noobieboy31337 (@kamikaze0x07) 's Twitter Profile
noobieboy31337

@kamikaze0x07

Computer science engineer

ID: 805772376357175296

calendar_today05-12-2016 13:54:39

234 Tweet

56 Followers

1,1K Following

Mehdi (@silentgh00st) 's Twitter Profile Photo

💥 This could help bypass SSRF regex restrictions if the backend expect the full format of an IP address v4 or v6.. #BugBounty #bugbountytip #Pentesting #Security

Omid Rezaei (@omidxrz) 's Twitter Profile Photo

after a long time, I decided to write a blog post about one of the old bugs I found in an Android app, which finally led me to achieve 0-Click Mass Account TakeOver it's now published, you can read it here : blog.voorivex.team/0-click-mass-a…

YS (@yshahinzadeh) 's Twitter Profile Photo

poking around with AmirMohammad Safari on a public program, no WAF bypass, no special payload 3x Dom XSS: javascript:alert(origin) CSPT + parameter pollution: critical CSRF HTMLi: leaking URL equipped with token Tip: read JS files curiously, do not rush for bug, enjoy the process :]

poking around with <a href="/AmirMSafari/">AmirMohammad Safari</a> on a public program, no WAF bypass, no special payload

3x Dom XSS: javascript:alert(origin)
CSPT + parameter pollution: critical CSRF
HTMLi: leaking URL equipped with token

Tip: read JS files curiously, do not rush for bug, enjoy the process :]
H4x0r.DZ (@h4x0r_dz) 's Twitter Profile Photo

Users who have Python installed on their PCs and use WhatsApp Desktop may be exposed to a security risk. A specially crafted .pyz (Python archive) file can be used to execute malicious code upon a single click, potentially compromising the system. A similar vulnerability was

urlscan.io (@urlscanio) 's Twitter Profile Photo

Thanks to the awesome work by our team we can finally announce our official urlscan cli tool: urlscan.io/blog/2025/09/0… - Submit scans, run searches, find domains, get creative. Feel free to share your use-cases with us on X! Download on Github or homebrew.

Thanks to the awesome work by our team we can finally announce our official urlscan cli tool: urlscan.io/blog/2025/09/0… - Submit scans, run searches, find domains, get creative. Feel free to share your use-cases with us on X! Download on Github or homebrew.
Coffin (@coffinxp7) 's Twitter Profile Photo

Finally Here’s a new recon guide that will help you find bugs. I’ve included some private scripts and techniques I use. if even one person lands a bounty from this, I’ll consider the effort worth it. infosecwriteups.com/my-5-minute-wo…

/ XNL -н4cĸ3r (and @xnl-h4ck3r in the new Sky) (@xnl_h4ck3r) 's Twitter Profile Photo

v2.4 of urless is available: ✅ Various optimizations to improve performance, e.g. Pre-compiled Regular Expressions, Optimized Extension Filtering and Memory-Efficient File Processing. ✅ Update with "pip install --upgrade urless" github.com/xnl-h4ck3r/url… #BugBounty 🤘

Mehdi (@silentgh00st) 's Twitter Profile Photo

#bugbountytips ❌ Stop Doing These 10 Bug Hunting Mistakes ... And revise your methodology if : 1. You spend 2 days or less per program 2. You run automated tools on each URL and wait for unique results 3. You don't scan servers' open ports 4. You don't register an account in

#bugbountytips 
❌ Stop Doing These 10 Bug Hunting Mistakes ... 
And revise your methodology if :

1. You spend 2 days or less per program
2. You run automated tools on each URL and wait for unique results
3. You don't scan servers' open ports
4. You don't register an account in
H4x0r.DZ (@h4x0r_dz) 's Twitter Profile Photo

CVE-2025-55752 Apache Tomcat possible RCE if PUT is enabled 🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡 This is like saying i can extract your data from db if sql query is enabled

CVE-2025-55752 Apache Tomcat possible RCE 
if PUT is enabled 🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡🤡
This is like saying i can extract your data from db if sql query is enabled
André Baptista (@0xacb) 's Twitter Profile Photo

Here's a quick little hacking tip that's landed me some interesting bugs. When you see an ID parameter, give it a little manual fuzz and see what happens: - Positive integer - Negative integer - Decimal points - Letters - Symbols - Really big number - 0 (Yeah, this one dumped

Harsh Jaiswal (@rootxharsh) 's Twitter Profile Photo

Always been fan of learning things on-demand. In context of security there’s so many concepts I didn’t know until I had to workaround/hack those.

terjanq (@terjanq) 's Twitter Profile Photo

I am predicting that the biggest hack of the 21st century will come from an AI worm. Imagine a prompt that injected once is capable of understanding its capabilities (e.g available tools) and use them to self replicate by infecting internal services or the entire Internet. 1/2

the_IDORminator (@the_idorminator) 's Twitter Profile Photo

Let's talk manual testing for IDORs. I have pasted a payload from a redacted T-Mobile API below. It does not have a bug (that I am aware of) on it, I want to use this for educational purposes because its a great teaching opportunity. A: This is a URI path parameter representing

Let's talk manual testing for IDORs. I have pasted a payload from a redacted T-Mobile API below. It does not have a bug (that I am aware of) on it, I want to use this for educational purposes because its a great teaching opportunity.

A: This is a URI path parameter representing
zack0x01 (@zack0x01) 's Twitter Profile Photo

Hey #BugBounty hunters 👋 I made $4,000💸 using a simple automation workflow. Setup: ===== Collected 100,000+ subdomains from multiple bug bounty programs. Ran waybackurls on them to extract historical URLs Filtered interesting parameters and launched the following commands: