r00tpgp (@r00tpgp) 's Twitter Profile
r00tpgp

@r00tpgp

Hip hop hooray ho! Hackedie hack, cybersec n lemons.

ID: 62754303

linkhttp://r00tpgp.blogspot.com calendar_today04-08-2009 08:02:14

1,1K Tweet

692 Followers

675 Following

Behi (@behi_sec) 's Twitter Profile Photo

SSRF Trick: Instead of 169.254.169.254, try http://instance-data. It resolves to the same metadata IP and might bypass blacklists.

𝕏 Bug Bounty Writeups 𝕏 (@bountywriteups) 's Twitter Profile Photo

Host Header Injection in Password Reset Function: From Header Manipulation to Account Takeover medium.com/@dgexploit/hos… #bugbounty #bugbountytips #bugbountytip

Mr_mars_hacker (@mr_mars_hacker) 's Twitter Profile Photo

I just published How I Discovered Account Takeover (ATO) via IDOR lead to 500$ bounty medium.com/p/how-i-discov… #bugbounty #bugbountytips #bugbountytip

André Baptista (@0xacb) 's Twitter Profile Photo

This one-liner by @tomnomnom finds all Git repos, creates a git-objects/ folder for each one and dumps every object (commits, trees, blobs, tags) into files named by their hash. Effectively exporting the raw Git database into human-readable files, repo by repo!

This one-liner by @tomnomnom finds all Git repos, creates a git-objects/ folder for each one and dumps every object (commits, trees, blobs, tags) into files named by their hash.

Effectively exporting the raw Git database into human-readable files, repo by repo!
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 Linux/Unix alert: CISA just flagged a critical Sudo flaw (CVE-2025-32463, CVSS 9.3) now exploited in the wild. Attackers can hijack sudo’s --chroot option to run arbitrary commands as root—even if not in sudoers. Details → thehackernews.com/2025/09/cisa-s…

🇷🇴 cristi (@cristivlad25) 's Twitter Profile Photo

when you look for ATO, make sure that you go beyond x-forwarded-for. try at least the following, each individually. - x-forwarded-host - x-original-url - x-host - host I just found one via x-forwarded-host, while the rest did nothing or 421.

when you look for ATO, make sure that you go beyond x-forwarded-for. try at least the following, each individually.

- x-forwarded-host
- x-original-url
- x-host
- host

I just found one via x-forwarded-host, while the rest did nothing or 421.
André Baptista (@0xacb) 's Twitter Profile Photo

I love using PwnFox to keep my Burp and Caido sessions organised.  It's an extension that makes broken access control (BAC) testing effortless. Spin up isolated browser containers so you can log into multiple accounts side-by-side in one window. Each container is mapped to a

Intigriti (@intigriti) 's Twitter Profile Photo

Testing for React2Shell can be as easy as: 1. Running HTTPX to identify NextJS targets 2. Passing the list of targets to React2shell-scanner 3. Verify & report results 🤠 More in next post! 👇

Testing for React2Shell can be as easy as:

1. Running HTTPX to identify NextJS targets
2. Passing the list of targets to React2shell-scanner
3. Verify & report results  🤠

More in next post! 👇
Coffin (@coffinxp7) 's Twitter Profile Photo

Useful WAF Bypass Techniques for React2Shell. for more you can check the updated article: coffinxp.medium.com/from-recon-to-…

Useful WAF Bypass Techniques for React2Shell. for more you can check the updated article:
coffinxp.medium.com/from-recon-to-…
Behi (@behi_sec) 's Twitter Profile Photo

These 3 simple payloads are responsible for hundreds of thousands of dollars in bounties: - "><img src onerror=alert()> => XSS - ' => SQLi - ../ => Path Traversal Can you believe it? ☠️