Siddharth Bharadwaj Profile
Siddharth Bharadwaj

@____Siddharth__

Followers
96
Following
382
Media
24
Statuses
385

Indian 🇮🇳 | Learner

India
Joined March 2017
Don't wanna be here? Send us removal request.
@ethanjlim
Ethan Lim @ NeurIPS
29 days
Meet Android Use - an open source library that gives AI agents hands to control native Android apps. It bypasses expensive vision models to run on cheap hardware, automating field ops in places laptops can't go. Watch Android Use in action:
161
434
7K
@bsidesahmedabad
Security BSides Ahmedabad
7 months
🚨 OSCP GIVEAWAY ALERT🚨 We’re giving away 3 OSCP vouchers to supercharge your pentesting journey – proudly sponsored by @offsectraining ! 💥🙌 To enter: 1.✅ Follow Us 2.🔁 Retweet this post 3.❤️ Like this post 4.💬 Reply with your funniest cybersecurity meme 🎯 We’ll pick 3
562
522
894
@ProjectSEKAIctf
Project Sekai CTF
8 months
🎁Monthly Giveaway🎁 Hack The Box 6-month VIP+ - Follow, Like, and Retweet to join! - Winners will be picked randomly on 5 June. #hackthebox #giveaway #projectsekaictf
93
407
572
@____Siddharth__
Siddharth Bharadwaj
10 months
🚀 Major update to @PrettyRecon CLI! ✨ Complete rewrite featuring: • Latest API integration • Custom subdomain scanning • Real-time monitoring • Interrupt handling Repo: https://t.co/CBKyeN0PA8 Faster, more reliable, and packed with new features! 🛡️ #BugBounty #Recon
Tweet card summary image
github.com
PrettyRecon-cli is an unofficial cli client for PrettyRecon. This tool can be used to trigger various tasks on prettyrecon as well as fetch output of those tasks/scans. - SiddharthBharadwaj/pretty...
2
2
8
@thel3l
Rithwik Jayasimha
1 year
Apple released a hearing aids feature for the AirPods Pro a while ago. I bought a pair for grandma, but then realized that the feature was geoblocked in India So we at @_lagrangepoint decided to unblock it. It ended up involving a leaky microwave and building a Faraday cage:
383
2K
18K
@vulncure
Vulncure
1 year
🚨 FREE OSCP Voucher Giveaway 🚨 🏆Vulncure is giving away a FREE OSCP voucher! 🎓 Boost your skills with one of the most respected certification To Enter : < 25th Oct 1️⃣ Follow @Vulncure 2️⃣ Like & RT 3️⃣ Tag 3 friends 👨‍💻👩‍💻 🎁 Bonus: Tell us why YOU want to be OSCP certified!
261
278
538
@KN0X55
KNOXSS
1 year
🚨 KNOXSS GIVEAWAY! 🚨 LIKE ♥️ and SHARE 📤 this to have a chance to win one of the following 🥇 1 Pro Sub 1-year 🥈 1 Pro Sub 6-months 🥉 1 Pro Sub 3-months Winners of this draw will be announced on October 7th 2024, good luck! 😀🤞 #KNOXSS - The magic ✨ #XSS tool.
67
215
372
@InfoSecComm
InfoSec Community
2 years
📢Attention Bug Bounty Hunters & CTFers based in India📍 🔎Here's a chance for you to play a part in keeping critical infrastructure secure... ...& win bounty upto 10 lakks in return💰 NCIIPC live hacking event happening this month. Interested participants DM us, & we'll get
2
10
43
@____Siddharth__
Siddharth Bharadwaj
2 years
@____Siddharth__
Siddharth Bharadwaj
2 years
I passed the PJWT Certification by @TCMSecurity (Took me 2 attempts). This is what I learnt from this: 1. Do not skip anything you find and feel it should be reported even if you do not feel it is having any impact. (Happens when you come from a BugBounty Bg) 1/Thread
0
0
0
@____Siddharth__
Siddharth Bharadwaj
2 years
Forgot to mention, if you feel something is not working as intended in the exam environment and resetting does not fix it. Try approaching the function in a different way ( Happened with me ) Thanks for reading!
1
0
1
@____Siddharth__
Siddharth Bharadwaj
2 years
What can be improve: - The lab in the course has some negligible inconstancies which would be great if fixed - The exam portal was perfect for the first attempt but the timer had some issues in the second one. ( I have not reported this to them yet but ig it will be fixed ) 5/5
1
0
1
@____Siddharth__
Siddharth Bharadwaj
2 years
What I liked about TCM Security: - The support team is just too fast. All my tickets were closed under 30 mins. - The course includes all you need for passing - They provide a student discount - The exam simulates a real pentest - Hints are provided if you fail an attempt 4/T
1
0
1
@____Siddharth__
Siddharth Bharadwaj
2 years
4. While writing the report add images for all steps. For eg. For an XSS, add an image of the form, then one of inserted payload into the form and at last add the image for the triggered payload. 5. Do not hesitate to contact support for clearing any queries you may have. 3/T
1
0
1
@____Siddharth__
Siddharth Bharadwaj
2 years
2. Do not let failure break your confidence. Failing gave me one more attempt to look at the application allowing me to find more vulnerabilities and understand the application better. 3. Take lots of Screenshots. I prefer using a screen recorder while testing the app. 2/T
1
0
1
@____Siddharth__
Siddharth Bharadwaj
2 years
I passed the PJWT Certification by @TCMSecurity (Took me 2 attempts). This is what I learnt from this: 1. Do not skip anything you find and feel it should be reported even if you do not feel it is having any impact. (Happens when you come from a BugBounty Bg) 1/Thread
2
0
7
@m4ll0k
m4ll0k
2 years
Exploring Continuous Monitoring platforms/SaaS similar to @PrettyRecon. Any suggestions?
2
1
11
@____Siddharth__
Siddharth Bharadwaj
2 years
It can be used to automate the repetitive process of adding and removing fleets in Trickest and makes the workflow smaller by needing almost 0 user interaction. Login > Add Fleet > Copy Command > Create VM > SSH > Paste Command ❌ AutoTrickster ✅
0
0
0
@intigriti
Intigriti
2 years
Another thought struck your head! 💡 You read recently someone was able to bypass an open redirect using example\.computer! Which is a valid TLD! A quick look at the ICANN list of valid TLDs you could find 6 more like these! 🤑️
1
4
18