Bhargav Gajera
@bhargavgajera10
Followers
454
Following
670
Media
9
Statuses
98
๐ฎ๐ณ Senior Security Consultant
Pune, India
Joined March 2012
Unlocked the Bootloader of the Google Pixel SmartWatch (WearOS) using a Modded USB cable. Waiting for the support @topjohnwu... Thanks for the info @ShinyQuagsire... #NetSPI
5
13
90
Created a tool --> ExportHunter! For testing Exported Android Activities. Generate and launch APK to call activities with Bundles! No more hassling with ADB or Android Studio. Check it out! https://t.co/xFDTJ7g2PO
#Android #CyberSecurity"
2
3
9
Stop yourself from using excuses for anything ever no matter how valid. STOP saying them & eventually you'll STOP thinking them. "Did you crash the car" Yes > Yes, it was icy The car still crashed. The excuse repairs nothing. You failed. Accept it. Learn. Don't do it again
468
2K
21K
As promised, here the the content of the workshop "Mobile app instrumentation" we presented at @NSConclave
https://t.co/R4cScGrA3O
0
14
27
Almost every publicly available CVE PoC database. https://t.co/MzWdFiqRwJ
#Security #Pentesting #SecurityEveryday #bugbounty #pentest #appsec
0
2
7
Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not. Wrote this tool this weekend, PS Iโm noob in coding ๐ @0xAsm0d3us @Jhaddix @stokfredrik @theXSSrat @NahamSec Link: https://t.co/5I03eJbk8E
12
87
201
A curated list of Android Security materials and resources For Pentesters and Bug Hunters https://t.co/vdwIvKrOo4
#Security #Pentesting #SecurityEveryday #bugbounty #pentest #AppSec
github.com
A curated list of Android Security materials and resources For Pentesters and Bug Hunters - saeidshirazi/awesome-android-security
0
34
98
Inspired by @infosec_au's blog on high-frequency bug hunting, I and @caffeinevulns decided to try the same on @SynackRedTeam targets. As an update, I wrote this article that showcases all the bugs that I found and a short write-up on I how I found them: https://t.co/qE0cpMVVqt
kuldeep.io
A writeup about my journey to find 120 bugs in 120 days
18
180
427
4
96
254
Very Short Blog about Open Redirection bug I found based on SRC. https://t.co/vpxv9GIQ0M
bdgajera.medium.com
Open Redirection
0
1
5
4
103
199
reFlutter helps with Flutter apps reverse engineering using the patched version of the Flutter library which is already compiled and ready for app repacking. https://t.co/NI5y46msN0
#pentest #MobileSecurity #bugbounty #bugbountytips #flutter
0
17
29
Blog about a bug I found on Thick Client application while reviewing the source code. https://t.co/MaDoOCdWUW
bdgajera.medium.com
Arbitrary Command injection
0
29
57
Tip for Android Beginners: ++ sudo from inside ssh -> copy .APK to sdcard before pulling in case privilege error
Extract installed apk from an android device using adb with easy steps: adb shell pm list packages adb shell pm path com.example.someapp adb pull /data/data/app/com.example.someapp.apk /pathtosave #pentest #MobileSecurity #bugbounty #bugbountytips
0
0
6
Testing a Cordova app? Enable webview debugging using @fridadotre to debug the application. https://t.co/ttMn7eAw4t
#Cordova #pentest #MobileSecurity #frida #bugbounty #bugbountytips
gist.github.com
Cordova - Enable Webview Debugging. GitHub Gist: instantly share code, notes, and snippets.
0
26
48
Found Arbitrary Command Exec in a Thick Client App. Not some crazy overflow or PE. Still Popping up a CALC brings excitement every time.
2
6
18
I just published @Hacker0x01's #hacktivitycon2021 CTF writeup: Reactor Android Challenge ๐ฑ https://t.co/NLAoQRYHIA
infosecwriteups.com
Hey there, HackerOne hosted h@activitycon 2021 CTF a few weeks back. I got time to play around with a few challenges. Here is the write-upโฆ
1
18
48
Let's discuss a scenario, bypassing Root detection with @fridadotre ๐งต๐
10
60
153