![Rakesh Profile](https://pbs.twimg.com/profile_images/1887012509015556096/ommqFZmr_x96.jpg)
Rakesh
@deephunt3r
Followers
43
Following
3K
Statuses
136
RT @slonser_: In 2024, I interacted a lot with Extensions. I decided to create a resource that will help with a basic understanding of ext…
0
94
0
RT @PaulosYibelo: Introducing DoubleClickjacking 🧌: a widespread timing-based vulnerability class that slips between your first & second cl…
0
58
0
RT @H4R3L: Huge milestone! My research on web cache deception by abusing url parser confusions won 9th place for the Top 10 web hacking tec…
0
14
0
@rikeshbaniya Thanks for the sharing a great blog! I earned $$$$ using this method(I can only create new accounts and there is no way to join workspaces, company closed as inf then I chained with OAuth account takeover on 3rd parties as it was an OAuth IDP 🙌🏻 Thanks for ur amazing blogs ✨🙌🏻
1
0
4
@Suryesh_92 @joo_elsaka Check his old tweets
I got many DM’s asking for some writeups about android bug bounty here’s the only write up that i published and will publish more in the week end Don’t hesitate to reach me out
1
0
2
RT @zhero___: very pleased to announce the release of my new article based on my research that led to CVE-2024-46982 titled: Next.js, cach…
0
221
0
@gregxsunday I was curious about those attacks where UI:N Unfortunately I don’t have subscription, but it’s fine Thanks
0
0
0
RT @SirBagoza: "CallBackUrl Parameters" you can face this param in diff funcs, but this is really impactful specially in the takeover scen…
0
31
0
RT @NahamSec: Final giveaway of the year🎁: 4️⃣Hand-On Web Exploitation (Course Only 3️⃣Shodan Codes 2️⃣Caido lic…
0
722
0
🎉 Proud to share my 2024 #HackerOne journey! 96 vulnerabilities reported, including 27 high-severity findings! Specialized in authentication & privilege escalation issues. Big thanks to @Hacker0x01 for the amazing platform! 🐑🛡️ #BugBounty #CyberSecurity
1
1
4