doomerhunter (@doomeroutrun) 's Twitter Profile
doomerhunter

@doomeroutrun

Victor Poucheret
Bootstrapped a 7 figures business
Most Impactful Team @ H1-0131 - AWS / Amazon
Best collab @ H1-407 -Epic Games
Top 10 @ H1-702 Epic x TikTok

ID: 1156825647563587584

linkhttps://doomerhunter.fr/ calendar_today01-08-2019 07:15:01

308 Tweet

2,2K Takipçi

970 Takip Edilen

Vitor Falcão "busfactor" (@busf4ctor) 's Twitter Profile Photo

While researching old blog posts, I found this: amlw.dev/vrp/135276622/ It reminds me to start fuzzing everything, no matter how silly it seems.

doomerhunter (@doomeroutrun) 's Twitter Profile Photo

Did everyone knew this but me ? GRC allows you to colorize your nginx logs, what a lifesaver when you're working on these tricky SSRFs

Did everyone knew this but me ? GRC allows you to colorize your nginx logs, what a lifesaver when you're working on these tricky SSRFs
Masato Kinugawa (@kinugawamasato) 's Twitter Profile Photo

bugzilla.mozilla.org/show_bug.cgi?i… This is a big change for DOM Clobberers. Firefox Nightly no longer allows native document properties to be overwritten by elements with a name attr, e.g.: <img src=a name=currentScript> <script> alert(document.currentScript)// HTMLScriptElement </script>

TrustedSec (@trustedsec) 's Twitter Profile Photo

Does your WAF use IP restrictions, or are they more like IP recommendations? nyxgeek reveals the difference between RemoteAddr and SocketAddr, a distinction that could create a 'sleeper' rule that looks secure but is easily bypassed. trustedsec.com/blog/azures-fr…

neils (@midwestneil) 's Twitter Profile Photo

Turns out you can just hack any train in the USA and take control over the brakes. This is CVE-2025-1727 and it took me 12 years to get this published. This vulnerability is still not patched. Here's the story:

Clint Gibler (@clintgibler) 's Twitter Profile Photo

I thought Golang had pretty secure defaults for parsing JSON, XML, YAML. But apparently there are some unexpected security footguns... Trail of Bits' Vasco Franco explores unexpected behaviors in Go's JSON, XML, and YAML parsers that can lead to security vulnerabilities,

I thought Golang had pretty secure defaults for parsing JSON, XML, YAML.

But apparently there are some unexpected security footguns...

<a href="/trailofbits/">Trail of Bits</a>'  Vasco Franco explores unexpected behaviors in Go's JSON, XML, and YAML parsers that can lead to security vulnerabilities,
doomerhunter (@doomeroutrun) 's Twitter Profile Photo

Vibe hacking : Besides creating complex PoCs recently with agents, I've been using NotebookLM to increase my efficiency. Pretty crazy increase in performance on my side, ranging from : - Providing perfect context to my AI agents to generate PoCs (got a couple very severe bugs

Vibe hacking : Besides creating complex PoCs recently with agents, I've been using <a href="/NotebookLM/">NotebookLM</a> to increase my efficiency.

Pretty crazy increase in performance on my side, ranging from :
- Providing perfect context to my AI agents to generate PoCs (got a couple very severe bugs
doomerhunter (@doomeroutrun) 's Twitter Profile Photo

RCE is definitely one of the best feelings you can get. Fun ride with the bros Geluchat and Nicolas Verdier Still took 2 weeks of research tho (and vibe hacking that I'm guilty of...)

RCE is definitely one of the best feelings you can get.  Fun ride with the bros <a href="/Geluchat/">Geluchat</a> and <a href="/n1nj4sec/">Nicolas Verdier</a> 
Still took 2 weeks of research tho (and vibe hacking that I'm guilty of...)
André Baptista (@0xacb) 's Twitter Profile Photo

Ready to explore how AI is transforming Ethical Hacking? We've put together some introductory hands-on examples including: 🔍 Recon & Discovery Contextual subdomain enum, screenshot analysis, and content discovery ⚡ Exploit Development Automated vulnerability detection 🤖

Ready to explore how AI is transforming Ethical Hacking?

We've put together some introductory hands-on examples including:

🔍 Recon &amp; Discovery
Contextual subdomain enum, screenshot analysis, and content discovery

⚡ Exploit Development
Automated vulnerability detection

🤖
Kévin GERVOT (Mizu) (@kevin_mizu) 's Twitter Profile Photo

I'm happy to release a script gadgets wiki inspired by the work of Sebastian Lekies, koto, and Eduardo Vela in their Black Hat USA 2017 talk! 🔥 The goal is to provide quick access to gadgets that help bypass HTML sanitizers and CSPs 👇 gmsgadget.com 1/4

I'm happy to release a script gadgets wiki inspired by the work of <a href="/slekies/">Sebastian Lekies</a>, <a href="/kkotowicz/">koto</a>, and <a href="/sirdarckcat/">Eduardo Vela</a> in their Black Hat USA 2017 talk! 🔥

The goal is to provide quick access to gadgets that help bypass HTML sanitizers and CSPs 👇

gmsgadget.com

1/4
doomerhunter (@doomeroutrun) 's Twitter Profile Photo

Hack in Milan : Went on a trip, found a few crits with the boys Geluchat Nicolas Verdier :D Check out the edit below. 📣 Nujabes - Feather Really great challenge by HackerOne can't wait for the next one !

Hack'n Speak (@hacknspeak) 's Twitter Profile Photo

🇫🇷🎙️Nouvel épisode du podcast Hack'n Speak accompagné de doomerhunter (Victor Poucheret) 🌺 On parle de son parcours, de bug bounty, d'évènement on site et d'IA ! 🥇 Bonne écoute à toutes et à tous 🎶 creators.spotify.com/pod/profile/ha…