Cryptcreed Profile
Cryptcreed

@cryptcreed

Followers
21
Following
314
Media
1
Statuses
73

Cyber Security Enthusiast. Love to discover new things. Certified Ethical Hacker v10.

Joined March 2019
Don't wanna be here? Send us removal request.
@hakluke
Luke Stephens (hakluke)
5 years
"A majority of the bugs were only possible due to automated asset discovery, but still required some manual inspection and exploitation." This is an important point, automation is only part of the puzzle! Great blog @infosec_au https://t.co/tIiK9bkqZT
assetnote.io
2
60
202
@infosec_au
shubs
5 years
I wrote a post on @assetnote's blog about hacking in bug bounties for the last four years. This should give you a good idea on what I've been reporting and how I find bugs and incorporate them back into our platform. https://t.co/BhL4DiQlaB
assetnote.io
12
312
768
@gvanrossum
Guido van Rossum
5 years
Python 4 FAQ. 1. The version after 3.9 is 3.10; in fact it already exists (in github master). 2. If there ever is a version 4, the transition from 3 to 4 will be more like that from 1 to 2 rather than 2 to 3.
141
704
4K
@ITSecurityguard
Patrik Fehrenbach
5 years
I just uploaded some of the most common file types for my Patrik's Bug Bounty Tools mind map here: SVG: https://t.co/IJhzII3XNf PDF: https://t.co/gyA2RxQbpZ XMIND: https://t.co/PUC8ur6ldT PNG: https://t.co/zKucgzsACm enjoy! 🥰🥳👑 #bugbountytips #BugBounty
Tweet media one
10
277
738
@iam_j0ker
Safaras
5 years
4
166
341
@hakluke
Luke Stephens (hakluke)
5 years
Easily generate a custom wordlist from any domain: echo " https://t.co/Aps3n9I4or" | subfinder -silent | hakrawler -plain -usewayback -scope yolo | sed $'s/[:./?=:]/\\\n/g' | anew
9
136
390
@hakluke
Luke Stephens (hakluke)
5 years
Try this when testing webapps: 1. Set up burp in browser1 2. Do a password reset request in browser1 3. Open the password reset email in browser2 and copy the token 4. Search your Burp history for the token, if it is there, you've got yourself a nice easy account takeover!
15
351
1K
@AbhishekKarle3
Abhishek Karle
5 years
#bugbounty #bugbountytip #Android The Easiest way to find deeplink patterns search on google - targetscheme:// deeplink OR On github - "targetscheme://" deeplink
2
18
54
@XssPayloads
XSS Payloads
5 years
alert() with no parenthesis, back ticks, brackets, quotes, braces, etc. by @stealthybugs a=8,b=confirm,c=window,c.onerror=b;throw-a
10
107
432
@debasishm89
Debasish Mandal - দেবাশীষ 🇮🇳
5 years
Video Tuts on Debugging Automation Basics for Vuln. Researchers https://t.co/phSySsB1Yx *Debug Events *Breakpoints *Registers, Memory Thread & Module Manipulation *Hook API *Writing Your First Fuzzer #vulnerability #bugbountytips #bugbounty #fuzzing #ReverseEngineering #malware
Tweet card summary image
youtube.com
0
44
83
@m4ll0k
m4ll0k
5 years
Trick for bypass the rate-limit.. (it worked for me in many companies) #bugbountytips #bugbountytip #bugbounty
Tweet media one
6
327
954
@www_latish
nobody_cares
5 years
Sharing my OSCP notes. I hope it will help you guys! https://t.co/e0z9jPLA26
5
94
244
@sudhanshur705
sudi
5 years
I just published Reflected XSS in Facebook’s mirror websites Hope you will like it. Feedbacks are appreciated
Tweet card summary image
link.medium.com
Heyyy Everyoneee,
25
175
489
@Mik317_
Michele Romano
5 years
If you hate analyzing JS files with strange variable names and minified versions, you should give a look at
1
35
114
@WeAreOnSecurity
OnSecurity
5 years
A common question asked is how do I best prepare for OSCP? This list of OSCP-Like boxes from @TJ_Null + writeups from @rana__khalil are great resources to use heading into the PWK lab! Machine List: https://t.co/i9Ubg457VY Rana's Writeups: https://t.co/eNOjnEHihk #OSCP #PWK
Tweet media one
1
65
171
@karthiksunny007
karthik sunny
5 years
https://t.co/Idhljfvkix Always try to fetch hidden web directories In subdomains of the target #bugbountytips #bugbounty #cybersecurity
link.medium.com
Description:
1
90
193