
Find vulnerable with automation Tips :- 1. site:*.company. com ext:php 2. echo https://company .com | gau | grep "\?" | uro | httpx -silent > parameters.txt 3. nuclei -l parameters.txt -t fuzzing-templates 4. Found xss,sqli,ssrf,open redirect etc #bugbountytips
1
62
388
Email verification bypass 1. Take url: target.*/signup 2. Enter email now need 6 digits otp and enter random otp 3. Intercept request>Do Intercept>response to this request change : 400 to 200 OK "CodeNotFound" to "codeverified" "Incorrect Code" to "verified OTP code" #bugbounty
12
56
507
The Bug Bounty Hunterโs Arsenal: Essential Tools & Resources โ๏ธ๐ Ready to start your bug bounty journey? Having the right tools and resources is the key to success.
4
50
298
I documented every book a hacker need to read https://t.co/EbhDEbBEfB
#bugbounty #bugbountytips #cybersecurity #hacking #books
oreobiscuit.gitbook.io
1
24
85
โกBug Bounty Checklist for Web App โ
Join Telegram to Download: https://t.co/Pz9cWGL18l ---------------------------------------------------------- ๐ Your Ethical Hacking Journey Starts Here โ https://t.co/sEV7r0xpMA ๐ Ready to Skill Up? Enroll Now โ https://t.co/rowz4KQfBa
0
34
156
Chaos in favourite Location of CIA & hotspot of multiple intelligence agencies across the globe. Strength to neighbouring countries. #Int #geopolitics #peace
0
0
0
๐ New video is live! xhacking_z Methodology โ Part 1, Google Dorking & In information Disclosure ๐ฐ How I Made $4,000 in 2 Months with Bug Bounty ๐ฅ Tips + Mindset + Recon Ideas Watch here ๐ https://t.co/MDYF2sQ2Jc
#BugBounty #GoogleDorking #InfoDisclosure #xhacking_z
3
21
150
Sometimes, when you get "500 internal server error" when testing for SQLi, that could be an indication that SQL is happening behind the application; don't stop there, you've to keep testing, and don't forget to apply "break and repair" :).... let's wait for part 2 from @5hady_
4
14
113
Huge shoutout to the one I call "the SQLi master", @5hady_ Thanks so much for the help and tips, whatever is in this article is definitely inspired by your ideas, plus a mix of my own research and what I've learned along the way. https://t.co/EWGuujn8my
10
69
359
The Ultimate SQLMap Guide: Detecting and Exploiting SQL Injection https://t.co/mXocTP9ggN
#bugbounty #bugbountytips #bugbountytip
0
3
15
API testing is a goldmine in bug bounty. Learn the tricks here: https://t.co/FYvOohAG4J
github.com
This challenge is Inon Shkedy's 31 days API Security Tips. - inonshk/31-days-of-API-Security-Tips
0
77
322
Iโve written an Open Redirect/SSRF security tool. If you like it, feel free to โญ the repo. Happy hunting ๐ฅ๐ฅ๐ฅ https://t.co/WXI9IRszMp
github.com
Scan, trace, and exploit redirect chains โ faster. - selimozcann/RedirectHunter
0
10
29
Last day I found an XSS that couldnโt be detected with Nuclei, Httpx, X8, ... cause of aggressive connection handling, even with all options, servers just didnโt respond. So I wrote a lightweight Go tool to reliably test GET/POST parameter reflections. https://t.co/XZHAyyAlU1
github.com
Lightweight reflection scanner. Contribute to xkmikze/kzxss development by creating an account on GitHub.
13
28
208
https://t.co/XVCw2bnbcO I created a bug bounty wordlist pack which is just a ZIP of ALL the wordlists i could find
drive.google.com
4
102
502