ghost__man01 Profile Banner
SIDDHANT SHUKLA Profile
SIDDHANT SHUKLA

@ghost__man01

Followers
267
Following
3K
Statuses
2K

Jai Shree Ram šŸŖ·šŸ•‰ļø https://t.co/Tm5jiPQxtX https://t.co/L9XlTJKK7A

INDIA
Joined June 2021
Don't wanna be here? Send us removal request.
@ghost__man01
SIDDHANT SHUKLA
1 month
Happy to secure @Paytm #BugBounty #bughunter
Tweet media one
3
0
3
@ghost__man01
SIDDHANT SHUKLA
13 hours
RT @YShahinzadeh: Two SQLi today with @jusxing 0. a public program on H1 1. watching companies asset daily 2. new asset, 404 status code 3ā€¦
0
14
0
@ghost__man01
SIDDHANT SHUKLA
13 hours
RT @Suryesh_92: I just published Algolia API Key Exploitation leads to $1000 Bounty (P2)on Private program. Guy's go ahead and check it outā€¦
0
31
0
@ghost__man01
SIDDHANT SHUKLA
13 hours
RT @krishnsec: tomcat /..;/
Tweet media one
Tweet media two
0
31
0
@ghost__man01
SIDDHANT SHUKLA
2 days
1
0
1
@ghost__man01
SIDDHANT SHUKLA
2 days
1
0
1
@ghost__man01
SIDDHANT SHUKLA
3 days
RT @h4x0r_dz: My friend is a master at client-side bugsā€”he spent around 10 hours working on XSS via a POST message just to trigger an alertā€¦
0
20
0
@ghost__man01
SIDDHANT SHUKLA
3 days
RT @aryan351985: Algolia API Key Exposure Leading to Web log access Create, Read, Update, Delete (CRUD), I can see what they are searchingā€¦
0
19
0
@ghost__man01
SIDDHANT SHUKLA
3 days
RT @Joyerz5: What new technique or attack did you learn today? Myself: Account Takeover via Password Reset In the URL field upon intercā€¦
0
1
0
@ghost__man01
SIDDHANT SHUKLA
4 days
RT @Toshusec_: Bug - Easy Rxss :) step 1. deep subdomain enum using DNS bruteforcing you might be get a untouched digital asset subfiā€¦
0
49
0
@ghost__man01
SIDDHANT SHUKLA
4 days
0
0
0
@ghost__man01
SIDDHANT SHUKLA
5 days
RT @saqibarif98: WordPress database Credentials are disclosed via the backup file Tip: Add this to your list Wp-config.php.bkp https://t.ā€¦
0
12
0
@ghost__man01
SIDDHANT SHUKLA
5 days
@hoseinroot Keep it up šŸ”„
0
0
1
@ghost__man01
SIDDHANT SHUKLA
5 days
0
6
0
@ghost__man01
SIDDHANT SHUKLA
5 days
RT @Alamz0: Alhamdulillah, Months after trying and trying, I got my first bounty $125. On to bigger things! Feeling very happy! #bugbountyā€¦
0
1
0
@ghost__man01
SIDDHANT SHUKLA
6 days
RT @hbenja_m: šŸ˜Ž #Hunters I'm sharing some ideas on how to escalate an #XSS (both reflected and self). The first one: Sending just an alertā€¦
0
21
0
@ghost__man01
SIDDHANT SHUKLA
6 days
RT @Freyxfi: @linuxopsys But Hackers Use Linux But Hackers Use Linux But Hackers Use Linux But Hackers Use Linux But Hackers Use Linux Butā€¦
0
4
0
@ghost__man01
SIDDHANT SHUKLA
6 days
RT @xandsz__: 1. I found a 404 page 2. Using ffuf: ffuf -w list.txt -u -e .js -recursion I found this: httpā€¦
0
48
0
@ghost__man01
SIDDHANT SHUKLA
6 days
RT @viehgroup: Someone found a Critical Authentication Bypass on one of his target's Apache Tomcat Instance -> redā€¦
0
12
0
@ghost__man01
SIDDHANT SHUKLA
6 days
RT @iamxroot: Recently GitHub disabled the recent search for bug bounty hunter but I discovered the way to find that method vai google dorkā€¦
0
6
0
@ghost__man01
SIDDHANT SHUKLA
6 days
RT @remonsec: Another day, another 403 bypassed Straight into the Django admin panel Might drop a write-up this weekend Stay tune āš”ļø #buā€¦
0
22
0