I¯\_(ツ)_/¯I \ (•◡•) / (@bountyoverflow) 's Twitter Profile
I¯\_(ツ)_/¯I \ (•◡•) /

@bountyoverflow

BBH ( ͡° ͜ʖ ͡°) 💰 @Bugcrowd Top 50 \o/ ✌️ MVP✌️
I am here to learn/share application security stuff ✌️
I enjoy finding auth bypass bugs 🐞

ID: 223011491

calendar_today05-12-2010 03:36:07

1,1K Tweet

6,6K Followers

1,1K Following

Alexander Myasoedov (@arekusandr_) 's Twitter Profile Photo

INTRODUCING: Agentic Security - LLM Security Scanner! 🔍 🛠️ Customizable Rule Sets: Tackle agent-based attacks with precision! 🧪 Comprehensive Fuzzing: Dive deep into any LLM's vulnerabilities! 🔄 LLM API Integration & Stress Testing: Ensure robust performance!

xssdoctor (@xssdoctor) 's Twitter Profile Photo

When it comes to GraphQL recon, JavaScript is the next best thing to introspection. I made a tool (in go) which finds all graphql queries in js files (or folders) and uses ChatGPT to build the queries for you! github.com/xssdoctor/grap…

Hunter (@huntermapping) 's Twitter Profile Photo

🚨Alert🚨CVE-2024-30103: Microsoft Outlook Remote Code Execution Vulnerability ⚠This Microsoft Outlook vulnerability can be circulated from user to user and doesn’t require a click to execute. Rather, execution initiates when an affected email is opened.This is notably dangerous

🚨Alert🚨CVE-2024-30103: Microsoft Outlook Remote Code Execution Vulnerability
⚠This Microsoft Outlook vulnerability can be circulated from user to user and doesn’t require a click to execute. Rather, execution initiates when an affected email is opened.This is notably dangerous
ramsexy (@plmaltais) 's Twitter Profile Photo

I was facing a very strict WAF while trying to exploit a XSS : no gt/lt signs, no parentheses, no double quotes, no backticks. I was injecting inside an html tag. Turns out the solution was very simple (and not well documented): <img src=x onerror=alert&#40document.domain&#41>

I was facing a very strict WAF while trying to exploit a XSS : no gt/lt signs, no parentheses, no double quotes, no backticks. I was injecting inside an html tag. Turns out the solution was very simple (and not well documented): 

&lt;img src=x onerror=alert&amp;#40document.domain&amp;#41&gt;
I¯\_(ツ)_/¯I \ (•◡•) / (@bountyoverflow) 's Twitter Profile Photo

There is a public website with the following folder path: txyz.com/wp-content/upl…<filename> Does anyone know of any tricks for WordPress websites that would allow me to list all files and folders in the 'uploads' directory? #thanks-in-adv

I¯\_(ツ)_/¯I \ (•◡•) / (@bountyoverflow) 's Twitter Profile Photo

After a 4-month break, I’m backon bugcrowd ! Life kept me busy with something truly special—welcoming my adorable daughter into the world. 🍼💕 Feeling so blessed! 🥰

After a 4-month break, I’m backon <a href="/Bugcrowd/">bugcrowd</a> ! Life kept me busy with something truly special—welcoming my adorable daughter into the world. 🍼💕 Feeling so blessed! 🥰
James Kettle (@albinowax) 's Twitter Profile Photo

Got a CSRF attack being blocked by Content-Type validation? You might be able to bypass it with this quality technique. x.com/lukejahnke/sta…

zseano (@zseano) 's Twitter Profile Photo

3th1c_yuk1 Intigriti renniepak Seems rennie deleted his twitter so original post is gone :/ but someone made a post about it here with the code: execure.medium.com/unleashing-the…

Kévin GERVOT (Mizu) (@kevin_mizu) 's Twitter Profile Photo

Thanks to the recent PortSwigger top 10, I finally found the motivation to finish writing the 2nd article about DOMPurify security! 😁 Before releasing it, I would like to share a small challenge 🚩 Challenge link 👇 challenges.mizu.re/xss_04.html 1/2

Thanks to the recent <a href="/PortSwigger/">PortSwigger</a> top 10, I finally found the motivation to finish writing the 2nd article about DOMPurify security! 😁

Before releasing it, I would like to share a small challenge 🚩

Challenge link 👇
challenges.mizu.re/xss_04.html

1/2
evan j (@ejcx_) 's Twitter Profile Photo

blog.cloudflare.com/resolving-a-mu… I don’t work there anymore but it’s truly so sick seeing this level of weird bug being patched so fast Hell yeah