Mohammed Israil (@dominikyea) 's Twitter Profile
Mohammed Israil

@dominikyea

Cybersecurity + Privacy + Law & Policy

ID: 948579347379625989

calendar_today03-01-2018 15:38:34

1,1K Tweet

1,1K Takipçi

980 Takip Edilen

Corben Leo (@hacker_) 's Twitter Profile Photo

You can find easy critical vulnerabilities. It just takes finding unique attack surfaces. Here's an example of how you can, using a story of how I hacked a car company:

James (@jamesspi) 's Twitter Profile Photo

This XZ utils backdoor is nasty. This is a great write up -> gist.github.com/thesamesam/223… Here's an OSQuery query to help -> gist.github.com/jamesspi/ee831…

This XZ utils backdoor is nasty. 

This is a great write up -> gist.github.com/thesamesam/223…

Here's an OSQuery query to help ->
gist.github.com/jamesspi/ee831…
Adnan Khan (@adnanthekhan) 's Twitter Profile Photo

Read how I used a custom scanner to discover a GitHub Actions vulnerability hiding in plain sight for 3 years in a Google OSS repository and earned a $7,500 💰 #bugbounty! adnanthekhan.com/2024/04/15/an-…

Matan Berson (@mtnber) 's Twitter Profile Photo

Just wrote a ~2.5 page blog post on Client Side Path Traversal, covering what CSPT is, why it can be so impactful, some advanced exploitation and WAF bypass techniques, and a bug which I found in a live hacking event (redacted ofc) matanber.com/blog/cspt-leve…

Harel (@h4r3l) 's Twitter Profile Photo

New blog! This time a high severity session takeover in Zoom worth $15,000. Read the story of how sudi , BrunoZero and I chained 2 completely useless XSS vulns to steal OAuth tokens, hijack browser permissions, and more: nokline.github.io/bugbounty/2024…

Eldar (@pikuhaku) 's Twitter Profile Photo

I've got some advice to young bug bounty hunters (like me). If u're making good money from bug bounty: - It's good to splurge sometimes and reward urself, but don't overdo it. If it took u 6 months to get 30k earnings, don't spend it all on a car, an extremely depreciating asset

SinSinology (@sinsinology) 's Twitter Profile Photo

🚨🚨DO NOT PANIC! I'm publishing my detailed analysis of CVE-2024-29855 which targets Veeam Recovery Orchestrator Authentication 🩸, this has a score of CVSS 9 🪲, but IMHO its not as severe, however, I like the technical details of it, so here we go 🔥 summoning.team/blog/veeam-rec…

shubs (@infosec_au) 's Twitter Profile Photo

Our security researcher hashkitten found one of the most critical exploit chains in the history of Assetnote. Affecting 40k+ instances of ServiceNow, we could execute arbitrary code, access all data without authentication. You can read our blog here: assetnote.io/resources/rese…

Our security researcher <a href="/hash_kitten/">hashkitten</a> found one of the most critical exploit chains in the history of <a href="/assetnote/">Assetnote</a>. Affecting 40k+ instances of ServiceNow, we could  execute arbitrary code, access all data without authentication. You can read our blog here: assetnote.io/resources/rese…
Jayesh Madnani (@jayesh25_) 's Twitter Profile Photo

Bug Bounty Tips: Extract API Endpoints and Construct Complex HTTP Requests from JavaScript Files Using AI Stuck analyzing complex JS files while manually hunting on a target and can't figure out how to construct those GET/POST requests? 🤯 No fancy tools needed! 👉 Quick tip: