sonyCrackle Profile Banner
Pikachu Profile
Pikachu

@sonyCrackle

Followers
27
Following
550
Media
1
Statuses
12

Looking for bugs.

Mars
Joined April 2019
Don't wanna be here? Send us removal request.
@isro
ISRO
5 years
Paying tributes to the Father of the Indian Space Program, Dr. Vikram Ambalal Sarabhai on his birth anniversary. Recently, Chandrayaan-2 captured the Sarabhai Crater on Moon. Read more here https://t.co/VQwS4HYh0g #VikramSarabhai
170
2K
13K
@cry__pto
Ammar Amer
6 years
-1-Shodan Queries.txt: https://t.co/RG6on661H9 -2-Information Gathering with Shodan.pdf: https://t.co/LqWZs1gHoN -3-Passive Data Collecting: Shodan.pdf: https://t.co/TYWVbNMPYl more: https://t.co/gNMSDGULS6 #bugbountytips #Hacking #osint #PenTest #redteam
2
262
570
@owaspamass
OWASP Amass
6 years
Check out this OWASP Amass tutorial authored by project contributor @ngkogkos! #dns #osint #recon #bugbountytips #assetdiscovery https://t.co/0ymY02tU73
0
113
198
@RahulKankrale
Rahul Kankrale
6 years
If android app opening urls in webview then always look for js interfaces through Object.getOwnPropertyNames And access custom js interfaces and there functions @Hacker0x01 #AndroidHackingMonth Like this 👇 https://t.co/YnyNJm4J2e
Tweet card summary image
hackerone.com
**Summary:** com.twitter.android.lite.TwitterLiteActivity is set to exported and doesn't validate data pass to intent due to which this activity vulnerable to steal users local files, javascript...
6
52
132
@thedawgyg
dawgyg - WoH
6 years
When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past. #bugbountytip #bugbountytip #bugbounty
18
580
2K
@ngkogkos
Nick || hunt4p1zza
6 years
Performing Race Condition tests w/ Burp Suite, coupon redeem example: 1. Use Null Payloads 2. Use same number of threads to requests (x15 here) & 0 throttle 3. Disable the baseline request (it's will be sent first w/ delay invalidating your coupon) #bugbounty #burpsuitetip
1
154
352
@sonyCrackle
Pikachu
6 years
Do not submit any report to @Winnicakes. I reported critical IDOR they patched the issue and didn't even send a single reply.
0
0
0
@neeraj_sonaniya
Neeraj Sonaniya
6 years
Revealing AWS S3 bucket name: step 1: Find any CDN object URL step 2: append following string to after URL: `?AWSAccessKeyId=[Valid_ACCESS_KEY_ID]&Expires=1766972005&Signature=ccc ` and boom it will reveal the bucket name. #BugBounty #security #bugbountytip #bugbountytips
8
338
812
@sonyCrackle
Pikachu
6 years
UI changed but its still there. Time to replce it @Hacker0x01
1
0
6
@0xw2w
Max Yaremchuk
7 years
Wrote a new article https://t.co/uq35TonvGx «Сookie-based XSS exploitation | $2300 Bug Bounty story». The article contains exploitation methods that I have ever used, which will help you to understand how to use this XSS to prove and increase vulnerability impact. Happy reading:)
Tweet card summary image
medium.com
For quite a long time I have been hunting for vulnerabilities on the HackerOne platform, allocating a certain amount of time outside the…
3
242
538