Sergey (@or_serg) 's Twitter Profile
Sergey

@or_serg

HackerOne hackerone.com/orlserg, prev @Robocash1, @replit

ID: 1956592988

calendar_today12-10-2013 12:50:47

41 Tweet

13 Followers

48 Following

๐Ÿ‘‘ OFJAAAH ๐Ÿ‘‘ (@ofjaaah) 's Twitter Profile Photo

xargs -a domain -I@ -P500 sh -c 'shuffledns -d "@" -silent -w words.txt -r resolvers.txt' | httpx -silent -threads 1000 | nuclei -t /root/nuclei-templates/ -o re1 ๐Ÿ’€ Nuclei by ProjectDiscovery ProjectDiscovery #bugbounty #bugbountytips

Harsh Bothra (@harshbothra_) 's Twitter Profile Photo

#learn365 Day-1: 2FA Bypass Techniques 1. Response Manipulation - In response if "success":false, change it to "success":true 2. Status Code Manipulation - If Status Code is 4xx, try to change it to 200 OK and see if it bypass restrictions. (1/n) #bugbountytips

Harsh Bothra (@harshbothra_) 's Twitter Profile Photo

#learn365 Day-10: Abusing Hop-by-Hop Headers Original Work: nathandavison.com/blog/abusing-hโ€ฆ Hop-by-hop headers, which are meaningful only for a single transport-level connection, and are not stored by caches or forwarded by proxies. #bugbountytips #appsec #infosecurity (1/n)

Emad Shanab - ุฃุจูˆ ุนุจุฏ ุงู„ู„ู‡ (@alra3ees) 's Twitter Profile Photo

Mobile App Pentesting collection:- CC i github.com/kyawthiha7/Mobโ€ฆ github.com/tsug0d/Androidโ€ฆ github.com/997509/pentestโ€ฆ github.com/OWASP/owasp-msโ€ฆ github.com/SnollyG0st3r/aโ€ฆ github.com/SnollyG0st3r/aโ€ฆ github.com/jdonsec/AllThiโ€ฆ

Mobile App Pentesting collection:-
CC <a href="/0Init/">i</a> 

github.com/kyawthiha7/Mobโ€ฆ
github.com/tsug0d/Androidโ€ฆ
github.com/997509/pentestโ€ฆ
github.com/OWASP/owasp-msโ€ฆ
github.com/SnollyG0st3r/aโ€ฆ
github.com/SnollyG0st3r/aโ€ฆ
github.com/jdonsec/AllThiโ€ฆ
Nuclei by ProjectDiscovery (@pdnuclei) 's Twitter Profile Photo

Nuclei Templates v8.2.3 release ๐Ÿ”‰๐Ÿ”‰ ๐—ก๐˜‚๐—บ๐—ฏ๐—ฒ๐—ฟ ๐—ผ๐—ณ ๐—ป๐—ฒ๐˜„๐—น๐˜† ๐—ฎ๐—ฑ๐—ฑ๐—ฒ๐—ฑ ๐˜๐—ฒ๐—บ๐—ฝ๐—น๐—ฎ๐˜๐—ฒ๐˜€: 37 ๐—ง๐—ฒ๐—บ๐—ฝ๐—น๐—ฎ๐˜๐—ฒ๐˜€ ๐—ฐ๐—ต๐—ฎ๐—ป๐—ด๐—ฒ๐—น๐—ผ๐—ด: github.com/projectdiscoveโ€ฆ #hackwithautomation #pentest #cybersecurity #bugbounty

Nuclei Templates v8.2.3 release ๐Ÿ”‰๐Ÿ”‰

๐—ก๐˜‚๐—บ๐—ฏ๐—ฒ๐—ฟ ๐—ผ๐—ณ ๐—ป๐—ฒ๐˜„๐—น๐˜† ๐—ฎ๐—ฑ๐—ฑ๐—ฒ๐—ฑ ๐˜๐—ฒ๐—บ๐—ฝ๐—น๐—ฎ๐˜๐—ฒ๐˜€: 37

๐—ง๐—ฒ๐—บ๐—ฝ๐—น๐—ฎ๐˜๐—ฒ๐˜€ ๐—ฐ๐—ต๐—ฎ๐—ป๐—ด๐—ฒ๐—น๐—ผ๐—ด:
github.com/projectdiscoveโ€ฆ

#hackwithautomation #pentest #cybersecurity #bugbounty
Emad Shanab - ุฃุจูˆ ุนุจุฏ ุงู„ู„ู‡ (@alra3ees) 's Twitter Profile Photo

Nuclei Templates Collection:- github.com/pikpikcu/nucleโ€ฆ github.com/esetal/nuclei-โ€ฆ github.com/panch0r3d/nuclโ€ฆ github.com/ARPSyndicate/kโ€ฆ github.com/medbsq/ncl github.com/notnotnotveg/nโ€ฆ github.com/foulenzer/foulโ€ฆ github.com/clarkvoss/Nuclโ€ฆ github.com/z3bd/nuclei-teโ€ฆ

Clint Gibler (@clintgibler) 's Twitter Profile Photo

๐Ÿค– Introducing Security By Design New courses on the Google Play Academy for teaching you: * How to add security to your app development lifecycle * How to use Android's built-in security features * and more By @jonmarkoff and team security.googleblog.com/2021/05/introdโ€ฆ

Sergey (@or_serg) 's Twitter Profile Photo

Hi TJ ๐Ÿ‡บ๐Ÿ‡ฆ๐Ÿ‡จ๐Ÿ‡ฆ. I discovered a critical vulnerability on the apex.sh site. I couldn't find an email address for security contacts. Also I cannot write you DM. I will be happy to tell you the details of the problem. Please contact me.

Sergey (@or_serg) 's Twitter Profile Photo

Real life recursion: mediation request requires a mediation request because the mediation group of #hackerone is not responding.

Youssef A. Mohamed (@generaleg64) 's Twitter Profile Photo

I just released the new episode with John Hammond ๐Ÿ”ฅ We talked about his experience, career path, ransomware attacks, Kaseya incident and other topics. The episode is sponsored by Yogosha โค๏ธ You can watch the EP from here: bit.ly/3oJ5UqQ #Infosec #RadioHack

I just released the new episode with <a href="/_JohnHammond/">John Hammond</a> ๐Ÿ”ฅ

We talked about his experience, career path, ransomware attacks, Kaseya incident and other topics.

The episode is sponsored by <a href="/YogoshaOfficial/">Yogosha</a> โค๏ธ

You can watch the EP from here:
bit.ly/3oJ5UqQ

#Infosec #RadioHack
Sergey (@or_serg) 's Twitter Profile Photo

I am grateful to this year and what it brought me. I have submitted 6 times more vulnerabilities than last year, and increased my reputation 3 times compared to last year. In addition, I ranked first in my country on H1. But I know there is still a lot of hard work to be done.

I am grateful to this year and what it brought me. I have submitted 6 times more vulnerabilities than last year, and increased my reputation 3 times compared to last year. In addition, I ranked first in my country on H1. But I know there is still a lot of hard work to be done.
PentesterLab (@pentesterlab) 's Twitter Profile Photo

Articles worth reading discovered last week: ๐Ÿ—ž blog.pksecurity.io/2023/01/16/202โ€ฆ ๐Ÿ—ž about.gitlab.com/blog/2023/01/2โ€ฆ ๐Ÿ—ž blog.viettelcybersecurity.com/saml-show-stopโ€ฆ ๐Ÿ—ž synacktiv.com/sites/default/โ€ฆ ๐Ÿ—ž blog.assetnote.io/2023/01/24/yelโ€ฆ ๐Ÿ—ž pathonproject.com/zb/?196945362fโ€ฆ ๐Ÿ—ž github.blog/2023-01-27-bypโ€ฆ #PentesterLabWeekly

Soufiane (@s0ufi4n3) 's Twitter Profile Photo

(CVE-2023-32530) Trend Micro Apex Central 2019 (<= Build 6016) Authenticated RCE Well.. This is an unusual SQLi vector starlabs.sg/advisories/23/โ€ฆ

(CVE-2023-32530) Trend Micro Apex Central 2019 (&lt;= Build 6016) Authenticated RCE

Well.. This is an unusual SQLi vector

starlabs.sg/advisories/23/โ€ฆ
RyotaK (@ryotkak) 's Twitter Profile Photo

I recently developed and posted about a technique called "First sequence sync", expanding James Kettle's single packet attack. This technique allowed me to send 10,000 requests in 166ms, which breaks the packet size limitation of the single packet attack. flatt.tech/research/postsโ€ฆ

Jorian (@j0r1an) 's Twitter Profile Photo

While playing a challenge by Salvatore Abello, I found a pretty interesting way to exploit Dangling Markup with a strict CSP. All you need is an <iframe>, <object> or <embed> set to about:blank, with a dangling name= attribute. This vulnerable page should be iframable.

While playing a challenge by <a href="/salvatoreabello/">Salvatore Abello</a>, I found a pretty interesting way to exploit Dangling Markup with a strict CSP.
All you need is an &lt;iframe&gt;, &lt;object&gt; or &lt;embed&gt; set to about:blank, with a dangling name= attribute. This vulnerable page should be iframable.
Yuval Avrahami (@yuvalavra) 's Twitter Profile Photo

We hacked the AWS JavaScript SDK, a core library powering the entire @AWScloud ecosystem - including the AWS Console itself ๐Ÿคฏ How did we do it? Just two missing characters was all it took. This is the story of #CodeBreach ๐Ÿงต๐Ÿ‘‡

We hacked the AWS JavaScript SDK, a core library powering the entire @AWScloud ecosystem - including the AWS Console itself ๐Ÿคฏ

How did we do it? Just two missing characters was all it took.

This is the story of #CodeBreach ๐Ÿงต๐Ÿ‘‡