Gawasharks Profile
Gawasharks

@gawasharks

Followers
181
Following
792
Media
8
Statuses
790

Joined August 2019
Don't wanna be here? Send us removal request.
@gawasharks
Gawasharks
2 years
1
0
3
@gawasharks
Gawasharks
5 years
2
0
2
@_swanandx
Swanand Mulay
5 years
Time to give back to the amazing community. I am giving away 1x1 month @tryhackme subscription voucher.๐Ÿ˜ To enter, Retweet and like this tweet. I will choose winner by 12 May.๐Ÿ˜‰ Drop some resources for learning new skills of any field that you like in comments. ๐Ÿ˜Š
34
73
126
@MrDamanSingh
Damanpreet Singh๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿ
5 years
Got RCE in 2 minutes via SSTI, ~waybackurls https://t.co/DC4dDq3TjO | qsreplace "daman{{9*9}}" > fuzz.txt ~ffuf -u FUZZ -w fuzz.txt -replay-proxy http://127.0.0.1:8080/ (captured requests in burp) searched: daman81 in burp, got 43 results from 1266 requests, noiicee๐Ÿผ
target.com
Shop Target online and in-store for everything from groceries and essentials to clothing and electronics. Choose contactless pickup or delivery today.
22
307
828
@securestep9
Sam Stepanyan
5 years
Forgot your password? Need to reset it? How can attackers exploit the password reset form to take over your account? Check out: Top 10 Common Password Reset Flaws - an awesome blog post by Anurag SR (@cyph3r_asr) #BugBountyTips #BugBounty https://t.co/y276kWZ2te
9
139
297
@apisecurityio
APIsecurity.io
5 years
Methodology for API BOLA/IDOR finding by @CorbridgeMax: * Private vs public scope, * Patterns in API route naming, * Adding IDs to requests, * Replacing parameter names, * Sending multiple values, etc See https://t.co/piKNTDvoSw for other tips, examples, details. via @clintgibler
1
10
21
@hacksclusive
Hacksclusive
5 years
Tomorrow marks the 1 year anniversary of Hacksclusive! To celebrate this milestone we are giving away a couple of @PentesterLab 3-month vouchers! What do you need to do? - Follow @hacksclusive - retweet and like this post! Thatโ€™s it! Winners will be picked in 24 hours!
10
97
133
@galnagli
Nagli
5 years
Ever find a phpMyAdmin login portal and default creds wont work? Try to access the /phpmyadmin/setup/ endpoint and you might be presented with authentication bypassed configurable admin panel. This got me a nice bounty on @Synack. Ref: https://t.co/1rX05GOBby #bugbountytips
25
308
972
@hunter0x7
Ahsan Khan
5 years
22
371
998
@hunter0x7
Ahsan Khan
5 years
finding endpoints: cat js | grep -o -E "(https?://)?/?[{}a-z0-9A-Z_\.-]{2,}/[{}/a-z0-9A-Z_\.-]+"
10
266
955
@gawasharks
Gawasharks
5 years
Best one ever โค๏ธ
0
0
0
@hunter0x7
Ahsan Khan
5 years
21
469
1K
@theXSSrat
The XSS Rat - Proud XSS N00b :-)
5 years
#bugbountytips Use the following DORK and try to do directory brute forcing if your target allows it. This will look for things you are not supposed to access that are behind a login page. inurl:login | inurl:signin | intitle:Login | intitle:"sign in" | inurl:auth
7
67
191