
Cryptcreed
@cryptcreed
Followers
22
Following
315
Media
1
Statuses
73
Cyber Security Enthusiast. Love to discover new things. Certified Ethical Hacker v10.
Joined March 2019
RT @hakluke: "A majority of the bugs were only possible due to automated asset discovery, but still required some manual inspection and exp….
www.assetnote.io
0
61
0
RT @infosec_au: I wrote a post on @assetnote's blog about hacking in bug bounties for the last four years. This should give you a good idea….
www.assetnote.io
0
313
0
RT @gvanrossum: Python 4 FAQ. 1. The version after 3.9 is 3.10; in fact it already exists (in github master). 2. If there ever is a version….
0
708
0
RT @ITSecurityguard: I just uploaded some of the most common file types for my Patrik's Bug Bounty Tools mind map here:. SVG: https://t.co/….
0
279
0
RT @infosecsanyam: RT @sectest9: RT @aufzayed: CAPTCHA BYPASS TECHNIQUES #bugbounty #bugbountytip #bugbountytips #cybersecurity #infosec.ht….
honeyakshat999.medium.com
Q.what is captcha???? according to Wikipedia- A CAPTCHA is a type of challenge-response test used in computing to determine whether or…
0
8
0
RT @iam_j0ker: hey hackers, started a write up series on find your first bug .#bugbounty #bugbountytips #bugbountyt….
0
168
0
RT @hakluke: Easily generate a custom wordlist from any domain:. echo " | subfinder -silent | hakrawler -plain -use….
0
136
0
RT @hakluke: Try this when testing webapps:. 1. Set up burp in browser1.2. Do a password reset request in browser1.3. Open the password res….
0
353
0
RT @AbhishekKarle3: #bugbounty #bugbountytip .#Android. The Easiest way to find deeplink patterns. search on google - targetscheme:// dee….
0
18
0
RT @XssPayloads: alert() with no parenthesis, back ticks, brackets, quotes, braces, etc. by @stealthybugs . a=8,b=confirm,c=window,c.onerro….
0
107
0
RT @debasishm89: Video Tuts on Debugging Automation Basics for Vuln. Researchers.*Debug Events.*Breakpoints.*Regist….
www.youtube.com
0
44
0
RT @m4ll0k2: Trick for bypass the rate-limit. (it worked for me in many companies). #bugbountytips #bugbountytip #bugbounty
https://t.co/….
0
328
0
RT @_justYnot: Hey! I just published this writeup on medium. Please do read it and let me know how was it. Big tha….
link.medium.com
Hello infosec community! I’m back again to share an interesting finding with you. Little bit about me, my name is Vedant and I’m a bug…
0
66
0
RT @cry__pto: -1-Pentest-Cheat-Sheets:.-2-Web Application Cheatsheet (Vulnhub):.-3- A cheat….
github.com
This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples. - Ignitetechnologies/Web-Application-Cheatsheet
0
118
0
RT @sudhanshur705: I just published Reflected XSS in Facebook’s mirror websites. Hope you will like it. Feedbacks are appreciated https://t….
link.medium.com
Heyyy Everyoneee,
0
175
0
RT @Mik317_: If you hate analyzing JS files with strange variable names and minified versions, you should give a look at .
0
35
0
RT @harshbothra_: Here's the playlist for all my recent Recon talks at a single place: Slides: .
www.youtube.com
You can find every talk on application security or bug bounty delivered by me over various platforms here in this playlist.
0
84
0
RT @HackersOnDemand: A common question asked is how do I best prepare for OSCP? .This list of OSCP-Like boxes from @TJ_Null + writeups from….
0
65
0
RT @karthiksunny007: Always try to fetch hidden web directories In subdomains of the target #bugbountytips #bugbou….
link.medium.com
Description:
0
91
0