BugBountyTips Retweet 🔥 (@bbt_retweet) 's Twitter Profile
BugBountyTips Retweet 🔥

@bbt_retweet

ID: 1496350247148466180

calendar_today23-02-2022 05:04:45

2,2K Tweet

769 Followers

1,1K Following

Damian Strobel (@damian_89_) 's Twitter Profile Photo

Small bug bounty writeup from one of my findings from the past - even back then having a carefully crafted list of non resolving starbucks hostnames was essential (shameless ad: argosdns.io). Writeup: argosdns.io/blog/how-i-got… Background of hackerone.com/reports/500468

Small bug bounty writeup from one of my findings from the past - even back then having a carefully crafted list of non resolving starbucks hostnames was essential (shameless ad: argosdns.io). Writeup:

argosdns.io/blog/how-i-got…

Background of hackerone.com/reports/500468
Brute Logic (@brutelogic) 's Twitter Profile Photo

A careful compilation about one of the most misunderstood web vulnerabilities out here. The first of a series, be sure to have a solid foundation for what is to come. Practical. Operational. Full of payloads. Check it out. brutelogic.net/ssrf-mastery-s…

YS (@yshahinzadeh) 's Twitter Profile Photo

android hunt GOLDEN tip: if you land inside an internal webview via deep link (myapp://web?url=your_site), dump all JS bridges, apps inject native objects on window, they are callable by JS and some leak tokens, fire authed requests, etc. 1-click ato material ;]

android hunt GOLDEN tip: if you land inside an internal webview via deep link (myapp://web?url=your_site), dump all JS bridges, apps inject native objects on window, they are callable by JS and some leak tokens, fire authed requests, etc. 

1-click ato material ;]
𝕏 Bug Bounty Writeups 𝕏 (@bountywriteups) 's Twitter Profile Photo

Guide to File Upload Vulnerabilities: Penetration Testing and RCE Techniques medium.com/@jpablo13/guid… #bugbounty #bugbountytips #bugbountytip

Intigriti (@intigriti) 's Twitter Profile Photo

Testing for XXEs via file uploads can sometimes be complex... 😓 OXML_XXE by willis embeds XXE/XML exploits into various file formats (such as DOCX, XLSX, PPTX, ODT, SVG, etc.) and makes it incredibly easier to test for these vulnerabilities! 🤠 Check it out! 👇

Testing for XXEs via file uploads can sometimes be complex...  😓

OXML_XXE by <a href="/willvandevanter/">willis</a> embeds XXE/XML exploits into various file formats (such as DOCX, XLSX, PPTX, ODT, SVG, etc.) and makes it incredibly easier to test for these vulnerabilities! 🤠

Check it out! 👇
NullSecX (@nullsecurityx) 's Twitter Profile Photo

This vulnerability allows RCE in React Server Functions, e.g. as offered by Next.js through insecure prototype references. CVE-2025-55182

Adem süslü (@suslu7616) 's Twitter Profile Photo

Tricks; Next.js Cache Poisoning (Stale Elixir) – Örnek Normal bir kullanıcı şu isteği gönderir: GET /poc HTTP/1.1 Host: vulnerable-nextjs-site.com Saldırgan Burp Repeater’da şu isteği gönderir: GET /poc?__nextDataReq=1 HTTP/1.1 Host: vulnerable-nextjs-site.com User-Agent: CP TO

Soufiane el habti (@wld_basha) 's Twitter Profile Photo

YS adb shell am start -n activity.iWebActivity \ --es "url" "javascript:alert\(Object.keys\(window.OmegaSDK\)\)" Then use keys to enumerate each object subfunctions

Muqsit 𝕏 (@mqst_) 's Twitter Profile Photo

🧪 iOS Pentesting: Step-by-step guide on "IPA Binary Analysis" using MobSF. Guide: inesmartins.github.io/mobsf-ipa-bina… #infosec

🧪 iOS Pentesting: Step-by-step guide on "IPA Binary Analysis" using MobSF.

Guide: inesmartins.github.io/mobsf-ipa-bina…

#infosec
Coffin (@coffinxp7) 's Twitter Profile Photo

youtu.be/3KMUnLdlOSE?si… Finally… my first members-only video is live 🔥 In this video, I’ve broken down everything you need to know about finding and exploiting Google API keys for Gemini access and other services. No fluff. No theory-only talk. This is a complete, practical

Magna (@magn4_) 's Twitter Profile Photo

A good tip for anyone hunting for postMessage vulnerabilities: While testing an app, I found a listener with a weak origin check that handled messages insecurely. The bug was accepted and fixed with a strict origin check. However, while reinvestigating the app, I found a

A good tip for anyone hunting for postMessage vulnerabilities:

While testing an app, I found a listener with a weak origin check that handled messages insecurely. The bug was accepted and fixed with a strict origin check.
However, while reinvestigating the app, I found a
Kevin Thomas (@mytechnotalent) 's Twitter Profile Photo

Today's Tutorial [April 15, 2026] Lesson 160: x64 Course (Part 40 - Hacking Hello World!) This tutorial will discuss hacking hello world. #STEM #ReverseEngineering github.com/mytechnotalent…

Intigriti (@intigriti) 's Twitter Profile Photo

We just dove into our shelf of archived bug bounty write-ups from the most notable hackers! 🤠 In this issue, we selected 5 compelling articles (that are still relevant today) to share with you, from which you can learn something new! 😎 🧵 👇

We just dove into our shelf of archived bug bounty write-ups from the most notable hackers! 🤠

In this issue, we selected 5 compelling articles (that are still relevant today) to share with you, from which you can learn something new! 😎

🧵 👇