Kathan Patel
@KathanP19
Followers
11K
Following
3K
Media
118
Statuses
2K
Cyber Security Engineer @ Qualcomm | CEH | SRT | Security Enthusiast | Github - https://t.co/35EatPIhOV
Joined November 2012
A lot of you guys were requesting Gitbook for HowToHunt. It took hell lot of work to arrange them π, hope so you like it, and make some pull request, what's left.π Here you go: π₯ https://t.co/MWI5jlYnYI
#bugbountytips #bugbounty #BugBountyTips
kathan19.gitbook.io
14
193
504
EXCLUSIVE: 200+ Government of India websites have been hacked! From Google, they now redirect to vc66 [dot] net, a domain registered on Dec 21, 2024. Its an online money-making scam but links to malwareβan attack called SERP hijacking. Search [site:*.gov.in fast cash] to see.
16
72
315
Hey, community! π Excited to attend @bsidesahmedabad If you see me around, don't hesitate to say hi. Looking forward to some great technical chats! π
1
0
7
Updated WayBackFetch with a new feature that removes snapshot urls with duplicate content, leaving only urls with unique content. Thank you, Sensei @dwisiswant0 π If you haven't already checked the project here's the GitHub link :
github.com
Tool for fetching all the available waybackmachine snapshot urls - KathanP19/waybackfetch
0
5
21
Created a small tool to retrieve archived snapshots urls of web pages from the Internet Archive. Use it in your recon and let me know your feedback!! π #bugbounty #bugbountytips #infosec
2
8
23
I found the solution using httpx itself, so the solution is that you need to find the sweet spot for threads. "-t 5" worked for me. It varies from target to target, so add this step to your recon checklist before running any tool for best results. #bugbountytip π
1
1
4
Httpx seems to be not reliable when checking urls suggest some tool which can do better job and also has filter based on web content or title. #BugBounty
7
1
26
Trying to find Origin IP check out this tool created by @mmrecon to find IP behind WAF: https://t.co/0fdqasIC7p
#bugbountytips
github.com
Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unwaf will check SPF records. - mmarting/unwaf
2
44
159
HowToHunt is updated with some new resources and techniques check out: https://t.co/8xkz6rmD9B - Reverse Engineer an API by @offensivedroid - 2FA bypass method by @ome_mishra - GraphQL Resource .. and more Sorry guys for late update lots of new things going in life. π
github.com
Collection of methodology and test case for various web vulnerabilities. - KathanP19/HowToHunt
4
75
258
Lessons: - Context is King. THINK! - To break you must first understand: Know your target's technologies & the services they use. - Learn to code. Top: https://t.co/M1R6j67Tkh
43
74
850
I've made over 100k on SSRF vulnerabilities. They aren't always as simple as pointing it at localhost or AWS Metadata service. Here are some tricks I've picked up over the past 5 years of web app testing:
47
953
3K
The iOS Reloader is a weaponizing tool designed for jailbroken iOS devices. It facilitates the installation of a collection of essential tools on iOS devices for penetration testing purposes. https://t.co/qXR8A3EJPG
#HR51KDB
#bugbountytip #bugbountytips #ios #vapt
github.com
The iOS Reloader is a weaponizing tool for jailbroken iOS devices. It facilitates the installation of a collection of tools on iOS devices (iPhone/iPad) that are essential for penetration testing p...
2
26
62
Excited to kickstart my career as a Cyber Security Engineer at @Qualcomm! Joining the amazing #TeamQualcomm and ready to learn, grow, and make a difference in the world of technology. Grateful for the opportunity! πͺπβ¨ #New2Q #Qniversitygrad
10
2
63
AD FOR OSCP (Active Directory Guide) https://t.co/VuDkJAGkED
abhishekgk.medium.com
Hello, hope you are having a great day. This blog guides beginners who are trying to prepare for oscp, or for people who are worried aboutβ¦
1
52
148
Check out this awesome api my friend made to get subdomains of given domain, one more passive source to integrate in your tool π. #bugbountytips
0
2
7
It has been 11 days since Google made its 8 new TLDs available on May 3, 2023. I decided to fetch several domains that have spawned up with the .zip and .mov TLD ever since and do a quick analysis. A thread π§΅
2
19
33
I don't think so getting CVE and finding a bunch of bugs in websites , u can call yourself a Researcher. The term itself is clear, did u do research on existing vulnerability and found some new vector ?
14
8
68