iQimpz (@iqimpz) 's Twitter Profile
iQimpz

@iqimpz

Full-Time Bug Bounty | Christian | app.intigriti.com/profile/iqimpz

ID: 1324837566017904647

linkhttps://hackerone.com/iqimpz?type=user calendar_today06-11-2020 22:14:35

602 Tweet

1,1K Followers

213 Following

Kévin GERVOT (Mizu) (@kevin_mizu) 's Twitter Profile Photo

I'm thrilled to finally share my research on HTML parsing and DOMPurify at @GreHack 2024 📜 The research article is available here: mizu.re/post/exploring… The slides are available here: slides.com/kevin-mizu/gre… 1/3

I'm thrilled to finally share my research on HTML parsing and DOMPurify at @GreHack 2024 📜

The research article is available here: mizu.re/post/exploring…
The slides are available here: slides.com/kevin-mizu/gre…

1/3
RyotaK (@ryotkak) 's Twitter Profile Photo

If you're interested in the technical details, I wrote the blog post here: flatt.tech/research/posts… For the further details, please check out the announcement from the OpenWrt team: lists.openwrt.org/pipermail/open… (2/2)

Orange Tsai  🍊 (@orange_8361) 's Twitter Profile Photo

Our talk at #BHEU is done! Hope you all enjoyed it. 😉 A detailed blog is on the way, but in the meantime, check out the pre-alpha website worst.fit for early access and the slides! Huge thanks to Black Hat and my awesome co-presenter splitline 👁️🐈‍⬛! 🐈‍

shubs (@infosec_au) 's Twitter Profile Photo

Some security advisories don't get the attention they deserve. Being a True Attack Surface Management solution, Assetnote focuses on the technologies that matter most to our customers. Our research on CVE-2024-8534 (CVSS 8.4) affecting Citrix NetScaler: assetnote.io/resources/rese…

Some security advisories don't get the attention they deserve. Being a True Attack Surface Management solution, <a href="/assetnote/">Assetnote</a> focuses on the technologies that matter most to our customers. Our research on CVE-2024-8534 (CVSS 8.4) affecting Citrix NetScaler:  assetnote.io/resources/rese…
s1r1us (@s1r1u5_) 's Twitter Profile Photo

Imagine opening a Discord message and suddenly your computer is hacked. We discovered a bug that made this possible and earned a $5,000 bounty for it. Here's the story and a beginner-friendly deep dive into V8 exploit development. Watch: youtube.com/watch?v=R3SE4V…

Imagine opening a Discord message and suddenly your computer is hacked.

We discovered a bug that made this possible and earned a $5,000 bounty for it.

Here's the story and a beginner-friendly deep dive into V8 exploit development.

Watch: youtube.com/watch?v=R3SE4V…
iQimpz (@iqimpz) 's Twitter Profile Photo

This was my first full year of full-time Bug Bounty and I would consider it a very successful year! My 2024 #HackerOne journey! 160 vulnerabilities reported, including 41 crits and 41 highs! hackerone.com/stories-of-202…

This was my first full year of full-time Bug Bounty and I would consider it a very successful year! 

My 2024 #HackerOne journey! 160 vulnerabilities reported, including 41 crits and 41 highs!
 hackerone.com/stories-of-202…
shubs (@infosec_au) 's Twitter Profile Photo

We discovered a pre-authentication RCE vulnerability in Craft CMS caused by an obscure PHP foot gun (CVE-2024-56145), approx 150k sites created with Craft CMS. You can read @Assetnote's Security Research team's blog on the issue: assetnote.io/resources/rese… #attacksurfacemanagement

We discovered a pre-authentication RCE vulnerability in Craft CMS caused by an obscure PHP foot gun (CVE-2024-56145), approx 150k sites created with Craft CMS.

You can read @Assetnote's Security Research team's blog on the issue: assetnote.io/resources/rese…

#attacksurfacemanagement
Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile Photo

I found you could use the ISO-2022-JP escape sequences inside JS URLs! Found using this: hackvertor.co.uk/hack-pad/5 Poc: portswigger-labs.net/xss/charset.ph…

I found you could use the ISO-2022-JP escape sequences inside JS URLs!

Found using this:
hackvertor.co.uk/hack-pad/5

Poc:
portswigger-labs.net/xss/charset.ph…
iQimpz (@iqimpz) 's Twitter Profile Photo

2024 was my first full year of full-time Bug Bounty and it was amazing!🎉 💰250%+ of my previous year's salary! 🥇#4 on USA HackerOne leaderboards! 🌴Took 4+ months off! 💥Built 24/7 Automation 🗒️Very successful SAML and Caching Research! Here's to an even better 2025!🥂

2024 was my first full year of full-time Bug Bounty and it was amazing!🎉

💰250%+ of my previous year's salary!
🥇#4 on USA <a href="/Hacker0x01/">HackerOne</a> leaderboards!
🌴Took 4+ months off!
💥Built 24/7 Automation
🗒️Very successful SAML and Caching Research!

Here's to an even better 2025!🥂
Bug Bounty Reports Explained (@gregxsunday) 's Twitter Profile Photo

SSRFs can be tough to make critical without metadata, especially against a target like GitLab that strengthens its infra with every SSRF. Yet Johan Carlsson broke through with the first critical SSRF on GitLab since 2020. Enjoy our explanation from Sweden🇸🇪🔥 youtu.be/YQ5ixykKnyY

slonser (@slonser_) 's Twitter Profile Photo

In 2024, I interacted a lot with Extensions. I decided to create a resource that will help with a basic understanding of extensions and key attacks. P.S. I tried to make everything as clear as possible and hope it won’t feel too overwhelming anywhere. extensions.neplox.security

zhero; (@zhero___) 's Twitter Profile Photo

very pleased to announce the release of my new article based on my research that led to CVE-2024-46982 titled: Next.js, cache, and chains: the stale elixir zhero-web-sec.github.io/research-and-t… note: does not cover the latest findings shared in my recent posts enjoy reading;

very pleased to announce the release of my new article based on my research that led to CVE-2024-46982 titled:

Next.js, cache, and chains: the stale elixir

zhero-web-sec.github.io/research-and-t…

note: does not cover the latest findings shared in my recent posts

enjoy reading;
Kévin GERVOT (Mizu) (@kevin_mizu) 's Twitter Profile Photo

I'm very happy to finally share the second part of my DOMPurify security research 🔥 This article mostly focuses on DOMPurify misconfigurations, especially hooks, that downgrade the sanitizer's protection (even in the latest version)! Link 👇 mizu.re/post/exploring… 1/2

Josh M (@joshtmerrill) 's Twitter Profile Photo

magic-box.dev/hacking/smolta… securityintelligence.com/x-force/smolta… wooo new blog on an rce i found in in Hugging Face's smolagents library 🥳. check it out if you ❤️ ai x security :)

Ciarán Cotter (@monkehack) 's Twitter Profile Photo

🐵 MonkeHacks #52 Looking Back, Speed of Thought, Giveaway 🚨 I'm giving away a 1-year subscription of Caido Pro to celebrate 1 year of MonkeHacks. To enter: • Follow me! • Retweet this post. That's it! 😄 #bugbountytips #hacktheplanet #bugbounty monke.ie/p/monkehacks-52

Bug Bounty Village (@bugbountydefcon) 's Twitter Profile Photo

Roni Carta (@0xlupin) dives deep into real-world DoS exploitation for bug bounty — N+1s, cache poisoning, GraphQL attacks, network-level DoS, and more. $150K+ in bounties, real examples, responsible testing. Full talk → youtu.be/ROqkbXtV2VQ #BugBounty #DEFCON #BBV #DoS

Roni Carta (@0xlupin) dives deep into real-world DoS exploitation for bug bounty — N+1s, cache poisoning, GraphQL attacks, network-level DoS, and more. $150K+ in bounties, real examples, responsible testing.

Full talk → youtu.be/ROqkbXtV2VQ 

#BugBounty #DEFCON #BBV #DoS