SIDDHANT SHUKLA Profile
SIDDHANT SHUKLA

@ghost__man01

Followers
369
Following
3K
Media
118
Statuses
2K

Jai Shree Ram 🪷🕉️ https://t.co/7E8vnMFsFK https://t.co/L9XlTJLhX8

INDIA
Joined June 2021
Don't wanna be here? Send us removal request.
@ghost__man01
SIDDHANT SHUKLA
4 months
Tweet media one
0
0
6
@ghost__man01
SIDDHANT SHUKLA
20 hours
Tweet media one
0
8
0
@ghost__man01
SIDDHANT SHUKLA
20 hours
0
0
2
@ghost__man01
SIDDHANT SHUKLA
20 hours
0
0
0
@ghost__man01
SIDDHANT SHUKLA
20 hours
0
0
0
@ghost__man01
SIDDHANT SHUKLA
20 hours
0
0
0
@ghost__man01
SIDDHANT SHUKLA
20 hours
0
0
0
@ghost__man01
SIDDHANT SHUKLA
20 hours
0
0
0
@ghost__man01
SIDDHANT SHUKLA
20 hours
0
0
0
@ghost__man01
SIDDHANT SHUKLA
20 hours
0
0
5
@ghost__man01
SIDDHANT SHUKLA
20 hours
0
0
0
@ghost__man01
SIDDHANT SHUKLA
20 hours
0
0
1
@ghost__man01
SIDDHANT SHUKLA
20 hours
0
0
0
@ghost__man01
SIDDHANT SHUKLA
20 hours
0
0
0
@ghost__man01
SIDDHANT SHUKLA
2 days
🚨 New Blog Drop: Accessing Ardmin Directory after hours of dead ends, a short nap, and some smart recon, I found an exposed admin path on a hidden subdomain. Read how a small detail led to a valid bug 👇.🔗 #bugbountytips #bugbounty #CyberSecurity #hack.
0
0
4
@ghost__man01
SIDDHANT SHUKLA
4 days
RT @chiraggupta8769: shodan search org:"Target" http.favicon.hash:116323821 --fields ip_str,port --separator " " | awk '{print $1":"$2}' |….
0
233
0
@ghost__man01
SIDDHANT SHUKLA
4 days
RT @wadgamaraldeen: The bad employee got fired, and the Researcher got rewarded twice🫡🔥♥️.I really liked it🔥. #bugb….
0
6
0
@ghost__man01
SIDDHANT SHUKLA
5 days
RT @Yaseen11211: Auth bypass using response manipulation.Access to internal assets/repositories. Tip : If you found .
0
19
0
@ghost__man01
SIDDHANT SHUKLA
6 days
RT @RivekTamang: How to Easily Find exposed Secret keys and Tokens in Bug Hunting. #bugbountytips #BugBounty.
0
3
0
@ghost__man01
SIDDHANT SHUKLA
6 days
RT @young_vanda_: “Just came back from a long hiatus…” 🥷🥷🥷.Scored a reward + hit 4K rep on @intigriti . Been away — side quests in the dung….
0
2
0
@ghost__man01
SIDDHANT SHUKLA
8 days
RT @mamunwhh: IDOR vulnerability. 1. Change the /me endpoint to /users. 2. Change the GET method to the POST method. 3. Add the Content-Typ….
0
72
0