Toufik Touhami (@ebit_official) 's Twitter Profile
Toufik Touhami

@ebit_official

ID: 1454733573278339072

calendar_today31-10-2021 08:54:56

27 Tweet

10 Takipçi

229 Takip Edilen

HolyBugx (@holybugx) 's Twitter Profile Photo

My File Upload Checklist, detailed version of Ahsan Khan checklist, and also some extra methods I personally use and gathered during the time. #BugBounty #BugBountyTip #BugBountyTips #TogetherWeHitHarder #InfoSec

My File Upload Checklist, detailed version of <a href="/hunter0x7/">Ahsan Khan</a> checklist, and also some extra methods I personally use and gathered during the time.

#BugBounty #BugBountyTip #BugBountyTips #TogetherWeHitHarder #InfoSec
Rohan_lew (@rohan_lew) 's Twitter Profile Photo

Quick tips : How i found 10+ information disclosure in hackerone public program 1/n 1st: collect all ip's from shodan shodan search Ssl.cert.subject.CN:"target.com*" 200 --fields ip_str | httpx | tee ips.txt 2nd: fuzz all ips using dirsearch

Lu3ky13 ⚡️⚡️ (@lu3ky13) 's Twitter Profile Photo

use this bot in a telegram to find a subdomain if you don't have a computer you can use this bot #bugbountytips #BugBounty #hackerone #bugs

Toufik Touhami (@ebit_official) 's Twitter Profile Photo

#quicktip Fastest bounty (30 minutes) Always add magical null byte %00 domain.com/api/pro-player… Response: 503 Service Unavailable Server will be down for some time. Bounty 100$ #bugbountytips #BugBounty

Toufik Touhami (@ebit_official) 's Twitter Profile Photo

Some bugs will never appear in first usage of a bb program. Found Account takeover after spending 10 days on a single target. #BugBounty #bugbountytips #bugbountytip

Some bugs will never appear in first usage of a bb program.
Found Account takeover after spending 10 days on a single target.
#BugBounty #bugbountytips #bugbountytip
Md Ismail Šojal 🕷️ (@0x0sojalsec) 's Twitter Profile Photo

Polyglot payload:⚔️ test+”<%= 7*7 %>’(</script></style></title></textarea><svg/onload=al\u0065rt`1`>) example .com #infosec #cybersec #bugbountytips

Omar Hashem (@omarhashem666) 's Twitter Profile Photo

Hello everyone, as promised, this is a detailed write-up on how I was able to get an account takeover in HubSpot Public Bug Bounty Program omar0x01.medium.com/4e2047914ab5 #BugBounty #bugbountytips #Pentesting #cybersecurite #infosec ATO

Intigriti (@intigriti) 's Twitter Profile Photo

Being a hacker means thinking out of the box! bemodtwz innovates on the GET parameter brute-forcing by hooking JS functions to find new GET parameters as they're being used! #bugbounty #bugbountytips 👇

Being a hacker means thinking out of the box! 

<a href="/bemodtwz/">bemodtwz</a> innovates on the GET parameter brute-forcing by hooking JS functions to find new GET parameters as they're being used!

#bugbounty #bugbountytips 👇
Gokul SK (@goktest) 's Twitter Profile Photo

Have a look at my FIRST bug bounty write-up regarding the RCE i got recently. Do share if you found it helpful. link.medium.com/fumN735PaAb #BugBounty #bugbountytips #hackerone

Godfather Orwa 🇯🇴 (@godfatherorwa) 's Twitter Profile Photo

7 SQLs 4 in php (select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/ 1 in aspx orwa';%20waitfor%20delay%20'0:0:6'%20--%20 2 in graphql orwa') OR 11=(SELECT 11 FROM PG_SLEEP(6))-- #bugbountytips #bugbountytip 💕

7 SQLs 

4 in php

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1 in aspx

orwa';%20waitfor%20delay%20'0:0:6'%20--%20

2 in graphql
orwa') OR 11=(SELECT 11 FROM PG_SLEEP(6))--
#bugbountytips #bugbountytip 💕
0 day exploit (@0day_exploit_) 's Twitter Profile Photo

My personal XSS all-in-one payload Here - branch-delivery-7d5.notion.site/xss-dd37aad820… #bugbountytips #PentestCheatSheets #CheatSheets #pentest #infosecurity #cybersecurity #BugBounty #Hacking #xss

Jayesh Madnani (@jayesh25_) 's Twitter Profile Photo

🔐💰 Question of the day: How can you maximize payouts for "Low" risk open redirect issues? 🤑 I've personally earned over $30,000 in bounties by chaining open redirect submissions to ATOs. These "Low" severity bugs can often be escalated through a double redirection, resulting