Intrusion Expert (@intruxpert) 's Twitter Profile
Intrusion Expert

@intruxpert

Bug Bounty Hunter | Web App Hacker | Red Team Specialist | Finding vulnerabilities, exploiting weaknesses, and securing the web one app at a time.

ID: 132452793

linkhttps://intruxpert.com calendar_today13-04-2010 08:17:07

177 Tweet

1,1K Followers

752 Following

Intigriti (@intigriti) 's Twitter Profile Photo

Looking for payloads to bypass weak URL validations? Check out the new PortSwigger URL validation bypass cheat sheet! It contains payloads to help you exploit SSRFs, CORS misconfigurations, open URL redirects and more! πŸ€‘ πŸ”— πŸ‘‡ buff.ly/4ja2KYs

Looking for payloads to bypass weak URL validations?

Check out the new <a href="/PortSwigger/">PortSwigger</a> URL validation bypass cheat sheet! It contains payloads to help you exploit SSRFs, CORS misconfigurations, open URL redirects and more! πŸ€‘

πŸ”— πŸ‘‡
buff.ly/4ja2KYs
Tuta (@tutaprivacy) 's Twitter Profile Photo

🚨BREAKING: Google will soon install an app called #AndroidSystemSafetyCore They say it's a "safety measure" to protect your #privacy, but in fact it's client-side scanning. Yet, we all know that client-side scanning is bad: tuta.com/blog/eu-client… Deinstall the app #Android:

Intrusion Expert (@intruxpert) 's Twitter Profile Photo

Remember what I told you? I used that method and snagged this bounty a few days ago πŸ˜‰ #BugBounty #bugbountytips #infosec

Remember what I told you? I used that method and snagged this bounty a few days ago πŸ˜‰ 

#BugBounty #bugbountytips #infosec
Intrusion Expert (@intruxpert) 's Twitter Profile Photo

When you're diving into fuzzing files, start off with .html and .js. Trust me! πŸ˜‰ my experience shows this approach gives you the best shot at landing that bounty! #FuzzingTips #BugBounty #bugbountytips #infosec

FBI (@fbi) 's Twitter Profile Photo

North Korean cyber actors have stolen approximately $1.5 billion in Ethereum from Bybitβ€”a cryptocurrency exchangeβ€”and are dispersing the stolen assets across addresses on multiple blockchains. The FBI recommends blocking transactions with these addresses: ic3.gov/PSA/2025/PSA25…

North Korean cyber actors have stolen approximately $1.5 billion in Ethereum from Bybitβ€”a cryptocurrency exchangeβ€”and are dispersing the stolen assets across addresses on multiple blockchains. The FBI recommends blocking transactions with these addresses: ic3.gov/PSA/2025/PSA25…
shubs (@infosec_au) 's Twitter Profile Photo

The security research team at Assetnote reported a critical pre-auth RCE vulnerability affecting Sitecore XP 10.4 late last year. We continue to protect our customers from 0day vulnerabilities long before patches arrive. Read the blog here: slcyber.io/blog/sitecore-…

The security research team at <a href="/assetnote/">Assetnote</a> reported a critical pre-auth RCE vulnerability affecting Sitecore XP 10.4 late last year. We continue to protect our customers from 0day vulnerabilities long before patches arrive. Read the blog here: slcyber.io/blog/sitecore-…
Intrusion Expert (@intruxpert) 's Twitter Profile Photo

I execute this command regularly to eliminate domains linked with a particular nameserver. You can modify this command according to your specific requirements. Replace "markmonitor.com" with your target NS . #Bash #bugbounty #infosec #bugbountytips

I execute this command regularly to eliminate domains linked with a particular nameserver. You can modify this command according to your specific requirements.
Replace "markmonitor.com" with your target NS .
#Bash #bugbounty #infosec #bugbountytips
rez0 (@rez0__) 's Twitter Profile Photo

Using common crawl for hacking is genius! Here's a small snippet from the latest Critical Thinking - Bug Bounty Podcast episode about what Truffle Security did to find 12,000 live api keys and secrets.

Intigriti (@intigriti) 's Twitter Profile Photo

Common Security Issues in Financially-Oriented Web Applications by Soroush Dalili is a guideline for pentesters (& bug bounty hunters) to test checkout and payment systems in all sorts of targets! 😎 πŸ”— soroush.me/downloadable/c…

Common Security Issues in Financially-Oriented Web Applications by <a href="/irsdl/">Soroush Dalili</a> is a guideline for pentesters (&amp; bug bounty hunters) to test checkout and payment systems in all sorts of targets! 😎

πŸ”— soroush.me/downloadable/c…
Intrusion Expert (@intruxpert) 's Twitter Profile Photo

🀯 Full-time bug hunters, check this out! I built this powerful Nginx Server Status Telegram Bot in under 5 minutes using Cursor! πŸš€ It actively monitors Nginx status pages (even ZIP compressed files!), searching for your specified URL patterns and sending instant Telegram alerts

🀯 Full-time bug hunters, check this out! I built this powerful Nginx Server Status Telegram Bot in under 5 minutes using Cursor! πŸš€ It actively monitors Nginx status pages (even ZIP compressed files!), searching for your specified URL patterns and sending instant Telegram alerts
bugcrowd (@bugcrowd) 's Twitter Profile Photo

10 OSINT search engines for bug bounty hunters πŸ‘‡ πŸͺ² hunter.io πŸ› intelx.io 🐞 shodan.io 🐜 censys.com πŸͺ³ crt.sh 🦟 virustotal.com πŸ•·οΈ zoomeye.ai πŸͺ² nerdydata.com πŸ›

10 OSINT search engines for bug bounty hunters πŸ‘‡

πŸͺ² hunter.io
πŸ› intelx.io
🐞 shodan.io
🐜 censys.com
πŸͺ³ crt.sh
🦟 virustotal.com
πŸ•·οΈ zoomeye.ai
πŸͺ² nerdydata.com
πŸ›
Godfather Orwa πŸ‡―πŸ‡΄ (@godfatherorwa) 's Twitter Profile Photo

Shame on HackerOne Please like and retweet Previously, this platform demonstrated racial discrimination when it blocked all researchers in Russia. And today it's back to do that with the The Arab community and Muslims in particular I got a full-time ban on H1 me H4x0r.DZ &

Shame on <a href="/Hacker0x01/">HackerOne</a>
Please like and retweet 
Previously, this platform demonstrated racial discrimination when it blocked all researchers in Russia.

And today it's back to do that with the
 The Arab community and Muslims in particular
I got a full-time ban on H1 me <a href="/h4x0r_dz/">H4x0r.DZ</a> &amp;
shubs (@infosec_au) 's Twitter Profile Photo

To kick off our Christmas and July research posts, we explain how we achieved persistent XSS on every Adobe Experience Manager Cloud instance, not twice, but thrice! This is now patched across all of AEM cloud, but what an interesting attack surface! slcyber.io/assetnote-secu…

To kick off our Christmas and July research posts, we explain how we achieved persistent XSS on every Adobe Experience Manager Cloud instance, not twice, but thrice! This is now patched across all of AEM cloud, but what an interesting attack surface! slcyber.io/assetnote-secu…