ROBOT 321 (@iamrobot321) 's Twitter Profile
ROBOT 321

@iamrobot321

ID: 288326642

calendar_today26-04-2011 17:11:12

7,7K Tweet

122 Followers

1,1K Following

xploiterr (@_xploiterr) 's Twitter Profile Photo

It turns out the fix for this was the filter now remove the valid HTML tags, however I found a simple bypass if the tag is invalid it's not removed. So <\img src onerror=alert()> bypasses this filter. However the user needs to remove the \ from the payload x.com/_xploiterr/sta…

Harsh vardhan Singh (@root_lucky_) 's Twitter Profile Photo

Day 10 - #21DayHackingChallenge Today I found 1 valid bug and submitted the remaining pending reports. Progress may be slow sometimes, but consistency matters more than speed. Learning every day, improving recon and report quality. On to Day 11 #Hacking #BugHunting

Day 10 - #21DayHackingChallenge

Today I found 1 valid bug and submitted the remaining pending reports.
Progress may be slow sometimes, but consistency matters more than speed.
Learning every day, improving recon and report quality.
On to Day 11 

#Hacking  #BugHunting
Exploit5lover πŸ‡΅πŸ‡°πŸ‡΅πŸ‡Έ (@exploit5lover) 's Twitter Profile Photo

Alhamdulillah, Second last bounty of this year. In the last two months I tried to focus on quality not quantity. And yes! I’ll definitely share tips with all of you, though I am not an expert. #BugBounty #hackerone

Alhamdulillah, 
Second last bounty of this year. In the last two months I tried to focus on quality not quantity.
And yes! I’ll definitely share tips with all of you, though I am not an expert.
#BugBounty #hackerone
Mr.ZheeV (@ghiffarizaid) 's Twitter Profile Photo

Just got a reward for a high vulnerability submitted on YesWeHack β ΅ -- Improper Authentication - Generic (CWE-287). yeswehack.com/hunters/mrzhee… #YesWeRHackers #BugBounty #vulnerability #hacker #hackers

Just got a reward for a high vulnerability submitted on <a href="/yeswehack/">YesWeHack β ΅</a> -- Improper Authentication - Generic (CWE-287). yeswehack.com/hunters/mrzhee… #YesWeRHackers #BugBounty #vulnerability #hacker #hackers
A.fahimi (@af4himi) 's Twitter Profile Photo

I’ve just published a write-up πŸ‘‡ One endpoint, one bug, full root access. A real-world LFI β†’ RCE case study with a $2,500 bounty. πŸ‘‡ medium.com/@Af4himi/how-a… #bugbountytips #bugbounty #bugbountytip

π°šπ°Όπ°‡π±… (@ynsmroztas) 's Twitter Profile Photo

First report of 2026 πŸ₯³πŸ₯°πŸŒΉ Sometimes services behave as if they have authentication, it's just a matter of how it's added. For those in JSON format, definitely try this: "--headers="Content-Type: application/json\nAuthorization: Bearer [TOKEN_HERE]" \" payload ;

First report of 2026 πŸ₯³πŸ₯°πŸŒΉ

Sometimes services behave as if they have authentication, it's just a matter of how it's added. For those in JSON format, definitely try this: "--headers="Content-Type: application/json\nAuthorization: Bearer [TOKEN_HERE]" \"

payload ;
Elorm Daniel (@elormkdaniel) 's Twitter Profile Photo

Hackers exploited Zero-click vulnerability in Samsung S25 Ultra under 1 min Pwn20wn 2025 hacking Contest and earned $100,000 πŸ’€

A.Mugh33raπŸ‡΅πŸ‡°β€οΈπŸ‡΅πŸ‡Έ (@mugh33ra) 's Twitter Profile Photo

Found a critical 0-click ATO in thirdparty.target.com Instead of reporting to the VDP, I'm considering reporting directly to the third-party service. No idea if they have a program or pay, but worth the shot since the VDP offers $0. #BugBounty #hackerone #idor #sqlinjection

Found a critical 0-click ATO in thirdparty.target.com 
Instead of reporting to the VDP, I'm considering reporting directly to the third-party service.

No idea if they have a program or pay, but worth the shot since the VDP offers $0.
#BugBounty #hackerone #idor #sqlinjection
Jason Haddix (@jhaddix) 's Twitter Profile Photo

Day TWO of FIVE days of celebrating our 2 year ARCANUM-VERSARY! Arcanum Information Security 3rd Giveaway = FOUR seats to our new course by the_IDORminator "Zero to [BAC] Hero" ! πŸ‘ 1 Like = 1 Entry! ♻️ 1 Share = 2 Entries! Winners announced 1/21! Syllabus link below πŸ‘‡

Day TWO of FIVE days of celebrating our 2 year ARCANUM-VERSARY! <a href="/arcanuminfosec/">Arcanum Information Security</a> 

3rd Giveaway = FOUR seats to our new course by <a href="/the_IDORminator/">the_IDORminator</a>  "Zero to [BAC] Hero" !

πŸ‘ 1 Like = 1 Entry!
♻️ 1 Share =  2 Entries!

Winners announced 1/21!  Syllabus link below πŸ‘‡