Bhargav Gajera Profile
Bhargav Gajera

@bhargavgajera10

Followers
454
Following
670
Media
9
Statuses
98

๐Ÿ‡ฎ๐Ÿ‡ณ Senior Security Consultant

Pune, India
Joined March 2012
Don't wanna be here? Send us removal request.
@bhargavgajera10
Bhargav Gajera
3 years
Unlocked the Bootloader of the Google Pixel SmartWatch (WearOS) using a Modded USB cable. Waiting for the support @topjohnwu... Thanks for the info @ShinyQuagsire... #NetSPI
5
13
90
@bhargavgajera10
Bhargav Gajera
8 months
Created a tool --> ExportHunter! For testing Exported Android Activities. Generate and launch APK to call activities with Bundles! No more hassling with ADB or Android Studio. Check it out! https://t.co/xFDTJ7g2PO #Android #CyberSecurity"
2
3
9
@Cobratate
Andrew Tate
3 years
Stop yourself from using excuses for anything ever no matter how valid. STOP saying them & eventually you'll STOP thinking them. "Did you crash the car" Yes > Yes, it was icy The car still crashed. The excuse repairs nothing. You failed. Accept it. Learn. Don't do it again
468
2K
21K
@jaimin_gohel
Jaimin J Gohel ๐Ÿ‘จโ€๐Ÿ’ป
3 years
As promised, here the the content of the workshop "Mobile app instrumentation" we presented at @NSConclave https://t.co/R4cScGrA3O
0
14
27
@busk3r
Nishith K
4 years
0
2
7
@FR13ND0x7F
Anmol K Sachan
4 years
Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not. Wrote this tool this weekend, PS Iโ€™m noob in coding ๐Ÿ˜ @0xAsm0d3us @Jhaddix @stokfredrik @theXSSrat @NahamSec Link: https://t.co/5I03eJbk8E
12
87
201
@kuldeepdotexe
Kuldeep Pandya
4 years
Inspired by @infosec_au's blog on high-frequency bug hunting, I and @caffeinevulns decided to try the same on @SynackRedTeam targets. As an update, I wrote this article that showcases all the bugs that I found and a short write-up on I how I found them: https://t.co/qE0cpMVVqt
kuldeep.io
A writeup about my journey to find 120 bugs in 120 days
18
180
427
@IamRenganathan
Renganathan
4 years
Jira payloads A thread ๐Ÿงต #bugbounty #bugbountytips #jira
4
96
254
Orwellian Logic ๐Ÿ––๐Ÿผ
1
5
23
@bhargavgajera10
Bhargav Gajera
4 years
Very Short Blog about Open Redirection bug I found based on SRC. https://t.co/vpxv9GIQ0M
bdgajera.medium.com
Open Redirection
0
1
5
@busk3r
Nishith K
4 years
Android Webview Hacking ๐Ÿงต๐Ÿ‘‡ #pentest #MobileSecurity #frida #bugbounty #bugbountytips #smali
4
103
199
@busk3r
Nishith K
4 years
reFlutter helps with Flutter apps reverse engineering using the patched version of the Flutter library which is already compiled and ready for app repacking. https://t.co/NI5y46msN0 #pentest #MobileSecurity #bugbounty #bugbountytips #flutter
0
17
29
@bhargavgajera10
Bhargav Gajera
4 years
Blog about a bug I found on Thick Client application while reviewing the source code. https://t.co/MaDoOCdWUW
Tweet card summary image
bdgajera.medium.com
Arbitrary Command injection
0
29
57
@bhargavgajera10
Bhargav Gajera
4 years
Tip for Android Beginners: ++ sudo from inside ssh -> copy .APK to sdcard before pulling in case privilege error
@busk3r
Nishith K
4 years
Extract installed apk from an android device using adb with easy steps: adb shell pm list packages adb shell pm path com.example.someapp adb pull /data/data/app/com.example.someapp.apk /pathtosave #pentest #MobileSecurity #bugbounty #bugbountytips
0
0
6
@bhargavgajera10
Bhargav Gajera
4 years
Found Arbitrary Command Exec in a Thick Client App. Not some crazy overflow or PE. Still Popping up a CALC brings excitement every time.
2
6
18
@cyber_advising
Cyber Advising
4 years
XSS to RCE in the Opera Browser https://t.co/0KyiNITknO
1
55
146
@jaimin_gohel
Jaimin J Gohel ๐Ÿ‘จโ€๐Ÿ’ป
4 years
Let's discuss a scenario, bypassing Root detection with @fridadotre ๐Ÿงต๐Ÿ‘‡
10
60
153