Yogeshwaran2022 Profile Banner
YOGESWARAN M Profile
YOGESWARAN M

@Yogeshwaran2022

Followers
93
Following
2K
Statuses
302

Cyber Security Engineer || VAPT || Penetration Tester || Bug Bounty Hunter || System Administrator

Chennai,India
Joined August 2022
Don't wanna be here? Send us removal request.
@Yogeshwaran2022
YOGESWARAN M
21 hours
RT @krishnsec: tomcat /..;/
Tweet media one
Tweet media two
0
31
0
@Yogeshwaran2022
YOGESWARAN M
4 days
RT @mamunwhh: (select*from(select(sleep(15)))a) 😮
0
17
0
@Yogeshwaran2022
YOGESWARAN M
6 days
RT @therceman: Bug Bounty Tip Parameter Manipulation: Email Link Hijacking Cheers!
Tweet media one
0
38
0
@Yogeshwaran2022
YOGESWARAN M
6 days
RT @ProwlSec: Detect XSS promptly on any website using burpsuite PoC: #BugBounty #Hacked #Hackingtime #hackerman
0
7
0
@Yogeshwaran2022
YOGESWARAN M
6 days
RT @bebiksior: Here's how you can use 403Bypasser template system to create a custom template for this 403 bypass case This template soon…
0
9
0
@Yogeshwaran2022
YOGESWARAN M
7 days
RT @offsectraining: CVE-2025-21298 is a no-click, high-risk vulnerability in Windows. Malicious RTF files can execute code remotely just by…
0
335
0
@Yogeshwaran2022
YOGESWARAN M
7 days
RT @0x0SojalSec: CVE-2023-24488 XSS Citrix ⚔️ POC : /oauth/idp/logout?post_logout_redirect_uri=%0d%0a%0d%0a%3Cscript%3Ealert(document.coo…
0
23
0
@Yogeshwaran2022
YOGESWARAN M
8 days
RT @Z3r0_S3c: SO SUPER BLESSED RIGHT NOW!!! @Bugcrowd sorry to keep your #triagers busy today! Just submitted my VERY FIRST reflective XSS…
0
15
0
@Yogeshwaran2022
YOGESWARAN M
9 days
RT @Freyxfi: and this way marked as easy 😮‍💨
Tweet media one
0
31
0
@Yogeshwaran2022
YOGESWARAN M
9 days
RT @l1acker0x01: Bug: Reflected XSS Payload is reflected in: <script>window.pageType = 'test'-alert(document.cookie)-'';</script> #BugB
0
13
0
@Yogeshwaran2022
YOGESWARAN M
9 days
RT @viehgroup: .env leaked How to find : FUZZ all Endpoints and find leaks Wordlist : credit: @h4x0r_fr34k #b
0
78
0
@Yogeshwaran2022
YOGESWARAN M
11 days
RT @wtf_brut: 🔥Robofinder is a powerful Python script designed to search for and retrieve historical robots.txt files from
0
23
0
@Yogeshwaran2022
YOGESWARAN M
11 days
RT @sayim0x: Late night hacking🔥 Blind SQL Injection👀 #ethicalhacking #BugBounty
Tweet media one
0
23
0
@Yogeshwaran2022
YOGESWARAN M
11 days
RT @h4x0r_fr34k: Day 10 - 16 : CRLF Injection Refer : Need to escalate
Tweet media one
0
44
0
@Yogeshwaran2022
YOGESWARAN M
13 days
RT @AnonKryptiQuz: TimeVault automates finding information disclosure vulnerabilities by effortlessly filtering sensitive files and uncover…
0
49
0
@Yogeshwaran2022
YOGESWARAN M
13 days
RT @viehgroup: Always remember to test the API for existence of addition headers. X-Originaal-URL: /v1/api/endpoint_here BOOM => Entire AP…
0
37
0
@Yogeshwaran2022
YOGESWARAN M
13 days
RT @zack0x01: 🔥 Hey hackers! 🚀 Here’s how I used @deepseek_ai to build my own ⚡ live XSS scanner! 💻🤖 This is just one example of how AI c…
0
38
0
@Yogeshwaran2022
YOGESWARAN M
13 days
RT @kaks3c: I got my first bounty!! many thanks, @Bugcrowd
Tweet media one
0
2
0
@Yogeshwaran2022
YOGESWARAN M
14 days
RT @tom_doerr: List of MCP servers for AI resource integration
Tweet media one
0
6
0
@Yogeshwaran2022
YOGESWARAN M
14 days
RT @0x0SojalSec: meg -> inception -> nuclei search large set of hosts for small set of endpoints + checkers to reduce false positives pha…
0
12
0