We’ve Reached 20K Subscribers on YouTube!
I can’t put into words how grateful I am today. Just a few months ago, we celebrated 10K subscribers, and now, we’re a community of over 20,000! I’m truly thankful to each and every one of you for your incredible support and encouragement throughout this journey.
To show my appreciation, I’m planning to host a free 2-hour webinar on bug bounty (I’ll announce the topic and date soon).
Thank you all so much from the bottom of my heart. Let’s keep learning and keep hacking together!
I can’t put into words how grateful I am today. Just a few months ago, we celebrated 10K subscribers, and now, we’re a community of over 20,000! I’m truly thankful to each and every one of you for your incredible support and encouragement throughout this journey.
To show my appreciation, I’m planning to host a free 2-hour webinar on bug bounty (I’ll announce the topic and date soon).
Thank you all so much from the bottom of my heart. Let’s keep learning and keep hacking together!
❤22👍6🔥3👎1🕊1
Hi everyone! Just wanted to update you all with our website. Our website is down because of the vps service provider have banned it for some reason. We are trying our best to communicate with them & hope to make it live soon.
❤9
For the last few months, I am using macbook for hacking and the experience is amazing! Even though my windows machine has a lot better specs that Mac, but still this device outperforms mine in terms of hacking, video editing, battery life etc.. I really love it!
Here's how I use my Mac for hacking:
Installed Kali Linux with Vmware Fusion(works amazing)
Installed some tools directly on my machine like ffuf, nuclei, wpscan etc through brew
btw guys, do let me know what machine do you all use for hacking!
Here's how I use my Mac for hacking:
Installed Kali Linux with Vmware Fusion(works amazing)
Installed some tools directly on my machine like ffuf, nuclei, wpscan etc through brew
btw guys, do let me know what machine do you all use for hacking!
👍10❤8🔥2
Hi guys, In case you are free then do checkout this awesome report: https://hackerone.com/reports/180074
HackerOne
Paragon Initiative Enterprises disclosed on HackerOne: BAD Code !
he is don't know anything about coding .. as we learned in PHP .. if we start an PHP file by <?php we should close it by ?>.. anyway .. ok .. here is example >>
<?php
echo "Hello world";
?>
<?php
echo "Hello world";
?>
🤣20😁7
August was overall a blessed month for me!
This month, I had some time to look back and hack on some private bug bounty programs. I was committed focus on only two private programs and the result? Well, I have:
* Reported over 20 valid vulnerabilities
* Five bounties pending
* Reported High severity vulnerability
* Improved my focus and consistency on hacking!
Overall, it was an awesome month for me!
This month, I had some time to look back and hack on some private bug bounty programs. I was committed focus on only two private programs and the result? Well, I have:
* Reported over 20 valid vulnerabilities
* Five bounties pending
* Reported High severity vulnerability
* Improved my focus and consistency on hacking!
Overall, it was an awesome month for me!
🔥37👍15❤4👏3🐳1
Just finished shooting the next video. Will be releasing it this week! Can anyone guess the topic? 😉
Hint: It's a little similar to CSRF but on modern applications using REST api
Hint: It's a little similar to CSRF but on modern applications using REST api
❤14🔥7👍2
This is why I never recommend anyone to be full time bug bounty hunter. I have reported a SSRF protection bypass vulnerability to a private program. Normally they used to reply in 1 day but this time they took around 1 week!
In the meantime, They quietly fixed this vulnerability in the background and now saying that they cannot reproduce the issue. Trust me, when this happens, it just shatters your heart
Therefore, I always recommend everyone to do bug bounty only to upskill their hacking game!
In the meantime, They quietly fixed this vulnerability in the background and now saying that they cannot reproduce the issue. Trust me, when this happens, it just shatters your heart
Therefore, I always recommend everyone to do bug bounty only to upskill their hacking game!
💔40❤9🤬9😢7😭3
Hi everyone! The new video is out!!!
Check out this video and learn everything about CORS Misconfiguration with live demonstration
Video Link: https://youtu.be/LqkElGac3oA
Check out this video and learn everything about CORS Misconfiguration with live demonstration
Video Link: https://youtu.be/LqkElGac3oA
YouTube
Covering The Under Rated Vulnerabilities: CORS Misconfiguration #1
In this video, I’ll walk you through CORS misconfiguration and why it matters. We’ll start with a simple introduction to what CORS (Cross-Origin Resource Sharing) is and how it works. Then, I'll show you a real-life demo of how attackers can use CORS misconfigurations…
❤16🔥8
❤5👍2
Hey everyone! I can’t believe I’m saying this, but we’ve just crossed over 21K subscribers on the channel! 🎉
Honestly, I’m so grateful to each and every one of you. Your support, comments, and just being here means the world to me. This journey has been an incredible ride, and I couldn’t have done it without you all cheering me on. Thank you for being part of this adventure—I appreciate you more than words can say!
Honestly, I’m so grateful to each and every one of you. Your support, comments, and just being here means the world to me. This journey has been an incredible ride, and I couldn’t have done it without you all cheering me on. Thank you for being part of this adventure—I appreciate you more than words can say!
❤38❤🔥1🔥1👏1
This media is not supported in your browser
VIEW IN TELEGRAM
Working on this new video! I am sure you all will love it....
🔥20❤1
Just finished up the video! Will be releasing tomorrow, I am pretty sure you all will learn something valuable from it
❤20
Hi everyone, The new video is out!
Learn how to chain reflected xss with cors misconfiguration to increase its impact
Video Link: https://www.youtube.com/watch?v=Rz44oTCxULs
Learn how to chain reflected xss with cors misconfiguration to increase its impact
Video Link: https://www.youtube.com/watch?v=Rz44oTCxULs
YouTube
Chaining Vulnerabilities: Reflected XSS + CORS = More Impact!! | Live Demonstration | 2024
In this video, I’ll walk you through how to chain reflected XSS with CORS misconfigurations to amplify the overall impact of your findings. By combining these vulnerabilities, we can demonstrate more severe consequences, which can often lead to higher bounties.…
👍10❤6
I still remember the time(2020)when I had no laptop/pc so I used to run kali linux on my Android device to learn hacking & pen testing.
And now, 4 years later: I have three awesome laptop with each of them hazing unique use cases!
(The one at the top is my first laptop and it is really priceless to me)
I would really like to thank God, my parents, all of my fellow subscribers on BePractical and telegram members here for supporting me throughout my journey! ❤️
And now, 4 years later: I have three awesome laptop with each of them hazing unique use cases!
(The one at the top is my first laptop and it is really priceless to me)
I would really like to thank God, my parents, all of my fellow subscribers on BePractical and telegram members here for supporting me throughout my journey! ❤️
❤59👍6👏6❤🔥1
Found XSS by bypassing the misconfigured CSP in one of the govt website of India!
Tip: Check out this new amazing tool that will be very useful in fuzzing interesting payloads, tags & events that will be useful when bypassing waf or csp (https://github.com/Asperis-Security/xssFuzz)
Tip: Check out this new amazing tool that will be very useful in fuzzing interesting payloads, tags & events that will be useful when bypassing waf or csp (https://github.com/Asperis-Security/xssFuzz)
👍22👏1
