raz0rman Profile Banner
Hardik M Profile
Hardik M

@raz0rman

Followers
122
Following
2K
Media
41
Statuses
705

भारत
Joined June 2014
Don't wanna be here? Send us removal request.
@isro
ISRO
2 years
Chandrayaan-3 Mission: 'India🇮🇳, I reached my destination and you too!' : Chandrayaan-3 Chandrayaan-3 has successfully soft-landed on the moon 🌖!. Congratulations, India🇮🇳! #Chandrayaan_3 #Ch3
69K
272K
823K
@7h3h4ckv157
7h3h4ckv157
2 years
Hacking feels awesome 💯 When it comes to GraphQL, it's 🔥 I'd written a blog based on GraphQL Hacking: https://t.co/DGUdO3ve1i Thank you @PortSwigger ❤️ #Pentesting #Hacking #bugbountytips #infosec #cybersecuritytips #redteam #CTF #pwn #blueteam #Offsec #networksecurity
Tweet card summary image
infosecwriteups.com
Hey Infosec mates,
4
114
286
@_CryptoCat
CryptoCat
2 years
Want to become an ethical hacker? 🥷 Here's a list of my favourite [mostly practical] resources 📚 They are all free (or have a free option) and there's more high quality material here than anybody realistically has the time to complete ⏳
27
331
1K
@TakSec
Mike Takahashi
2 years
Google Dork - all the juicy extensions site:"target[.]com" ext:log | ext:txt | ext:conf | ext:cnf | ext:ini | ext:env | ext:sh | ext:bak | ext:backup | ext:swp | ext:old | ext:~ | ext:git | ext:svn | ext:htpasswd | ext:htaccess
29
705
3K
@wiz_io
Wiz
2 years
🚨 BREAKING: History written with just 9 lines of code! We've discovered #PyLoose, the FIRST documented Python-based fileless attack targeting cloud workloads. See the power of 9 lines of Python code below 👇🏽
24
398
2K
@theXSSrat
The XSS Rat - Proud XSS N00b :-)
3 years
30 tips for ethical hackers: Use Reconnaissance Tools: Tools like Nmap, Nikto, or Shodan can help with network and host enumeration. DNS Enumeration: Use tools like DNSRecon, DNSenum, and Fierce to perform DNS enumeration. Subdomain Enumeration: Use tools like Amass,
32
215
612
@Jhaddix
JS0N Haddix
3 years
This is an absolutely dope mindmap for attacking AD. https://t.co/zUyjR9yrpJ Source: https://t.co/rnh7cBPjm6
24
385
1K
@RachelTobac
Rachel Tobac
3 years
So excited our @wisporg @defcon scholarship IS BACK! Sending 15 scholars to DEF CON this year w/ a free ticket donated by the con plus $800 stipend for airfare, hotel, etc! Scholars apply here: https://t.co/SnwRP8euAa We are raising the stipend money here:
docs.google.com
Welcome to our Women in Security and Privacy (WISP) Scholarship submission form for DEF CON 31 to offer 15 passes + $800 travel stipend to WISP members. This year’s conference will be in-person in...
2
18
51
@flyingbeast320
Gaurav Taneja
3 years
We created History, the largest map of Bharat . Flew for almost 3 hrs and made a, 350 Km long map. . Aapke support auur Bharat Mata ke aashirvaad ke bina possible nahi tha. . #AasmanMeinBharat #HappyRepublicDay @captriturathee
1K
9K
60K
@intigriti
Intigriti
3 years
📈 Top 20 bug bounty YouTube channels of 2022 🧵 Let's look back at 2022 and specifically at the creators who ruled the bug bounty scene in 2022 These are the top 20 bug bounty creators! 👇
17
182
543
@aacle_
Abhishek Meena 🏵️
3 years
24 WEb-Application hacking Tools
27
402
1K
@0xNazgul
Nazgul
3 years
The best way to become a better auditor is to read and understand past exploits/findings. So, here is huge list of companies and their reports I've been putting together of almost every company under the sun:
Tweet card summary image
github.com
A list of Blockchain Security audit companies, solo auditors and location of public audits. - 0xNazgul/Blockchain-Security-Audit-List
11
96
353
@NahamSec
Ben Sadeghipour
3 years
Super proud of my team's work to come up with such a 🔥 line up for #NahamCon2022EU!
10
12
140
@TansuYegen
Tansu Yegen
3 years
Advices to keep the good employees
498
10K
34K
@danielmakelley
Daniel Kelley
3 years
30 cybersecurity search engines for researchers: 1. Dehashed—View leaked credentials. 2. SecurityTrails—Extensive DNS data. 3. DorkSearch—Really fast Google dorking. 4. ExploitDB—Archive of various exploits. 5. ZoomEye—Gather information about targets.
108
1K
4K
@0x0SojalSec
Md Ismail Šojal 🕷️
3 years
Top 15 - Vulnerability Scanners : 🥹⚙️ #infosecurity #Cybersecurite #bugbountytips
26
277
895
@XSaadAhmedX
Saad Ahmed
3 years
Ghauri - An Advanced SQL Injection Exploiter. Product by @SecurityFoster. Coded By: @r0oth3x49🎩 sqlmap VS ghauri Download: https://t.co/GxOwv6wT5N Note: This is only do SQL exploitation. The SQL detection burp plugin is still private. #bugbountytips #BugBounty
29
217
571
@mavrik_13
Rushabh Vyas ⚡
3 years
Here are some speakers Slides of @bsidesahmedabad 🔥👇
8
105
203
@rez0__
Joseph Thacker
3 years
Bug bounty is a lot of luck. But YOU control how many times you roll the dice. Here’s 5 ways to maximize your luck of finding a bug: 👇
33
276
1K