0xSudip (@0xsudip) 's Twitter Profile
0xSudip

@0xsudip

Bug Hunter |
YouTube ( BugBounty POC's): youtube.com/channel/UCzrYD…

ID: 1192968841665470464

linkhttps://0xsudip.github.io calendar_today09-11-2019 00:55:18

1,1K Tweet

577 Followers

871 Following

OffSec (@offsectraining) 's Twitter Profile Photo

You’re conducting a penetration test on a network, and you discover that the target environment uses Active Directory. After some initial recon, you find: ❶ An open SMB port (445) on one of the servers ❷ A valid set of low-privileged domain user credentials - user1:

payloadartist (@payloadartist) 's Twitter Profile Photo

This guy gave away $462,000 of the #bugbounty he earned on Google VRP (Google Bug Hunters) to picoCTF – a massive show of gratitude for the skills he gained by playing their CTFs. Talk about giving back to the community! What a chad. cylab.cmu.edu/news/2025/01/0… #infosec #cybersecurity #infosec

This guy gave away $462,000 of the #bugbounty he earned on <a href="/GoogleVRP/">Google VRP (Google Bug Hunters)</a> to picoCTF – a massive show of gratitude for the skills he gained by playing their CTFs. Talk about giving back to the community!

What a chad.

cylab.cmu.edu/news/2025/01/0…

#infosec #cybersecurity #infosec
Critical Thinking - Bug Bounty Podcast (@ctbbpodcast) 's Twitter Profile Photo

DomPurify is supposed to keep XSS out. But what happens when a browser and a security library don’t fully agree on what an HTML comment looks like? Someone found a way to bypass DomPurify by abusing a weird parsing issue. Here’s how it works.

PinkDraconian (@pinkdraconian) 's Twitter Profile Photo

Let's see how well you all know your Content-Security-Policy. This one came up recently and tripped me up 💉 Comment which CSP you think is the most secure and why! ⌨

Let's see how well you all know your Content-Security-Policy. This one came up recently and tripped me up 💉

Comment which CSP you think is the most secure and why! ⌨
s1r1us (@s1r1u5_) 's Twitter Profile Photo

hot take: the Indian security research and bug hunting community seems overly insecure. I recently collaborated with a bug bounty team, and ironically, no one was actually sharing their work, yet they called it “teamwork.” this isn’t just a one-off experience; it seems to be

MatthewBerman (@matthewberman) 's Twitter Profile Photo

We knew very little about how LLMs actually work...until now. Anthropic just dropped the most insane research paper, detailing some of the ways AI "thinks." And it's completely different than we thought. Here are their wild findings: 🧵

We knew very little about how LLMs actually work...until now.

<a href="/AnthropicAI/">Anthropic</a> just dropped the most insane research paper, detailing some of the ways AI "thinks."

And it's completely different than we thought.

Here are their wild findings: 🧵
YesWeHack ⠵ (@yeswehack) 's Twitter Profile Photo

Have you ever come across Flutter APKs and wondered how to intercept their network requests? reFlutter by PT SWARM is a game-changer for mobile bug hunters! 📱 reFlutter works by replacing the original Flutter engine in the APK with a modified one, allowing real-time

Have you ever come across Flutter APKs and wondered how to intercept their network requests? reFlutter by <a href="/ptswarm/">PT SWARM</a> is a game-changer for mobile bug hunters! 📱

reFlutter works by replacing the original Flutter engine in the APK with a modified one, allowing real-time
Bipin Jitiya (@win3zz) 's Twitter Profile Photo

Here are some useful regex patterns for finding vulnerabilities in Java code, along with a list of Java security code review tools. gist.github.com/win3zz/59854aa…

James Kettle (@albinowax) 's Twitter Profile Photo

If you’re planning to promote your research with a website, better prepare for some quite hostile takes! (Yes, I am practicing responsible disclosure as always)

If you’re planning to promote your research with a website, better prepare for some quite hostile takes!

(Yes, I am practicing responsible disclosure as always)
xploiterr (@_xploiterr) 's Twitter Profile Photo

Gareth Heyes \u2028 The final HTML would look like this: <img src="/images/tracker.gif?search=a" srcset="FFF" onerror="alert();//&quot;"> In this case we can still trigger the onerror event handler by setting invalid image path for srcset even though src has the valid path. #bugbounty

0xSudip (@0xsudip) 's Twitter Profile Photo

I was able to determine whether an Instagram account had two-factor authentication (2FA) enabled #BugBounty #bugbountytips

I was able to determine whether an Instagram account had two-factor authentication (2FA) enabled
#BugBounty #bugbountytips
安坂星海 Azaka || VTuber (@azakasekai_) 's Twitter Profile Photo

Just saw a sick live demo of wireless headphone hijacking that allows the attacker to perform the following without ever pairing the device. All the attacker has to do is be in range. - read/write arbitrary bytes to device - read headphones information - dump firmware info -

Just saw a sick live demo of wireless headphone hijacking that allows the attacker to perform the following without ever pairing the device. All the attacker has to do is be in range.
- read/write arbitrary bytes to device
- read headphones information
- dump firmware info 
-
ryuku (@malekmesdour) 's Twitter Profile Photo

Just published my first blog post "Hunting for postMessage Vulnerabilities" blog.ryukudz.com/posts/postmess… It covers 11 postMessage vulnerabilities I discovered on bug bounty targets. enjoy ☕️ #BugBounty #bugbountytips #websecurity

Critical Thinking - Bug Bounty Podcast (@ctbbpodcast) 's Twitter Profile Photo

We announced the Critical Research Lab this week. And for our FIRST post, we got Jorian's: - Exploiting Web Worker XSS with Blobs Go check it out! lab.ctbb.show/research/Explo…

vx-underground (@vxunderground) 's Twitter Profile Photo

tl;dr of today > rastaland.TV gets crypto drained > he has stage 4 cancer > hes targeted specifically for his cancer treatment money > loses $32,000 > nerds band together > Alex Becker 🍊🏆🥇 donates $30,000 to him > malware nerds come together > drainer infra found > pull all victim