Open in app

Sign in

Write

Sign in

Nitesh Pandey
Nitesh Pandey

351 Followers

Home

About

Oct 29, 2020

Complete Android Pentesting Guide

a) apktool -) AUR package: yay -S android-apktool b) dex2jar c) jd-gui d) jadx e) adb -) sudo pacman -S android-tools -) I personally would recommend installing android-studio (it comes with the SDK — including all platform-tools) o) sudo pacman -S andriod-studio f) bettercap -) sudo pacman -S bettercap g) dnSpy -) .NET decompiler (in case…

12 min read

12 min read


Aug 1, 2020

TRUE CALLER DATA BREACH

True caller denies breach after data of 4.75 crore Indians appear on the dark web — Last month there was some news stating that True Caller Data was breached. Actually Truecaller user’s data are for sale on the dark web. Personal data of Indian Truecaller users are available for about Rs 75,000 and those of global users are available for 25,000 Euros. After the news come…

Breached

3 min read

TRUE CALLER DATA BREACH
TRUE CALLER DATA BREACH
Breached

3 min read


May 31, 2020

FROM OSINT PROJECT TO MAKING MILLIONS HACKING DATABASES FOR BUG BOUNTY

Hi, last year i learn about this technique well these techniques were present for a long time but very few people focus on this so i started to learn and taking interest in it. The region for this is my love for the dataset It was originally an OSINT…

Infosec

3 min read

FROM OSINT PROJECT TO MAKING MILLIONS HACKING DATABASES FOR BUG BOUNTY
FROM OSINT PROJECT TO MAKING MILLIONS HACKING DATABASES FOR BUG BOUNTY
Infosec

3 min read


May 30, 2020

AADHAR DATA LEAKED

Nowadays how careless people are shows by these leaks and how 3rd party websites that taking the data like aadhaar is handling it last weak several reports come that Indian aadhaar card data was leaked and was curious to know about what the leak contained. So, I decided to…

Breach Data

2 min read

AADHAR DATA LEAKED
AADHAR DATA LEAKED
Breach Data

2 min read


May 27, 2020

API HACKING SECRET 4 | FINDING API ENDPOINT USING WSDL

In this part, I will teach you how to extract endpoints from the WSDL file so let's get started. So for finding the endpoint you need a WSDL file and if you are reading this you must have read my previous parts of API hacking and i assume that you…

Infosec

4 min read

FINDING API ENDPOINT USING WSDL | API HACKING SECRET 4
FINDING API ENDPOINT USING WSDL | API HACKING SECRET 4
Infosec

4 min read


Published in

InfoSec Write-ups

·May 26, 2020

API HACKING SECRETS PART 3

finding the WSDL file to extract ENDPOINTS The most important thing in API is endpoints, most the time you will just play with the endpoint to find a vulnerability. So in this part we will learn how to extract endpoints from the WSDL file. The first thing you need to…

Infose

2 min read

API HACKING SECRETS PART 3
API HACKING SECRETS PART 3
Infose

2 min read


May 26, 2020

API HACKING SECRETS PART 2

In part 1 we have covered basic of API and Learn the basic difference between soap and rest API. Now let us take a quick look at the WEB SERVICE COMPONENT before we move forward and see the real hacking methods. Basically there are three web components that are used…

Apihack

1 min read

Apihack

1 min read


May 25, 2020

API HACKING SECRETS PART 1

In this series, i will be teaching you my methodology of hacking API. I will share all my knowledge that i learned in the past 3 years and make 1000 dollar hacking web applications and mobile API. Let's get started……………. In this series, i will tell you from the very…

API

2 min read

API

2 min read


May 24, 2020

TOMNOMNOM HTTPROBE USE

In this, you will learn how to properly use tomnom nom httprobe STEP 1: To use the tomnomnom httprobe you need to have a list of subdomains. So, now you have the subdomain list and you need to find out which of the domains are live and which are…

Infosec

2 min read

Infosec

2 min read


May 24, 2020

OWASP Amass Installation

In this tutorial, we will learn how to install OWASP amass using go lang So let us see how to install amass into Linux and ubuntu system. The first thing you need is you need to install golang in your system and we can easily do it using the…

Bug Bounty

1 min read

Bug Bounty

1 min read

Nitesh Pandey

Nitesh Pandey

351 Followers

I am security researcher and penetration tester.You can follow me on twitter https://twitter.com/NiteshYours and Linkedin https://www.linkedin.com/in/osintnites

Following
  • Hussnain Fareed

    Hussnain Fareed

  • Coin

    Coin

  • Armaan Pathan

    Armaan Pathan

  • Shubham

    Shubham

  • Lucideus

    Lucideus

See all (106)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams