Commanak46 Profile Banner
Monika Sharma Profile
Monika Sharma

@Commanak46

Followers
3K
Following
2K
Media
2
Statuses
401

Joined January 2022
Don't wanna be here? Send us removal request.
@Commanak46
Monika Sharma
23 hours
How a missing check in real-time apps can expose user data, tokens, or full account access.
0
1
11
@Commanak46
Monika Sharma
2 days
Streamline Your Bug Hunting Workflow with the Best Automation Tools and Strategies.
0
2
31
@Commanak46
Monika Sharma
3 days
How Source Maps Can Reveal Secrets, Admin Panels, and Internal Logic.
0
3
56
@Commanak46
Monika Sharma
6 days
Hijacking Shopify Stores with Just an Employee Email and a Perfectly-Timed Request.
0
12
92
@Commanak46
Monika Sharma
8 days
RT @sn0optsz: DNS Misconfig + Web Cache Deception → Sensitive Data Exposure
0
2
0
@Commanak46
Monika Sharma
9 days
How Ignored Issues Like Open Redirects, Verb Tampering, and Minor Info Leaks Can Lead to Account Takeovers and RCE.
0
0
8
@Commanak46
Monika Sharma
11 days
How Reading Between the Lines of JavaScript Files Reveals Undocumented Features and Debug-Only Access Panels.
1
4
20
@Commanak46
Monika Sharma
11 days
$600 Bounty: How to Revealed Hidden Read Receipts in Bumble’s Chat API.
0
3
32
@Commanak46
Monika Sharma
12 days
$500 Bounty: Subdomain Takeover on via Unclaimed Fastly CNAME.
2
12
74
@Commanak46
Monika Sharma
13 days
When Length Becomes a Weapon — Exploiting Insufficient Input Validation to Exhaust Resources and Trigger Service Downtime.
1
3
21
@Commanak46
Monika Sharma
14 days
A Step-by-Step Guide to Discovering, Exploiting, and Reporting a Critical Information Disclosure Flaw in Apache Airflow’s Logging System.
0
11
41
@Commanak46
Monika Sharma
16 days
Recon as Code: Build Your Own One-Click Recon CLI With Python + Shell + Existing Tools.From Subdomains to Secrets: Automate Full Recon in One Command Using Python, Bash & the Best Open-Source Tools.
0
2
11
@Commanak46
Monika Sharma
17 days
Advanced Gau + Waybackurls Filtering for Sensitive Files.Supercharge your recon with precision filtering of historical URLs to uncover hidden endpoints, secrets, and vulnerable files.
1
15
66
@Commanak46
Monika Sharma
17 days
How to Detect and Exploit Using Logger++, Burp, and Scripting.Burp + Logger Setup to Uncover Hidden Vulnerabilities.
0
26
109
@Commanak46
Monika Sharma
18 days
Uncover Hidden Endpoints, Secrets, and Vulnerabilities Buried Inside JavaScript Files.From Recon to Exploitation: A Hacker’s Roadmap to JavaScript Analysis.
0
12
57
@Commanak46
Monika Sharma
19 days
Unmask GitLab’s $16,000 Bounty: Arbitrary File Read in Project Import.
0
1
3
@Commanak46
Monika Sharma
20 days
Exploring the Dark Web: A Comprehensive Guide.
0
0
1
@Commanak46
Monika Sharma
21 days
A $3000 Bounty Breakthrough.How a $3000 Bounty Exposed Tor’s SFTP Vulnerability.
0
0
2
@Commanak46
Monika Sharma
21 days
Exposing Brave Browser’s IPC Vulnerability: A $300 Bounty Revelation.How a $300 Bounty Exposed Brave’s Critical Vulnerability.
0
4
25
@Commanak46
Monika Sharma
21 days
Mapping the Dark Web for Recon: Ethical OSINT Techniques.
0
1
2