GR1FF1N (@johntech2023) 's Twitter Profile
GR1FF1N

@johntech2023

Cybersecurity Specialist 🕵️‍♂️ | Learn ETHICAL HACKING with secrets🥷🏿 udemy.com/user/gr1ff1n/

ID: 1685346517240975360

linkhttps://gr1ff1nsec.carrd.co/ calendar_today29-07-2023 17:48:33

5,5K Tweet

1,1K Followers

431 Following

Coffin (@coffinxp7) 's Twitter Profile Photo

We’ve crossed 1,000+ members on our Discord! so fast. If you haven’t joined yet now’s the time. new tools, private bug bounty tips and exclusive hacking content are dropping soon. Don’t miss out! discord.gg/xTVU4jkScV

We’ve crossed 1,000+ members on our Discord! so fast. If you haven’t joined yet now’s the time. new tools, private bug bounty tips and exclusive hacking content are dropping soon. Don’t miss out!
discord.gg/xTVU4jkScV
GR1FF1N (@johntech2023) 's Twitter Profile Photo

If you come across an admin/service login page Always try to hit urls like /register /signup /sign_up etc, if registering is not disabled then you might get lucky :D

GR1FF1N (@johntech2023) 's Twitter Profile Photo

around 3-4 months ago I reported a vulnerability to a university where I can see all internal staff emails till this day I can still register, login and see what emails they are sending gud job guyz, maybe in 10 years they will fix

GR1FF1N (@johntech2023) 's Twitter Profile Photo

Female walks past „PuT that $2500 iN ThaT Bitcoin thing” Shes gonna buy it and call crypto a scam 100%💀

🔍mrro0o0tt (@joyerz5) 's Twitter Profile Photo

I was able to delete anyone's Bookings. But this was so tricky, not an easy IDOR! Original Req: DELETE /api/bookings?bookings=3777104 Response: Invalid Bookings = > 400 Bad Modified req: DELETE /api/bookings?bookings[]=3777104 Response: 200 OK #bugbountytips

I was able to delete anyone's Bookings. But this was so tricky, not an easy IDOR!

Original Req:
DELETE /api/bookings?bookings=3777104 

Response:
Invalid Bookings = > 400 Bad

Modified req:
DELETE /api/bookings?bookings[]=3777104 

Response:
200 OK 

#bugbountytips
vx-underground (@vxunderground) 's Twitter Profile Photo

hOw iS maLwARe wRiTteN I unironically see this question posed by people who can program. In its simplest form malware is just like any other program written except it has task automation present. Anything after the task automation segment is an auxiliary component and designed