sampritdas8 Profile Banner
Samprit Das Profile
Samprit Das

@sampritdas8

Followers
181
Following
2K
Media
20
Statuses
2K

๐Ÿ‘จโ€๐Ÿ’ป Senior Security Consultant at @RedHuntLabs ๐Ÿ–ฅ๏ธ https://t.co/hAlhW0Tc2n In IT ๐ŸŽญ Certified Ethical Hacker ๐Ÿ‘จโ€๐Ÿ’ป Penetration Tester ๐Ÿ‡ฎ๐Ÿ‡ณ CTF Player ๐Ÿ’ป Programmer

India
Joined April 2015
Don't wanna be here? Send us removal request.
@shivangmauryaa
Shivang
27 days
Bounty : 3,000,000 IDR Bug : SQL injection UNION and BOOLEAN Details : Found a GraphQL API , in request found Regin parameter. initially tried with basic payloads. After keeping testing found there was Boolean based vulnerability with payload : -1' OR 3*2*0=6 AND 000579=000579
Tweet media one
8
18
400
@therceman
Anton
2 months
Bug Bounty Tip When testing an app for SQL injection, don't forget to check the form keys in addition to the values. To bypass spaces, you can use the encoded tab %09. For other symbols, simply URL encode them
Tweet media one
2
43
348
@minchoi
Min Choi
7 months
DeepSeek R1 has really changed the AI LLM game. People are creating wild use cases beyond ChatGPT. There's a major shift. 10 examples:
Tweet media one
218
812
6K
@GodfatherOrwa
Godfather Orwa ๐Ÿ‡ฏ๐Ÿ‡ด
8 months
Hello everyone โ™ฅ a little bit write-up of #bugbountytip #bugbountytips I am going to write here ..... Title: getting unauthorized access on 3rd party's/workspaces & and building your checklist for quickly locating bugs there via massive recon we know that its helpful to look
Tweet media one
Tweet media two
41
342
1K
@RedHuntLabs
RedHunt Labs | Attack Surface Management (ASM)
8 months
Cybersecurity Meets Creativityโ€”In the most epic way possible! ๐ŸŽถโค๏ธโ€๐Ÿ”ฅ Introducing: "RedHunt Labs ASM: No Room to Hide" โ€“ the cybersecurity song you never knew you needed, but now going straight into your playlist. ๐Ÿคฉ Start Vibing Now ๐ŸŽง: https://t.co/V6wdQK5yrh This song is a
1
2
2
@JanmeyjaySharma
Janmeyjay Sharma
8 months
Exploring #SSRF vulnerabilities? This Cloud Metadata Dictionary by @Jhaddix is a must-have! Useful for testing metadata services in cloud environments. https://t.co/fCOLeYBMZj #bugbountytip #togetherwehitharder #cybersecuritytips
Tweet card summary image
gist.github.com
Cloud Metadata Dictionary useful for SSRF Testing - cloud_metadata.txt
0
12
51
@KN0X55
KNOXSS
10 months
Basic Static Analysis Script (to find possible #XSS in source code) #!/bin/bash # 1) save it as xssaminer # 2) allow execution: chmod +x xssaminer # 3) run it & check usage: ./xssaminer if [ -z $1 ] then echo -e "Usage:\n$0 FILE\n$0 -r FOLDER" exit else f=$1 fi sources=(GET
Tweet media one
2
65
274
@RedHuntLabs
RedHunt Labs | Attack Surface Management (ASM)
10 months
We finally did itโ€”turned those little profile pictures into real people! After what feels like ages of digital meetings and mystery voices, the @RedHuntLabs team hit Nainital to see whoโ€™s who in real life. Spoiler Alert: everyoneโ€™s even cooler off-screen! ๐Ÿ˜Ž For four days, we
Tweet media one
0
4
12
@nullenc0de
Paul Seekamp
11 months
I made a new tool called ServiceLens that maps services linked to a target's domain. This gives me insight into a good phishing template for the customer. Spending time on a good template that mixes in with the normal traffic helps a lot. https://t.co/p2SGEIj36F Screenshot:
Tweet media one
5
62
290
@krishnsec
Kanhaiya Sharma ๐Ÿ‡ฎ๐Ÿ‡ณ
1 year
If you have access to #jenkins dashboard use below Script Console cmd for poc ``` def passwdFile = new File("/etc/passwd") println passwdFile.text ``` #P1 #bugbountytips #bugbounty
Tweet media one
14
76
420
@RedHuntLabs
RedHunt Labs | Attack Surface Management (ASM)
1 year
Vegas Calling! โค๏ธโ€๐Ÿ”ฅ Cyber Enthusiasts favourite week of the year is here! ๐Ÿคฉ @RedHuntLabs crew is all set to touchdown at @BlackHatEvents USA 2024 and @defcon 32, and we can't wait to hang out with y'all between 24 July 2024 and 11 August 2024 in San Francisco/ Las Vegas.
Tweet media one
1
3
6
@krishnsec
Kanhaiya Sharma ๐Ÿ‡ฎ๐Ÿ‡ณ
1 year
made nuclei template for this last month ๐Ÿ™Œ #bugbountytips #rce https://t.co/Sj6TI0q97q
Tweet media one
@GodfatherOrwa
Godfather Orwa ๐Ÿ‡ฏ๐Ÿ‡ด
1 year
story of very quick RCE Target/cgi-bin/dmt/reset.cgi?db_prefix=%26id%26 You can to add this paths for ur wordlist cgi-bin/dmt/reset.cgi?db_prefix=%26id%26 cgi-bin/reset.cgi?db_prefix=%26id%26 fuzzing as well cgi-bin/FUZZ.cgi?FUZZ=%26id%26 #bugbountytips โค๏ธ
Tweet media one
6
81
308
@Alra3ees
Emad Shanab - ุฃุจูˆ ุนุจุฏ ุงู„ู„ู‡
2 years
Nuclei Templates Collection. Updated.
Tweet card summary image
github.com
Nuclei Templates Collection. Contribute to emadshanab/Nuclei-Templates-Collection development by creating an account on GitHub.
1
25
74
@intigriti
Intigriti
2 years
Found a GraphQL endpoint that you want to test? InQL is just for you! InQL is an awesome BurpSuite extension for advanced GraphQL pentesting!! ๐Ÿ˜Ž Check it out ๐Ÿ‘‡ https://t.co/zWdmDGETtb
Tweet media one
0
95
369
@kong_sec
Kongsec - Cyber Merch
2 years
Just used echo https://t.co/1XlFv7B1Rg | gau | httpx -mc 200 | grep .zip To find valid URLs with .zip extensions. Found a zip file, but after downloading, a Java code exposed JDBC configuration! ๐Ÿ’ก๐Ÿ”’ #bugbountytips Duplicate but high severity @ADITYASHENDE17 #kongsec
5
40
127
@PortSwiggerRes
PortSwigger Research
2 years
Voting is now live for the Top ten web hacking techniques of 2023! Make a brew, browse the nominations, and cast a vote for your personal top ten here:
Tweet card summary image
portswigger.net
Welcome to the community vote for the Top 10 Web Hacking Techniques of 2023.
0
51
172