Bug Hunter Labs (@bughunterlabs) 's Twitter Profile
Bug Hunter Labs

@bughunterlabs

ID: 1346173619840303104

linkhttp://youtube.com/@bughunterlabs calendar_today04-01-2021 19:16:27

506 Tweet

1,1K Followers

683 Following

Bug Hunter Labs (@bughunterlabs) 's Twitter Profile Photo

Sometimes programs run a "private program" and state so publicly. Here is a google dork to find some of them: πŸͺ„ site:hackerone[.]com "private program" -docs.hackerone.com -inurl:/reports -"Profile" πŸͺ„

s1r1us (@s1r1u5_) 's Twitter Profile Photo

Ben Sadeghipour Pick a niche, become an expert, find bugs maybe even 0days or reverse n-days, and write blogs. Even if you don’t hit those $100k bounties, it’ll be a stepping stone toward a $100k job. What niche? How to pick? Examples? infosec being so vast from web3 sec to web2, mobile,

Bug Hunter Labs (@bughunterlabs) 's Twitter Profile Photo

Really digging pwn.college for the past few months! Highly recommend checking it out! I am learning a lot, the resources are great, discord community is nice and it's all free. πŸ‘

Bug Hunter Labs (@bughunterlabs) 's Twitter Profile Photo

🐚Let’s pop more shells than fireworks this year! 🐚 May it rain bugs (and big bounties πŸ’Έ) in 2025. May your fuzzers be sharp, your payloads precise, and your reports always accepted on the first try. Thank you for making 2024 legendary. Let’s level up together. πŸ›πŸ”₯

Bug Hunter Labs (@bughunterlabs) 's Twitter Profile Photo

πŸŽ‰βœ¨ 4 YEARS of Bug Hunter Labs! βœ¨πŸŽ‰ Can't believe that it has been 4 years already. To everyone who has followed, or engaged, Bug Hunter Labs, THANK YOU. πŸ™ It means a lot! #MyXAnniversary

πŸŽ‰βœ¨ 4 YEARS of <a href="/bughunterlabs/">Bug Hunter Labs</a>! βœ¨πŸŽ‰
Can't believe that it has been 4 years already. 
To everyone who has followed, or engaged,  <a href="/bughunterlabs/">Bug Hunter Labs</a>, THANK YOU. πŸ™ It means a lot! #MyXAnniversary
Bug Hunter Labs (@bughunterlabs) 's Twitter Profile Photo

If you ever need a shellcode smaller than 24 bytes to read a file: 1️⃣ Link your file to f: ln -s /flag f 2️⃣ Use this minimal shellcode: global _start section .text _start: ; int chmod(const char *path, mode_t mode); mov rax, 90 ; syscall number for

Bug Hunter Labs (@bughunterlabs) 's Twitter Profile Photo

If we would rethink tooling for penetration testing & bug hunting, especially proxies (e.g. Burp, Caido) how would they look like? My thought is that the proxy/tooling should be directly integrated in the browser. - No switching windows -> Less workflow friction