Twitter | Search | |
ranjit pahan
329
Tweets
278
Following
75
Followers
Tweets
ranjit pahan retweeted
Jai Kumar Sharma Jul 11
I've found a good article to start on SAML vulnerabilities. Let's share the knowledge!
Reply Retweet Like
ranjit pahan retweeted
Frans Rosén May 23
Here are my slides from my talk at the Facebook/Google-hosted BountyCon 2019 in Singapore earlier this year: Live Hacking like a MVH – A walkthrough on methodology and strategies to win big
Reply Retweet Like
ranjit pahan retweeted
Emad Shanab Jun 17
Hacking thousands of websites via third-party JavaScript libraries.
Reply Retweet Like
ranjit pahan Jul 18
After equifax launched VDP in , i must say two points 1. you are million dollar company but running points-only bugbounty program. 2. you are making good money but still using burpsuite crack version.
Reply Retweet Like
ranjit pahan retweeted
Somdev Sangwan Jul 17
Sharing a regex I wrote to match MD2, MD4, MD5, SHA224, SHA256, SHA384, SHA512 in case someone needs it. ([a-fA-F0-9]{32}(?:[a-fA-F0-9]{8})?(?:[a-fA-F0-9]{16})?(?:[a-fA-F0-9]{8})?(?:[a-fA-F0-9]{32})?(?:[a-fA-F0-9]{32})?)
Reply Retweet Like
ranjit pahan retweeted
Emad Shanab Jul 17
How Recon helped me to to find a Facebook domain takeover
Reply Retweet Like
ranjit pahan retweeted
Orange Tsai  🍊 Jul 17
Appetizer for our and talk ! and I will cover more hard-core exploitations, crazy bugs chains and SSL VPN 0days in our incoming presentation! Please look forward to it :P
Reply Retweet Like
ranjit pahan retweeted
Adrien Jul 16
Hacking Jenkins Part 1 - Play with Dynamic Routing... by
Reply Retweet Like
ranjit pahan retweeted
kmkz Jul 15
Discovering GraphQL endpoints and SQLi vulnerabilities
Reply Retweet Like
ranjit pahan retweeted
Mobile Security Jul 11
Reply Retweet Like
ranjit pahan retweeted
Vinothkumar Apr 14
AWS s3 bucket misconfiguration - Paytm.
Reply Retweet Like
ranjit pahan Jul 7
you got it right.
Reply Retweet Like
ranjit pahan Jul 6
Thanks for awesome bounty
Reply Retweet Like
ranjit pahan retweeted
Priyanshu Sahay Jul 5
👉 Mobile Security Penetration Testing Tools List for All-in-one Mobile Security Frameworks. Including Android and iOS Application Penetration Testing Cheat sheet..
Reply Retweet Like
ranjit pahan retweeted
𝔸𝕤𝕙𝕒𝕣 𝕁𝕒𝕧𝕖𝕕 Dec 24
Some tools to get files/URLs and extract URLs from them ... + + I am pretty sure there are others out there. please add in comments.
Reply Retweet Like
ranjit pahan Jul 3
Add me: ranjit_p
Reply Retweet Like
ranjit pahan retweeted
Arif Khan Jul 3
Nice research and talk on Jenkins by
Reply Retweet Like
ranjit pahan Jul 3
Replying to @Alra3ees
Probably it will be duplicate of my report
Reply Retweet Like
ranjit pahan retweeted
STÖK Jun 29
🔥 Burp Suite tutorial: IDOR vulnerability automation using Autorize and AutoRepeater (bug bounty) with by the community for the community!
Reply Retweet Like
ranjit pahan retweeted
Emad Shanab Jun 28
Android-Reports-and-Resources: A big list of Android Hackerone disclosed reports and other resources. RCE. XSS. Privilege Escalation. Bypass. And more.
Reply Retweet Like