Biscuit's Bug Bounty Playbook
  • ๐Ÿ‘‹Introduction to Biscuit's Bug Bounty Playbook
  • Mains
    • ๐ŸงพResume For Cyber Security Freshie
    • ๐Ÿ“—Browser extension For Bug Bounty
    • ๐Ÿ“€POC Videos YT Channel
    • ๐Ÿ“บ55 YouTube Channels To Learn Hacking
    • ๐Ÿ‘€Hackers to Follow on Social Media
      • Twitter
      • Medium
      • YouTube
      • GitHub
      • Discord Server
      • Security GitBooks
    • ๐Ÿ…Learn The Basics
      • ๐ŸŽ–๏ธType Of Cyber Security
      • ๐ŸฅˆCommon Job Roles
      • ๐Ÿฅ‰Get Started With InfoSec
      • โš•๏ธBest Bug Bounty Platform
      • ๐Ÿ—ž๏ธBest InfoSec Writeups Website
      • ๐ŸชHacking Books
      • ๐Ÿฅ‚CLI Commands
      • ๐Ÿ’ฟLearn WSL
    • ๐Ÿ‘ฉโ€๐Ÿ’ปFun Programming Codes
    • ๐Ÿ”ฎBuild your own Bug Bounty Methodology
    • ๐ŸŽดBug Bounty Checklist
  • Learn Android Bug Bounty
    • ๐ŸŽฅVideo Tutorials
  • โค๏ธYouTube Channels
  • ๐Ÿ“ฐBug Bounty Reports
  • ๐Ÿ“šBlogs & Writeups
  • ๐ŸนGitHub Repository
  • ๐Ÿ‘จโ€๐Ÿ‘จโ€๐Ÿ‘งConference Talks
  • ๐Ÿ–จ๏ธAutomated Scanners
  • โš™๏ธIntentionally Vulnerable Apps
  • ๐ŸŽฑLearn Drozer For Android Pentesting
  • ๐Ÿช€Learn Frida For Android Pentesting
  • ๐ŸˆBypassing Security Protections in APKs via Objection and Frida
  • ๐ŸชSecurity Tools For Android Pentesting
  • ๐ŸŽนCLI Commands & Shortcuts
  • Bug Bounty Reports & Articles
    • 0๏ธโƒฃIndex
    • 1๏ธโƒฃTakeover's (Accounts, Sub-domains, etc)
      • ๐ŸšกSub Domain Takeover
      • ๐Ÿš Account Takeover
      • ๐ŸšŸdependency confusion vulnerability
    • 2๏ธโƒฃIDOR (Indirect Object Reference)
    • 3๏ธโƒฃLeaks & Disclosure (PII, API Key, etc)
    • 4๏ธโƒฃOpen Redirects
    • 5๏ธโƒฃRequest Forgery (CSRF & SSRF)
      • ๐ŸŸขCSRF
      • ๐Ÿ”ดSSRF
    • 6๏ธโƒฃInjections (HTML, XSS, etc)
      • ๐ŸŸกXSS
      • ๐ŸŸ HTML Injection
      • โšซSQL Injection
      • ๐ŸŸฃCR/LF Injection
      • ๐ŸŸขSSTI
      • ๐Ÿ”ดHost Header Injection
      • ๐Ÿ”ตCSV Injection
    • 7๏ธโƒฃBroken Access Control & Broken Authentication
      • โš™๏ธFile Upload Functionality
      • โš™๏ธPassword Reset Functionality
      • โš™๏ธ2FA Functionality
      • โš™๏ธOauth Functionality
      • โš™๏ธBypassing
      • โš™๏ธMisconfiguration
      • โš™๏ธCaptcha Bypass
    • 8๏ธโƒฃWeb Socket
    • 9๏ธโƒฃMiscellaneous Reports
    • ๐ŸงปRole Management Issue
    • 0๏ธCloud
      • ๐ŸŒฉ๏ธAWS S3
    • 1๏ธLow Hanging Fruits
    • 2๏ธCache Vulnerabilities
    • 3๏ธDOS/DDOS
  • 4๏ธForced Browsing
  • Bug Bounty Platforms
    • ๐Ÿ›BugCrowd
    • ๐ŸžHackerOne
    • ๐ŸIntigriti
    • ๐ŸœOpen Bug Bounty
  • Exploiting Technologies
    • 0๏ธโƒฃIntroduction
    • 1๏ธโƒฃWordpress
    • 2๏ธโƒฃGraphQL API
    • 3๏ธโƒฃIDOR Vulnerability
Powered by GitBook
On this page
  1. Mains
  2. Hackers to Follow on Social Media

Twitter

Twitter provides immediate access to the latest security news, trends, and vulnerabilities. Hackers often share discoveries and insights in real-time, allowing you to stay ahead of emerging threats.

Index
Username
Profile Link

1

0xfxiii

2

AWSSupport

3

BforeAI

4

C4TBuTS4D

5

CodingGokul

6

DragonX29120603

7

EdOverflow

8

FaIyaZz007

9

Hacker0x01

10

HackerGautam

11

Mandiant

12

MayhemDayOne

13

MongoDB

14

NASA

15

NOBBD

16

Proxy936623

17

ReebootToInit5

18

RuralTechFund

19

Suryesh_90310

20

SynackRedTeam

21

TheSecopsgroup

22

WeAreCloudar

23

Yogeshwaran2022

24

akita_zen

25

awscloud

26

benbridts

27

bhavukjain1

28

bishal0x01

29

bugcrowd

30

chrissanders88

31

coffinxp7

32

compose/post

33

cure53berlin

34

cyber_shastri

35

cyph3r_asr

36

devsecboy

37

disclosedh1

38

dolevfarhi

39

hacktifycs

40

harshad_hacker

41

ich_rish99

42

ikb3n

43

karlbunyan

44

lordjerry0x01

45

m0chan98

46

m_sec_ph

47

naman_1910

48

networkdefense

49

ninadshetty1431

50

nnwakelam

51

northeastern

52

notifications

53

p1boom

54

parmartester

55

prasadpanchal21

56

sh1yo_

57

shakti_sec

58

siya_hx

59

sourabh_tomar_

60

th3cyb3rc0p

61

ubuntu

62

yogoshaofficial

63

0dayCTF

64

0xAsm0d3us

65

0xM5awy

66

0xReconless

67

0xSekiro

68

0xor0ne

69

0xteknogeek

70

1ndianl33t

71

3ncryptSaan

72

7h3h4ckv157

73

ADITYASHENDE17

74

Amazon

75

Apple

76

BRuteLogic

77

BugCrowd

78

Bugcrowd

79

CaidoIO

80

D0L0RESH4Z3

81

D0rkerDevil

82

DarkTamil6

83

Darkentryams

84

Deloitte

85

Farah_Hawaa

86

GoogleVRP

87

HackenProof

88

IArVy0x

89

ITSecurityguard

90

IndoAppSec

91

Jayesh25_

92

Jhaddix

93

KN0X55

94

LiveOverflow

95

ManiarViral

96

Mdhsan19

97

Microsoft

98

PentesterLandEn

99

RadhaSec

100

ReconOne_bk

101

Regala_

102

Rhynorater

103

RobinhoodApp

104

RootxRavi

105

SaraBadran18

106

SeatsAero

107

SecProjectLtd

108

SheikhSahad1

109

SikarwarSamman

110

Six2dez1

111

Synackredteam

112

TomNomNom

113

UniPadova

114

VasuYadaav

115

Vicky___4

116

Virdoex_hunter

117

Vulncure

118

WeegieCast

119

YogoshaOfficial

120

ZephrFish

121

ZephrSnaps

122

_justYnot

123

smile_hacker

124

abumaryamrahmat

125

akr3ch

126

albinowax

127

amalmurali47

128

an0nbil

129

appSecExp

130

arcanuminfosec

131

areyou1or0

132

assetnote

133

auguzanellato

134

boringmattress

135

bug_vs_me

136

bxmbn

137

canmustdie

138

centrahq

139

ctbbpodcast

140

curatedintel

141

d0nutptr

142

deepankerchawla

143

detectify

144

dewcode91

145

dhakal_ananda

146

dhananjay_00

Profile

147

divyansh2401

148

e11i0t_4lders0n

149

errorsec_

150

explore

151

fbsecurity

152

filedescriptor

153

flipkart

154

fransrosen

155

galnagli

156

gregxsunday

157

gurgaonpolice

158

h1Disclosed

159

hacker_

160

hackerspider1

161

hackthebox_eu

162

hacktricks_live

163

harshbothra_

PreviousHackers to Follow on Social MediaNextMedium

Last updated 11 months ago

๐Ÿ‘€
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile
Profile