snowman πŸ‡΅πŸ‡Έ (@snowflakes4l) 's Twitter Profile
snowman πŸ‡΅πŸ‡Έ

@snowflakes4l

InfoSec Enthusiast, Bug Bounty Hunter and Penetration Tester

ID: 1914163533979541504

calendar_today21-04-2025 03:45:51

23 Tweet

3 Followers

45 Following

snowman πŸ‡΅πŸ‡Έ (@snowflakes4l) 's Twitter Profile Photo

Bug Bounty in 3 lines: 1. Continuous Learning. 2. Building Methodology. 3. Identifying Unique Attack Vectors. #BugBounty #bugbountytips

Rana Khalil πŸ‡΅πŸ‡Έ (@rana__khalil) 's Twitter Profile Photo

πŸŽ‰ New Course Alert + Giveaway! πŸŽ‰ I'm excited to announce a brand-new course on Rana Khalil's Academy - HTTP Host Header Attacks. This course includes: πŸ“š A technical deep dive into host header attacks. πŸ§ͺ 7 hands-on labs πŸ“ƒ Subtitles in 8 languages for all the videos in this

πŸŽ‰ New Course Alert + Giveaway! πŸŽ‰

I'm excited to announce a brand-new course on <a href="/RanaKhalilAcad/">Rana Khalil's Academy</a> - HTTP Host Header Attacks.

This course includes:
πŸ“š A technical deep dive into host header attacks.
πŸ§ͺ  7 hands-on labs
πŸ“ƒ Subtitles in 8 languages for all the videos in this
snowman πŸ‡΅πŸ‡Έ (@snowflakes4l) 's Twitter Profile Photo

Huge thanks to Rana Khalil πŸ‡΅πŸ‡Έ Rana Khalil's Academy for the generous giveaway! It’s an honor to be selected, but more than thatβ€”thank you for being a consistent source of knowledge, motivation, and support in the infosec world. Proud to be learning alongside this amazing community.

snowman πŸ‡΅πŸ‡Έ (@snowflakes4l) 's Twitter Profile Photo

Still have WPS enabled on your router? Pixie-Dust doesn't care about lockouts. It rips the PIN offline in seconds using chipset flaws. Your Wi-Fi password is toast. Disable WPS or stay exposed.

Still have WPS enabled on your router? Pixie-Dust doesn't care about lockouts. It rips the PIN offline in seconds using chipset flaws. Your Wi-Fi password is toast. Disable WPS or stay exposed.
bugcrowd (@bugcrowd) 's Twitter Profile Photo

A lot of hackers fail because they only look for bugs, not systems. If you want to find vulnerabilities others miss, you need to model how the application works first. Here are 5 ways to do it right πŸ‘‡ 1️⃣ Identify valuable target data Start by asking: what data does the

A lot of hackers fail because they only look for bugs, not systems.

If you want to find vulnerabilities others miss, you need to model how the application works first.

Here are 5 ways to do it right πŸ‘‡

1️⃣ Identify valuable target data

Start by asking: what data does the
Standoff Bug Bounty (@standoffbb) 's Twitter Profile Photo

New video alert! Alex Moshkov, our Community Bro, chats with the legendary Godfather Orwa πŸ‡―πŸ‡΄ β€” 1,500+ bugs, 500 critical! From hobbyist to pro hacker, hear his wild journey and top tips for bug bounty success. Watch the full video here: youtu.be/ai2MMrN5lI0?si…

Bug Bounty Village (@bugbountydefcon) 's Twitter Profile Photo

403 on /get_all_users 404 on /get_all_userz Then Justin Gardner fuzzed until a double-encoded β€œS” slipped past the NGINX filter. Result: 4.5M users' PII dumped. Bounty: $15K–$20K Full talk β†’ youtu.be/PXqlHAoF2wc #BugBounty #DEFCON #BBV #AppSec #WebSecurity

snowman πŸ‡΅πŸ‡Έ (@snowflakes4l) 's Twitter Profile Photo

Handing your device to a repair shop? You might be handing over your data too. Think twice before giving full access to your device youtu.be/IFlDpUeMsKM