Deepak bug_vs_me Profile Banner
Deepak bug_vs_me Profile
Deepak bug_vs_me

@bug_vs_me

8,924
Followers
623
Following
314
Media
4,417
Statuses

security researcher | Bug Bounty hunter

Bharat 🇮🇳
Joined March 2020
Don't wanna be here? Send us removal request.
Pinned Tweet
@bug_vs_me
Deepak bug_vs_me
1 year
WordPress Plugin WPML Version < 4.6.1 RXSS vulnerability Found by :- @bug_vs_me and @falcon_charan on 13th MArch 2023 Nuclei template:- and payload:- https://xxxxxxx/wp-login.php?wp_lang=%20=id=x+type=image%20id=xss%20onfoc%3C!%3Eusin+alert(0)%0c
30
177
546
@bug_vs_me
Deepak bug_vs_me
1 year
whenever you saw any email input field! 70% bug hunters don't try XSS there as compared to name field. always try this in email input field! "<img/src/onerror=alert(0)" @xss .com This don't work every time but give it a try found 2 XSS today using this! #bugbountytips
35
235
801
@bug_vs_me
Deepak bug_vs_me
1 year
Trying to improve my stats on HackerOne and spend 20 days 2 Hr/per day. Found some medium, high and critical issues! Tip: - always check company's/Organization employees GitHub account for leaked ghp_ token, and check access to each repo of main organization #bugbountytips
Tweet media one
36
105
671
@bug_vs_me
Deepak bug_vs_me
6 months
\u0022\u003c%26quot;%26gt;%26lt;"';}};“></SCRIPT><img src=x onerror=alert(69)>${{7*7}} My favourite xss payload
13
126
571
@bug_vs_me
Deepak bug_vs_me
2 years
Found critical IDOR! Attacker can delete all files on server within 2 minutes Tips: - use match and replace tool in burp Create 1 attacker account and 1 victim account and replace set match to attacker account and replace set to victim account and test all functions of web app!
Tweet media one
36
91
536
@bug_vs_me
Deepak bug_vs_me
1 year
The 1st time I tried Bugcrowd! And found 1 P2 level vulnerability Tip:- always try to check if the website is hosted on Netlify! Then try:- for example the main domain name is Deepak So i tried 60% people set Netlify CMS to public signup #bugbountytips
Tweet media one
17
89
434
@bug_vs_me
Deepak bug_vs_me
6 months
Me and @ArmanSameer95 , we both earned a $20,000 bounty on @Bugcrowd , it's always fun to collaborate with experienced and talented bug bounty hunters, Best collaboration ever 💯, Always try to find a way to escalate Vulnerability impact, 😉 #bugbounty #Hacking
Tweet media one
57
11
434
@bug_vs_me
Deepak bug_vs_me
2 years
2500 USD bounty Bug :- HTMLI #bugbounty #hacking
Tweet media one
36
24
423
@bug_vs_me
Deepak bug_vs_me
9 months
Easy P1 :- ------------------- { "otp":"123456" =403 + wrong otp } ------------------- { "otp": true =200 +rest token } -------------------- @devangsolankii remeber 👀 #bugbountytips
15
78
377
@bug_vs_me
Deepak bug_vs_me
1 year
I just published All about XSS — Cross site scripting! Not in deep just for beginners! Let me know if any correction needed #BugBounty
14
106
319
@bug_vs_me
Deepak bug_vs_me
1 month
All Thanks to Bug bounty and @Hacker0x01 @Bugcrowd @inspectiv @intigriti for amazing platform for hackers
Tweet media one
49
8
328
@bug_vs_me
Deepak bug_vs_me
1 year
Yay, I was awarded a $$,$$$ bounty on @Hacker0x01 ! My highest bounty till now 🤪! Thank you @github #TogetherWeHitHarder #BugBounty #Hacking
46
10
313
@bug_vs_me
Deepak bug_vs_me
7 months
Discovered a Stored XSS on a well-tested domain. My mindset for successful bug hunting: No app is bug-free. People find critical bugs in older programs 6-7 years old program. Treat every program as new and start hunting! 🔍 #bugbounty #XSS
Tweet media one
25
21
304
@bug_vs_me
Deepak bug_vs_me
2 years
Bug bounty vulnerability: - CSRF to gain Admin permission
Tweet media one
9
33
264
@bug_vs_me
Deepak bug_vs_me
1 year
$1000 bounty for reporting GitHub Api token, having Access to all repositories Public and private with Read and write access, #bugbounty
Tweet media one
10
10
261
@bug_vs_me
Deepak bug_vs_me
1 year
Yay, I was awarded a $2,000 bounty on @Hacker0x01 ! #TogetherWeHitHarder First critical submission on @Hacker0x01 Bug/vulnerability :- secret key exposed in Code ! #bugbounty #Hacking
Tweet media one
24
8
249
@bug_vs_me
Deepak bug_vs_me
2 years
Tweet media one
21
21
249
@bug_vs_me
Deepak bug_vs_me
5 months
Yay, I was awarded a $3,500 bounty on @Hacker0x01 ! #TogetherWeHitHarder
Tweet media one
22
5
247
@bug_vs_me
Deepak bug_vs_me
1 year
bored?? 1. Go to burp >> Match and replace 2. set response body false to true 3. set request body false to true then browse HackerOne reports 😂 you can see Triager UI and some other features!
5
32
233
@bug_vs_me
Deepak bug_vs_me
1 year
Bug hunter? slow internet? want a VPS for free $0 as beginners? $200 credit for a year Pre required:- A College ID, Github Account , A credit card ( Don't worry not costing you single rupee ) Solution:- Go to
Tweet media one
19
58
230
@bug_vs_me
Deepak bug_vs_me
9 months
Drop down interesting bug bounty writeups you ever read or you wrote! Because i saw many writeups which are very interesting and valuable but have very little exposure to the community! Let me and others learn from below posted writeups!! #BugBounty
21
78
239
@bug_vs_me
Deepak bug_vs_me
7 months
First time found SSTI excited to exploit!
Tweet media one
22
10
227
@bug_vs_me
Deepak bug_vs_me
1 year
If you found XSS and in CSP policy unsafe-inline, inline script is disabled and script can be loaded from whitelisted domains "script-src 'self. You can't upload script to current domain, but you see YouTube or google in whitelist domains IN CSP you can use this script below! .
Tweet media one
Tweet media two
3
49
212
@bug_vs_me
Deepak bug_vs_me
1 year
Just wrote a bash script which collect all wild and non-wild in scope domains from all programs i had set this script to collect paid programs only but you can change it in the script #bugbountytip
4
60
211
@bug_vs_me
Deepak bug_vs_me
1 year
$500 for Stored xss! First it was accepted as medium severity as i can't steal session cookies because it's secured, but i found that a endpoint exposed csrf token for doing various tasks I can't code so i created full exploit using chatGPT and now it's marked as high #bugbounty
Tweet media one
13
19
211
@bug_vs_me
Deepak bug_vs_me
6 months
Done! 💯 it was good journey with a lot of $$$$$😂
Tweet media one
19
1
207
@bug_vs_me
Deepak bug_vs_me
10 months
Yay, I was awarded a $2,000 bounty on @Hacker0x01 ! #TogetherWeHitHarder Bounty for previous XSS REPORT BYPASS 🙏 JAI SIYA RAM
25
4
207
@bug_vs_me
Deepak bug_vs_me
1 year
First I reported XSS trigged as medium! I am not satisfied with that later I chained it with account takeover! Got additional. $650 Tips: - if application have feature of Api key and you can't steal session cookies! 1/n
Tweet media one
6
24
202
@bug_vs_me
Deepak bug_vs_me
2 years
google Dorking to find api key Eg:- inurl: xsolla "api_key" #bugbounty #HackerOne #bugbountytips
Tweet media one
8
37
200
@bug_vs_me
Deepak bug_vs_me
5 months
DONE ✅ Congrats to all Researchers! Thanks @EpicGames @Hacker0x01 for opportunity! #BugBounty
Tweet media one
@bug_vs_me
Deepak bug_vs_me
9 months
Soon i will be on this list! Congrats to all top researcher 💯💯
Tweet media one
7
1
56
32
3
202
@bug_vs_me
Deepak bug_vs_me
1 year
XSS --- severity - 8.9💀 Don't just report xss with alert popup, always try to chain it with critical action like i chain it with org takeover, where when script execute! ORG admin upgrade attacker to Admin and Original Admin remove himself from Org within 1 click!
Tweet media one
12
12
192
@bug_vs_me
Deepak bug_vs_me
2 years
$500 stored xss Tips :- Try large size payloads and when payload get shortened by web application to adjust payload into UI it's getting triggered! #bugbounty #bugbountytip #hackerone #Hackers #Pentesting
Tweet media one
12
22
186
@bug_vs_me
Deepak bug_vs_me
2 years
Yay, I was awarded a $1,000 bounty on @Hacker0x01 ! #TogetherWeHitHarder #bugbounty
Tweet media one
8
5
186
@bug_vs_me
Deepak bug_vs_me
1 year
Small start of 2023 with $75 hope this ends in $$$$$ +++ Bug/vulnerability :- Html injection + xss possibility, as i was able to break line but all event listeners filtered so i reported it as HTMLI +++ Payload used = "<img/src="imageurl">" @xss .com
Tweet media one
12
21
180
@bug_vs_me
Deepak bug_vs_me
1 year
I was using YouTube usually and suddenly got a video showing a POC video of a vulnerability that i uploaded on HackerOne 😂😂 For the 1st 20 seconds I didn't realise that it's my POC video
Tweet media one
10
3
174
@bug_vs_me
Deepak bug_vs_me
1 year
Yay, I was awarded a $650 bounty on @Hacker0x01 ! First I reported a XSS but with the help of ChatGPT, I am able to craft a attack which steal key having read and write permission Medium 4.4 >>>>>> High 7.7 #TogetherWeHitHarder
7
9
175
@bug_vs_me
Deepak bug_vs_me
1 year
Today i received 6-7 bounties into my bank! And now i don't know for which bug and from which platform i received the bounty 😂! #workhard
27
5
168
@bug_vs_me
Deepak bug_vs_me
1 year
I was very busy with exams nowadays and wasn't able to hunt bugs for the past 20 days, yesterday I spent 1 hr on a target and found xss where the content type is text/html but in body there is json body so using bad characters i am able to generate a error msg leads to xss $300
Tweet media one
10
6
167
@bug_vs_me
Deepak bug_vs_me
1 month
Got H1 clear verified 🙂, thanks @Hacker0x01 . I will take this as motivation and start hacking again 💪
Tweet media one
19
1
167
@bug_vs_me
Deepak bug_vs_me
4 months
January has been a very good month for me as I have reported over 13 vulnerabilities (6 critical), all of which were bug bounty targets!
27
1
165
@bug_vs_me
Deepak bug_vs_me
2 years
Finally, My Name into Apple HOF 😎 #bugbounty
Tweet media one
16
6
158
@bug_vs_me
Deepak bug_vs_me
2 months
Yay, I was awarded a $$$$ bounty on @Hacker0x01 ! #TogetherWeHitHarder RXSS to ATO
16
2
156
@bug_vs_me
Deepak bug_vs_me
1 month
Tweet media one
2
30
156
@bug_vs_me
Deepak bug_vs_me
1 year
First bounty of $$ excitement + happiness >>>>>> $10,000 bounty now! 🙃
18
8
152
@bug_vs_me
Deepak bug_vs_me
9 months
When you wake up and see this (triage and bounty) paid really makes my day 💯
Tweet media one
19
2
153
@bug_vs_me
Deepak bug_vs_me
2 months
Yay, I was awarded a $$$$ bounty on @Hacker0x01 ! DOM XSS on extension #TogetherWeHitHarder
25
2
151
@bug_vs_me
Deepak bug_vs_me
2 years
Earned 61k INR bounty for finding a vulnerable in crypto wallet in which i can able to over-write crypto wallet password #bugbounty #hacking
Tweet media one
17
7
153
@bug_vs_me
Deepak bug_vs_me
2 years
Good Start of November Collab with @devangsolankii helped a lot #bugbounty #hacking
Tweet media one
12
8
147
@bug_vs_me
Deepak bug_vs_me
4 months
Someone is going to be in trouble.😂
Tweet media one
15
3
147
@bug_vs_me
Deepak bug_vs_me
5 months
Yay, I was awarded a $500 bounty on @Hacker0x01 ! #TogetherWeHitHarder 3rd bypass :) access control, always try to set param in url and in body sometimes backend take id from url and validate user but do changed in id in the body! [ both different ids]
10
5
146
@bug_vs_me
Deepak bug_vs_me
1 year
Yay, I was awarded a $$$ bounty on @Hacker0x01 ! And I completed 500 reputation points on HackerOne. Prior, I was not active on HackerOne, but in the past 2 months, I reported a few vulnerabilities and completed 500+ points! #TogetherWeHitHarder
Tweet media one
17
2
145
@bug_vs_me
Deepak bug_vs_me
2 months
One Dm from @DoTV3N to bypass XSS to 1 CLICK ATO 😉
Tweet media one
10
0
146
@bug_vs_me
Deepak bug_vs_me
1 year
🫠
Tweet media one
12
4
137
@bug_vs_me
Deepak bug_vs_me
1 year
Earned swag from Sony ! #BugBounty
Tweet media one
11
4
138
@bug_vs_me
Deepak bug_vs_me
6 months
Small thing may help you to resolve ip address ssl CN Bash to get SSL CN Steps:- Wget bash -i <ipaddresshere>
Tweet media one
6
23
136
@bug_vs_me
Deepak bug_vs_me
8 months
Yay, I was awarded a $$$$ bounty on @Hacker0x01 ! #TogetherWeHitHarder XSS bypass third time on same param! Program implemented fix using regex to prevent XSS but they forgot to set same for uppercase letters so i was able to bypass restriction!
15
3
132
@bug_vs_me
Deepak bug_vs_me
11 months
Hi beginners bug hunters just advice please don't ask simple questions in DM or Tagging other hunters without doing your own research! First Do some research and invest some time to find solutions on your own, If you still can't find solutions then ask me, i always reply, (1)
3
16
129
@bug_vs_me
Deepak bug_vs_me
3 months
Tweet media one
8
1
130
@bug_vs_me
Deepak bug_vs_me
2 years
@mk_jsq @stephenrobles Really! you are comparing this with apple watch? 🤣
3
0
123
@bug_vs_me
Deepak bug_vs_me
1 year
$2,000 bounty for exploiting Django Debug mode exposed information about environment variables and vulnerable to many CVSS and i was able to extract AWS key/secret in error logs! #BugBounty #Hacking #bugvsme
Tweet media one
17
7
125
@bug_vs_me
Deepak bug_vs_me
2 years
👽 WTF, when you got Good and bad news at the same time 😋 ------ 😐 #BugBounty
Tweet media one
Tweet media two
14
5
127
@bug_vs_me
Deepak bug_vs_me
9 months
So it's worth it
Tweet media one
@bug_vs_me
Deepak bug_vs_me
9 months
Just wrote 200 lines of javascript using AI to show an xss impact to be high, this took me 9 hours, hope for best 👀, I just used as many functions to extract all data and created a script which works on each and every user, get I'ds combined with Post req. + csrf and all,
8
4
100
12
6
128
@bug_vs_me
Deepak bug_vs_me
2 years
Tweet media one
8
10
122
@bug_vs_me
Deepak bug_vs_me
11 months
Because of bad triger i lost my $4,500 My report marked as informative reported on 16 may And on 1 june reported again with good poc and today i got duplicate on 2nd report And what i see is the same poc and the explanation report got triaged which is reported on 17 May :(
23
3
122
@bug_vs_me
Deepak bug_vs_me
2 years
Got one more Critical vulnerablity #bugbounty
Tweet media one
15
8
124
@bug_vs_me
Deepak bug_vs_me
1 year
🙏 xss was easy to find on this endpoint but no one reported maybe they can't be able to bypass CSP! As it's limited modified or control over script that's why they set it as low! 😬 #bugbounty
Tweet media one
@bug_vs_me
Deepak bug_vs_me
1 year
If you found XSS and in CSP policy unsafe-inline, inline script is disabled and script can be loaded from whitelisted domains "script-src 'self. You can't upload script to current domain, but you see YouTube or google in whitelist domains IN CSP you can use this script below! .
Tweet media one
Tweet media two
3
49
212
4
10
117
@bug_vs_me
Deepak bug_vs_me
4 months
why XSS not works in 1st case ? in 1st case i used ' ' and in 2nd and 3rd case i used ` ` New line in 1st case is causing problem syntax error, any way to execute XSS here i have full control user variable value <> '"` is encoded only /\()-+ is allowed and var = "xx\" (1/n)
Tweet media one
6
11
119
@bug_vs_me
Deepak bug_vs_me
10 months
Yay, I was awarded a $$$ bounty on @Hacker0x01 ! #TogetherWeHitHarder Always try to read the js file carefully if you don't understand something using ChatGPT to understand JS code, i found DOM XSS,
7
3
119
@bug_vs_me
Deepak bug_vs_me
1 year
If you are not satisfied with severity set by triager, do speak to them and explain in detail why severity should be increased! vulnerability was XSS to account takeover. Here I explained in detailed to them. See result: - #bugbountytips
Tweet media one
Tweet media two
3
5
110
@bug_vs_me
Deepak bug_vs_me
1 year
Got BOUNTY for bypassing the credit limit, Turn on burp and explore web application later examine each and every api request that logged into burp! This takes a lot of time but is worthy it in the End 😉 #BugBounty
Tweet media one
6
5
116
@bug_vs_me
Deepak bug_vs_me
10 months
Crossed 1,000+ reputation on @Hacker0x01 ! 🎉 Started hunting seriously in Feb 2023, mainly on paid programs (95%) 🕵️‍♂️ Previously focused on self-hosted BB programs. Amazing experience with HackerOne! 💻 #BugBounty
Tweet media one
21
1
114
@bug_vs_me
Deepak bug_vs_me
1 year
$1250 equilateral bounty in crypto Bug/vulnerability:- improper Authentication allows any user to act as Admin! I tested all the endpoints which i found using "gau" and found vulnerable one Tip:- Manual hunting (80%)+ some recon (20%) = good bounty #bugbounty #Hacking
Tweet media one
12
7
112
@bug_vs_me
Deepak bug_vs_me
1 year
Got bounty for DOM XSS - Reflected collaboration with @ReebootToInit5 who provided me endpoint to Test XSS and we together found this XSS. #BugBounty
Tweet media one
9
4
113
@bug_vs_me
Deepak bug_vs_me
1 year
$250 bounty for race condition vulnerability >Always try Race condition vulnerability on premium features like a user can allow to do only 15 transactions( Free plan ) but due to race condition vulnerability, Attacker able to perform 200 transactions #bugbounty #bugbountytips
Tweet media one
7
5
114
@bug_vs_me
Deepak bug_vs_me
6 months
22 years completed on Earth,
63
0
114
@bug_vs_me
Deepak bug_vs_me
2 years
Great weekend Earned $750 1 XSS bug (250)and 1 crypto wallet showing sensative information without password verification (bypass)(750) #hacking #bugbounty #Web3
Tweet media one
Tweet media two
11
2
107
@bug_vs_me
Deepak bug_vs_me
1 year
Thank you @github When you order 1 and got 2 😂 #swag #BugBounty
Tweet media one
7
1
110
@bug_vs_me
Deepak bug_vs_me
1 year
Today was my farewell at college, In the 3 years of the time period, i just went to college for 20 days only, College life ended 🙃!
10
1
106
@bug_vs_me
Deepak bug_vs_me
4 months
In January, I submitted 32 vulnerabilities to 5 programs on @Hacker0x01 . #TogetherWeHitHarder
10
0
112
@bug_vs_me
Deepak bug_vs_me
11 months
Demotivate can't be able to find any Vulnerability or bug from the past 10-15 days on ( BBP) Bug bounty hunters what do you do in this situation?, Any suggestions? Thank you #bugbounty
26
6
110
@bug_vs_me
Deepak bug_vs_me
1 year
Today i received a private invitation on HackerOne and i had reported a high severity bug in that program, but they are running 2 programs 1 VDP and 1 BB, is this acceptable on HackerOne?? even though both programs have the same scope, I feel scammed for $2000 🙃 #BugBounty
13
1
110
@bug_vs_me
Deepak bug_vs_me
2 years
Hope it's not Duplicate 🤞 #bugbounty #Hackingtime
Tweet media one
9
7
107
@bug_vs_me
Deepak bug_vs_me
4 months
February Goal to report 30 vulnerabilities to the bug bounty programs on all platforms, It's Hard, let's see 💪
14
1
108
@bug_vs_me
Deepak bug_vs_me
3 months
🙃
Tweet media one
11
3
106
@bug_vs_me
Deepak bug_vs_me
9 months
Any way to close a script tag?? i am using </script> but blocked by Akamai </Scr</Script//> -- blocked %3c%2f%53%43%52%49%50%54%2f%2f%2f%2f%3e -- blocked
20
15
105
@bug_vs_me
Deepak bug_vs_me
1 year
Hi #Bugbounty community and Bug hunters, Any suggestions or alternatives for XSShunter? How can someone host their own XSShunter with minimum cost, Or anyone can build a xsshunter with a database managed by the user itself so data stored safely if possible??
23
12
105
@bug_vs_me
Deepak bug_vs_me
1 year
XSS = 🫀
Tweet media one
9
3
102
@bug_vs_me
Deepak bug_vs_me
9 months
If you send 3-5 hours a find a bug! Try to invest 30 minutes to write a good report with a high impact demonstration! I was checking my old reports and noticed i could have increased severity i wrote a good report and showed maximum impact ! For example:-
3
12
105
@bug_vs_me
Deepak bug_vs_me
1 year
Reminder :- Focus on heath guys, go to GYM or Running or any physical activity minimum 1 hr a day, Don't just sit in front of PC and then go to sleep, Physical activity or GYM really give mind/brain a refresh and kills stress
14
6
103