Siddharth Bharadwaj
@____Siddharth__
Followers
96
Following
382
Media
24
Statuses
385
Meet Android Use - an open source library that gives AI agents hands to control native Android apps. It bypasses expensive vision models to run on cheap hardware, automating field ops in places laptops can't go. Watch Android Use in action:
161
434
7K
🚨 OSCP GIVEAWAY ALERT🚨 We’re giving away 3 OSCP vouchers to supercharge your pentesting journey – proudly sponsored by @offsectraining ! 💥🙌 To enter: 1.✅ Follow Us 2.🔁 Retweet this post 3.❤️ Like this post 4.💬 Reply with your funniest cybersecurity meme 🎯 We’ll pick 3
562
522
894
🎁Monthly Giveaway🎁 Hack The Box 6-month VIP+ - Follow, Like, and Retweet to join! - Winners will be picked randomly on 5 June. #hackthebox #giveaway #projectsekaictf
93
407
572
🚀 Major update to @PrettyRecon CLI! ✨ Complete rewrite featuring: • Latest API integration • Custom subdomain scanning • Real-time monitoring • Interrupt handling Repo: https://t.co/CBKyeN0PA8 Faster, more reliable, and packed with new features! 🛡️ #BugBounty #Recon
github.com
PrettyRecon-cli is an unofficial cli client for PrettyRecon. This tool can be used to trigger various tasks on prettyrecon as well as fetch output of those tasks/scans. - SiddharthBharadwaj/pretty...
2
2
8
Apple released a hearing aids feature for the AirPods Pro a while ago. I bought a pair for grandma, but then realized that the feature was geoblocked in India So we at @_lagrangepoint decided to unblock it. It ended up involving a leaky microwave and building a Faraday cage:
383
2K
18K
🚨 FREE OSCP Voucher Giveaway 🚨 🏆Vulncure is giving away a FREE OSCP voucher! 🎓 Boost your skills with one of the most respected certification To Enter : < 25th Oct 1️⃣ Follow @Vulncure 2️⃣ Like & RT 3️⃣ Tag 3 friends 👨💻👩💻 🎁 Bonus: Tell us why YOU want to be OSCP certified!
261
278
538
1 Bug, $50K+ in bounties: how Zendesk left a backdoor in hundreds of companies #bugbountytips
https://t.co/8pkfFsXRWR
gist.github.com
1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies - zendesk.md
76
341
1K
📢Attention Bug Bounty Hunters & CTFers based in India📍 🔎Here's a chance for you to play a part in keeping critical infrastructure secure... ...& win bounty upto 10 lakks in return💰 NCIIPC live hacking event happening this month. Interested participants DM us, & we'll get
2
10
43
I passed the PJWT Certification by @TCMSecurity (Took me 2 attempts). This is what I learnt from this: 1. Do not skip anything you find and feel it should be reported even if you do not feel it is having any impact. (Happens when you come from a BugBounty Bg) 1/Thread
0
0
0
Forgot to mention, if you feel something is not working as intended in the exam environment and resetting does not fix it. Try approaching the function in a different way ( Happened with me ) Thanks for reading!
1
0
1
What can be improve: - The lab in the course has some negligible inconstancies which would be great if fixed - The exam portal was perfect for the first attempt but the timer had some issues in the second one. ( I have not reported this to them yet but ig it will be fixed ) 5/5
1
0
1
What I liked about TCM Security: - The support team is just too fast. All my tickets were closed under 30 mins. - The course includes all you need for passing - They provide a student discount - The exam simulates a real pentest - Hints are provided if you fail an attempt 4/T
1
0
1
4. While writing the report add images for all steps. For eg. For an XSS, add an image of the form, then one of inserted payload into the form and at last add the image for the triggered payload. 5. Do not hesitate to contact support for clearing any queries you may have. 3/T
1
0
1
2. Do not let failure break your confidence. Failing gave me one more attempt to look at the application allowing me to find more vulnerabilities and understand the application better. 3. Take lots of Screenshots. I prefer using a screen recorder while testing the app. 2/T
1
0
1
I passed the PJWT Certification by @TCMSecurity (Took me 2 attempts). This is what I learnt from this: 1. Do not skip anything you find and feel it should be reported even if you do not feel it is having any impact. (Happens when you come from a BugBounty Bg) 1/Thread
2
0
7
Exploring Continuous Monitoring platforms/SaaS similar to @PrettyRecon. Any suggestions?
2
1
11
It can be used to automate the repetitive process of adding and removing fleets in Trickest and makes the workflow smaller by needing almost 0 user interaction. Login > Add Fleet > Copy Command > Create VM > SSH > Paste Command ❌ AutoTrickster ✅
0
0
0
Another thought struck your head! 💡 You read recently someone was able to bypass an open redirect using example\.computer! Which is a valid TLD! A quick look at the ICANN list of valid TLDs you could find 6 more like these! 🤑️
1
4
18