0xl3mon (@0xlem0n) 's Twitter Profile
0xl3mon

@0xlem0n

Learn how it works. Then break it. In that order.

ID: 1585224436650835974

calendar_today26-10-2022 10:59:08

420 Tweet

142 Followers

956 Following

Nithin 🦹‍♂️ (@thebinarybot) 's Twitter Profile Photo

The easiest P1/P2 afaik is Sensitive Information. You can mostly find this on Github. Using the correct dorks would result in quick $$$$. Here's a list of highly efficient Github dorks that I use on a regular basis. 🧵👇 #bugbounty #dorks #github #bugbountytips

Critical Thinking - Bug Bounty Podcast (@ctbbpodcast) 's Twitter Profile Photo

Frans Rosen was on the pod last week and dropped some mind-bending X-Correlation Injection research on us. Including these gems on how to test for it... 1/7

Frans Rosen was on the pod last week and dropped some mind-bending X-Correlation Injection research on us.

Including these gems on how to test for it...

1/7
Cryptolaemus (@cryptolaemus1) 's Twitter Profile Photo

#WikiLoader - #TA544 - url > .msi > .dll #Signed - Canton Pure Jonna Network Technology msiexec.exe /I GlobalProtect64.msi C:\Users\*\AppData\Roaming\NitroSoftNPv1.3\notepad.exe (sideload)👇 \AppData\Roaming\NitroSoftNPv1.3\mimeTools.dll (1/3) IOC's github.com/pr0xylife/Wiki…

#WikiLoader - #TA544 - url > .msi > .dll

#Signed - Canton Pure Jonna Network Technology

msiexec.exe /I GlobalProtect64.msi

C:\Users\*\AppData\Roaming\NitroSoftNPv1.3\notepad.exe (sideload)👇

\AppData\Roaming\NitroSoftNPv1.3\mimeTools.dll

(1/3) 

IOC's
github.com/pr0xylife/Wiki…
Lupin (@0xlupin) 's Twitter Profile Photo

My DEF CON talk about how we made around $150k in Bug Bounty only with Denial of Services is out ! Let me know what you think 😁 youtu.be/b7WlUofPJpU?si…

bbupdate (@inbbupdates) 's Twitter Profile Photo

$20,300 Bounties from a 200 Hour Hacking Challenge blog.voorivex.team/20300-bounties…… #infosec #bugbounty #TogetherWeHitHarder #inbbupdatesblogs

James Kettle (@albinowax) 's Twitter Profile Photo

If you like bounties, I highly recommend this presentation from Martin Doyhenard on novel web cache deception techniques. It comes with Web Security Academy labs too! youtube.com/watch?v=70yyOM…

zhero; (@zhero___) 's Twitter Profile Photo

very pleased to announce the release of my new article based on my research that led to CVE-2024-46982 titled: Next.js, cache, and chains: the stale elixir zhero-web-sec.github.io/research-and-t… note: does not cover the latest findings shared in my recent posts enjoy reading;

very pleased to announce the release of my new article based on my research that led to CVE-2024-46982 titled:

Next.js, cache, and chains: the stale elixir

zhero-web-sec.github.io/research-and-t…

note: does not cover the latest findings shared in my recent posts

enjoy reading;
bugcrowd (@bugcrowd) 's Twitter Profile Photo

One-liner to gather and crawl subdomains, then generate a custom wordlist from the target's discovered URLs 👇🏽 subfinder -d bugcrowd.com -silent | httpx -silent | hakrawler | tr '[:punct:]' '\n' | sort -u

One-liner to gather and crawl subdomains, then generate a custom wordlist from the target's discovered URLs 👇🏽

subfinder -d bugcrowd.com -silent | httpx -silent | hakrawler | tr '[:punct:]' '\n' | sort -u
0xl3mon (@0xlem0n) 's Twitter Profile Photo

Yeiii! Just got a reward for a critical vulnerability submitted on YesWeHack ⠵ -- Insecure Storage of Sensitive Information (CWE-922). #YesWeRHackers

Yeiii!

Just got a reward for a critical vulnerability submitted on <a href="/yeswehack/">YesWeHack ⠵</a> -- Insecure Storage of Sensitive Information (CWE-922). #YesWeRHackers
0xl3mon (@0xlem0n) 's Twitter Profile Photo

After almost 10 hours I finally completed it 🔓 Just beat the "Dojo #42 - Hex Color Palette" challenge on @YesWeHack! Think you can match my skills? 🌟 dojo-yeswehack.com/challenge/play… #YesWeHack #ChallengeAccepted

0xl3mon (@0xlem0n) 's Twitter Profile Photo

Challenging, clever, and seriously fun. I enjoyed every second of it! "Dojo #43 - CCTV Manager"? Pwned! It was a blast on @YesWeHack! Think you can take it on? 🌟 dojo-yeswehack.com/challenge/play… #YesWeHack #ChallengeAccepted