Jayesh25_ Profile Banner
Jayesh Madnani Profile
Jayesh Madnani

@Jayesh25_

Followers
14K
Following
1K
Media
60
Statuses
935

CEO and Hacker in charge @ EIS | HackerOne Top 10 | https://t.co/JSX03WutFN

http://hackerone.com/jayesh25
Joined February 2016
Don't wanna be here? Send us removal request.
@Jayesh25_
Jayesh Madnani
5 days
Here’s how I discovered a critical issue on a wide-scope program using @netlas_io 👇. The target had a pretty generic login flow via a 3rd-party service with specific keywords. It was pretty much using the same codebase reused across multiple assets. I used.
4
34
212
@Jayesh25_
Jayesh Madnani
5 days
Found an interesting bug a while back and thought I’d share it here 👇. I came across an unused API endpoint inside a JavaScript file - `/api/users/<user_id>/activities/`. It wasn’t being called anywhere within the app, so naturally, I tried to hit it manually using my JWT from.
8
37
276
@Jayesh25_
Jayesh Madnani
1 month
It's wild how a $50 bounty a few years ago felt more exciting than a $10,000 bounty in 2025. I can't be the only one feeling that way. right? 🤔🤔.
19
5
207
@Jayesh25_
Jayesh Madnani
3 months
Note if it wasn’t for the low hanging fruits in 2020 I wouldn’t have made it this far. It was a great motivation booster knowing that i could get some bounties even if it was for the silliest issues I’ve ever reported. There’s nothing to be ashamed of if you’ve gotta scoop up the.
0
3
56
@Jayesh25_
Jayesh Madnani
3 months
I’ve noticed that most new folks who reach out for guidance in bug bounty feel overwhelmed early on trying to learn everything at once. That often leads to half-baked knowledge across multiple areas and slower overall progress. Here's what I recommend instead 👇. 1/.Pick one.
16
66
354
@Jayesh25_
Jayesh Madnani
3 months
I've often hesitated to participate in public bug bounty programs, mistakenly believing that if a program is public, it's likely already been thoroughly tested and is bug-free. However, I've been proven wrong. Over the past 2 years, I've learned valuable lessons that have.
14
50
324
@Jayesh25_
Jayesh Madnani
4 months
Here's a technique I use to maximize results and avoid VPS abuse reports while testing for automated XSS or similar vulnerabilities. Malicious payloads are often blocked outright by WAF providers like Akamai, Cloudflare, etc., meaning you won’t even get a chance to work on a WAF.
4
19
160
@Jayesh25_
Jayesh Madnani
4 months
Bug Bounty Tip: Keeping It simple & consistent. Over time, I’ve realized that overly complicated automation in bug bounty isn’t as exciting or rewarding—at least not for me. Instead of trying to automate everything under the sun, I’ve found that focused, consistent recon on core.
12
56
430
@Jayesh25_
Jayesh Madnani
5 months
🚀 Unspoken Bug Bounty Rules – From many years of failures & experience!. 🕵️‍♂️ Got a similar bug across multiple assets but fear the program might count them as one for payout despite requiring multiple fixes?.✅ Report one at a time. Wait for a bounty. Then submit the next one.
7
64
295
@Jayesh25_
Jayesh Madnani
6 months
💥 Simple HTTP Parameter Pollution escalated to PII Leak → 4-Digit Bounty!. ✅ {"proxyPayload":"Limit=20&userID=<attacker_ID>"} → 200 OK. ❌ {"proxyPayload":"Limit=20&userID=<victim_ID>"} → "errorMessage":"Forbidden Access". ✅
Tweet media one
6
37
252
@Jayesh25_
Jayesh Madnani
6 months
RT @zhero___: very pleased to announce the release of my new article based on my research that led to CVE-2024-46982 titled:. Next.js, cach….
0
239
0
@Jayesh25_
Jayesh Madnani
6 months
RT @Jayesh25_: 🔐Secrets no one will share with you - Here's a technique that might grant you access to takeover other users' accounts using….
0
274
0
@Jayesh25_
Jayesh Madnani
7 months
Great initiative by @c3l3si4n! Don’t forget to include the tool below in your list for discovering subdomains for your bug bounty targets. It’s always great to have multiple data sources :).
@c3l3si4n
celesian
7 months
In the past few months, I've been making a subdomains database containing 1.6 billion subdomains scrapped from multiple public (and private) sources. This database is now public and FREE and can be queried on the following website. Enjoy!
Tweet media one
0
8
100
@Jayesh25_
Jayesh Madnani
7 months
Bug Bounty Tips💰: Easy $2000 bounty via enabled "PUT" method!. Here’s the nuclei template I used to identify this vulnerability:.🔗 The key question:.If it’s a public nuclei template, why wasn’t it flagged as a duplicate, and how come no one else found.
8
81
503
@Jayesh25_
Jayesh Madnani
7 months
Found a pretty cool feature on @Netlas_io called the "Attack Surface Discovery Tool" to quickly map the external attack surface for large-scope targets. This helped me find some quick wins during a recent bug bounty engagement. What’s awesome? It provides a complete overview of
Tweet media one
1
42
259
@Jayesh25_
Jayesh Madnani
8 months
🚨 Yay, we were rewarded with $20,000 on our.@Hacker0x01 submission for a SSRF bug discovered in collaboration with @Shlibness! 💰🎉. 🥳 We uncovered a Critical SSRF vulnerability, turning it into unauthorized access to internal admin endpoints, leading to PII leaks and
Tweet media one
58
147
1K
@Jayesh25_
Jayesh Madnani
9 months
🔒Bug Bounty Tips - Here's how I earned a $6000 Bounty by escalating a simple Elmah File Disclosure Issue 🔒. 💡 If you haven't already, add /elmah and /elmah.axd to your wordlist! These paths often lead to Elmah file disclosures, a finding many researchers report as Low/Medium
Tweet media one
7
100
480
@Jayesh25_
Jayesh Madnani
9 months
💰Bug Bounty Tips: Scored a $5,000 bounty via APIs exposed on a Swagger endpoint! 💻. Discovered a Swagger UI showing API endpoints—all endpoints required auth. Instead of stopping there, I tried something different: using an Authorization token and cookies from a different
Tweet media one
11
98
576