BugPoC (@bugpoc_official) 's Twitter Profile
BugPoC

@bugpoc_official

BugPoC is a platform to build and share proof-of-concepts for Bug Bounty Submissions, PenTest Deliverables, & Red Team Reports. Visit bugpoc.com to learn more!

ID: 1202334595607228416

linkhttps://bugpoc.com calendar_today04-12-2019 21:11:28

302 Tweet

5,5K Followers

13 Following

BugPoC (@bugpoc_official) 's Twitter Profile Photo

Last day to submit solutions! Submit yours at hackerone.com/bugpoc before 10pm EDT for your chance to win cash prizes and skip the first interview for select Amazon Sec Eng Roles! #bugbountytips #ssrf #heapdump

BugPoC (@bugpoc_official) 's Twitter Profile Photo

Huge THANK YOU to all the hackers that participated in our latest CTF! Congrats to the following raffle winners: Robin De Baets Aloïs Thévenot Akshansh Jaiswal Yash Sodha Check H1 for a $250 prize! Don't forget to publish blog write-ups before 05/05 10pm EDT. Our fave gets $250!

Ngo Wei Lin (@creastery) 's Twitter Profile Photo

Thanks for the fun memory leak challenge BugPoC Ben Sadeghipour! Wrote a thing or two on how to approach & solve the challenge, alternative solutions, and shared some tools/tips as well. Enjoy! :) creastery.com/blog/bugpoc-ap…

Ben Sadeghipour (@nahamsec) 's Twitter Profile Photo

New video! I just made a walkthrough of BugPoC's Doggo CTF in partnership with Amazon's security team. Some fun with device fingerprinting, a path traversal, and more! youtu.be/G2n6AdTQmqU BTW the CTF is still up, if anyone wants to give a try!

BugPoC (@bugpoc_official) 's Twitter Profile Photo

Want to learn how to chain an Encryption Oracle + SSRF + Dir Traversal + Heapdump? Check out this great write-up by dunglt140150 about our latest CTF! 📝 Huge thanks to all hackers that made write-ups! More CTFs coming soon! 🪲🔨 ltidi.medium.com/bugpoc-hack-th…

Sayaan Alam (@ehsayaan) 's Twitter Profile Photo

Got SSRF/LFI using Open Graph Protocol , Server was parsing thumbnail using og:image property , Crafted a page by putting <meta property="og:image" content="file:///etc/passwd"/> to pull local file, Similar approach used to solve BugPoC CTF⬇️ #bugbounty #bugbountytips

BugPoC (@bugpoc_official) 's Twitter Profile Photo

$100,500 Apple bug bounty 🤯 Safari UXSS, Gatekeeper bypass, local file execution, and filesystem access CVE-2021-30861 CVE-2021-30975 #bugbountytips #apple ryanpickren.com/safari-uxss

Jon Bottarini (@jon_bottarini) 's Twitter Profile Photo

Great research once again from Ryan Pickren for those looking for Apple bugs: Gaining unauthorized camera access via Safari UXSS ryanpickren.com/safari-uxss

WIRED (@wired) 's Twitter Profile Photo

A group of MacOS vulnerabilities—fixed by Apple at the end of last year—could allow an attacker to "punch a hole" in your Safari browser, granting them access to your online accounts, to turn on your mic, or even take over your webcam. 😳 wired.trib.al/sIiHSjb