Dzmitry Lukyanenko (@vulnano) 's Twitter Profile
Dzmitry Lukyanenko

@vulnano

ID: 984040401735770121

linkhttp://www.vulnano.com calendar_today11-04-2018 12:08:09

107 Tweet

1,1K Followers

102 Following

Dzmitry Lukyanenko (@vulnano) 's Twitter Profile Photo

Lie. HackerOne is not sending payments anywhere if you have Belarussian/Russian passport. And they call me " valued member of our community" in survey email, really? Support completely ignores questions from your "valued" member, you don't send payments anywhere.

Lie. <a href="/Hacker0x01/">HackerOne</a> is not sending payments anywhere if you have Belarussian/Russian passport. And they call me " valued member of our community" in survey email, really? Support completely ignores questions from your "valued" member, you don't send payments anywhere.
xnwup (@xnwup) 's Twitter Profile Photo

Hackerone might be the only company that decided to not pay citizens of Belarus/Russia what they owed them prior to invasion of Ukraine. They won't send $25k that I earned in 2021. They say sanctions are the reason, but actually the reasons are not legal, but... ideological. 1/

Hackerone might be the only company that decided to not pay citizens of Belarus/Russia what they owed them prior to invasion of Ukraine. They won't send $25k that I earned in 2021. They say sanctions are the reason, but actually the reasons are not legal, but... ideological. 1/
Dzmitry Lukyanenko (@vulnano) 's Twitter Profile Photo

React debug.keystore key was trusted by Meta(Facebook) which caused to Instagram account takeover by malicious apps. More information -> vulnano.com/2022/07/react-…

xnwup (@xnwup) 's Twitter Profile Photo

Hackerone steals from researchers based on nationality, using sanctions as pretense. Proof that their executive team (Mårten Mickos Michiel Prins) publicly lied about sanctions when there are none (confirmed by OFAC)

Hackerone steals from researchers based on nationality, using sanctions as pretense. Proof that their executive team (<a href="/martenmickos/">Mårten Mickos</a> <a href="/michielprins/">Michiel Prins</a>) publicly lied about sanctions when there are none (confirmed by OFAC)
Flipper Zero (@flipper_zero) 's Twitter Profile Photo

PayPal has blocked our business account and is holding $1.3M for more than 2 months without explaining what exactly they are not happy with. Even PayPal support doesn't know what's going on. ⚠️This endangers the production of Flipper Zero in general. More details in thread 1/5

PayPal has blocked our business account and is holding $1.3M for more than 2 months without explaining what exactly they are not happy with. Even <a href="/PayPal/">PayPal</a> support doesn't know what's going on. ⚠️This endangers the production of Flipper Zero in general. More details in thread 1/5
Youssef Sammouda (sam0) (@samm0uda) 's Twitter Profile Photo

Anyone from Singapore or a resident there who could apply for a Business/Tourist visa for me through the eServices portal ? Thanks.

Dzmitry Lukyanenko (@vulnano) 's Twitter Profile Photo

Meta Quest: Attacker was able to subscribe any Oculus user on attacker's account without user approval. My short writeup: vulnano.com/2023/01/meta-q…

TECNO Security Response Center (@tecnosrc) 's Twitter Profile Photo

Here comes the Q1 reward in 2023!!!🥳 TOP 3 are $200 each, $100 for every one remaining; Rising Star Award $200 to 0xdhinu, Diligent Individual Award $200 to Hellboy_Aditya! Bonus will be sent this month. Thanks to all researchers. #hack #infosec #bugbounty #appsec #TECNOsecurity

Here comes the Q1 reward in 2023!!!🥳
TOP 3 are $200 each, $100 for every one remaining;
Rising Star Award $200 to 0xdhinu, Diligent Individual Award $200 to Hellboy_Aditya!
Bonus will be sent this month. Thanks to all researchers.
#hack #infosec #bugbounty #appsec #TECNOsecurity
Youssef Sammouda (sam0) (@samm0uda) 's Twitter Profile Photo

I got lucky and won the first place in Meta Bug Bounty Researcher Conference, This was a new life achievement since i made $200k+ in bounties in a single event, i guess bug bounty will always be a thing for sure in the coming years. Congrats to all other contenders. #BugBounty

I got lucky and won the first place in Meta Bug Bounty Researcher Conference, This was a new life achievement since i made $200k+ in bounties in a single event, i guess bug bounty will always be a thing for sure in the coming years. Congrats to all other contenders. #BugBounty
Dzmitry Lukyanenko (@vulnano) 's Twitter Profile Photo

Last days I've spent on Meta's BountyCon event hosted in Seoul, Korea. Together with my teammates(Philippe Harewood, Youssef Sammouda (sam0) and Josip Franjković ) we took 1-2 places and won 5/7 nominations. Also special thanks from me for event collaboration with Sergey Toshin & Oversecured scanner.

Last days I've spent on Meta's BountyCon event hosted in Seoul, Korea.

Together with my teammates(<a href="/phwd_/">Philippe Harewood</a>, <a href="/samm0uda/">Youssef Sammouda (sam0)</a>  and <a href="/JosipFranjkovic/">Josip Franjković</a> ) we took 1-2 places and won 5/7 nominations. 

Also special thanks from me for event collaboration with <a href="/_bagipro/">Sergey Toshin</a> &amp; <a href="/OversecuredInc/">Oversecured</a> scanner.
TECNO Security Response Center (@tecnosrc) 's Twitter Profile Photo

📸Dzmitry Lukyanenka Dzmitry Lukyanenko is a full-time White Hat from Belarus with 8 years of experience. He thinks White Hats are independent, curious, ethical, patient, and inventive. Let's get to learn from him: security.tecno.com/SRC/blogdetail… #hack #infosec #bugbounty #AppSec #websecurity

📸Dzmitry Lukyanenka <a href="/vulnano/">Dzmitry Lukyanenko</a> is a full-time White Hat from Belarus with 8 years of experience.  He thinks White Hats are independent, curious, ethical, patient, and inventive. Let's get to learn from him:  security.tecno.com/SRC/blogdetail… #hack #infosec #bugbounty #AppSec #websecurity
brian mcnulty (@brianjmcnulty) 's Twitter Profile Photo

Thank you Meta Bug Bounty and everyone who attended Meta’s Bug Bounty Researcher Conference #MBBRC2025 in Tokyo! It was nice catching up with everyone and meeting new people! I had an amazing time and enjoyed all of the talks and events!

Thank you <a href="/metabugbounty/">Meta Bug Bounty</a> and everyone who attended Meta’s Bug Bounty Researcher Conference #MBBRC2025 in Tokyo!

It was nice catching up with everyone and meeting new people! I had an amazing time and enjoyed all of the talks and events!