aloft (@pnig0s) 's Twitter Profile
aloft

@pnig0s

fake one. Takeover.

ID: 1921567010456276992

calendar_today11-05-2025 14:04:27

1 Tweet

2 Followers

101 Following

Intigriti (@intigriti) 's Twitter Profile Photo

Want to find 'cosmic brain' bugs, just like @0xACB and Sam Curry? 🤯 Use the following 'invisible' ranges in your payloads 👇#BugBountyTip 💥0x00 ➡️0x2F 💥0x3A ➡️0x40 💥0x5B ➡️0x60 💥0x7B ➡️0xFF

Want to find 'cosmic brain' bugs, just like @0xACB and <a href="/samwcyo/">Sam Curry</a>? 🤯
Use the following 'invisible' ranges in your payloads 👇#BugBountyTip
💥0x00 ➡️0x2F
💥0x3A ➡️0x40
💥0x5B ➡️0x60
💥0x7B ➡️0xFF
Philippe Harewood (@phwd_) 's Twitter Profile Photo

I review JavaScript manually. Here are some videos by bounty hunters that should give you an idea to approaching targets with heavy JavaScript. Stok youtu.be/FTeE3OrTNoA TomNomNom youtu.be/FFGQ9TRYL6Q Filedescriptor youtu.be/Y1S5s3FmFsI #bugbountytips

Dawid Moczadło (@kannthu1) 's Twitter Profile Photo

🔥1 year ago, I discovered a vulnerability in Facebook (now Meta) that earned me a $5.5k reward! 🎉 It all started with an exposed Swagger UI, which led to an escalation to SSRF (and almost RCE) Here's the story: (1/6) #BugBounty #Security

Justin Gardner (@rhynorater) 's Twitter Profile Photo

I've made over 100k on SSRF vulnerabilities. They aren't always as simple as pointing it at localhost or AWS Metadata service. Here are some tricks I've picked up over the past 5 years of web app testing:

I've made over 100k on SSRF vulnerabilities.

They aren't always as simple as pointing it at localhost or AWS Metadata service. 

Here are some tricks I've picked up over the past 5 years of web app testing:
Security Response (@msftsecresponse) 's Twitter Profile Photo

Madeline Eckert Madeline Eckert, Sr. Program Manager, MSRC, joins the Azure Security Podcast with Sarah Young Sarah Young and Michael Howard to talk about the Microsoft Bug Bounty & Microsoft MVR programs. Tune in on Spotify: msft.it/601297N5n

Madeline Eckert <a href="/eckert_madeline/">Madeline Eckert</a>, Sr. Program Manager, MSRC, joins the Azure Security Podcast with Sarah Young <a href="/_sarahyo/">Sarah Young</a> and Michael Howard to talk about the Microsoft Bug Bounty &amp; Microsoft MVR programs. Tune in on Spotify: msft.it/601297N5n
Meta Bug Bounty (@metabugbounty) 's Twitter Profile Photo

🎉 Celebrating 10 years of impactful research! Watch our exclusive interview with Philippe Harewood, a researcher in Meta Bug Bounty, who has significantly contributed to the security and privacy of our platforms with over 500 impactful findings. Check it out: youtu.be/_Jmscy9Vh8g

RogueSMG (@roguesmg) 's Twitter Profile Photo

I spent 3 days on trying to exploit an SSRF. And still FAILED. The Payloads were getting blocked. Started digging a bit and realised there's a TON of bypasses and workarounds out there than I thought: - Simple Headers can sometimes do wonders: X-Forwarded-For, etc. - URL

I spent 3 days on trying to exploit an SSRF. 
And still FAILED.

The Payloads were getting blocked. Started digging a bit and realised there's a TON of bypasses and workarounds out there than I thought:

- Simple Headers can sometimes do wonders: X-Forwarded-For, etc. 
- URL
Luke (@datalocaltmp) 's Twitter Profile Photo

Had a great time presenting at REcon this weekend - always amazing meeting everyone and sharing research 🙌 For those that missed the conference, or just want to review my WhatsApp work, feel free to read the slides here & hmu if you have questions! docs.google.com/presentation/d…

zere (@j_zere) 's Twitter Profile Photo

Just published my first blog post "Cache Deception + CSPT: Turning Non Impactful Findings into Account Takeover" You can read the full write-up here: zere.es/posts/cache-de…

Critical Thinking - Bug Bounty Podcast (@ctbbpodcast) 's Twitter Profile Photo

New Research by siunam! - lab.ctbb.show/research/crlf-… CRLF Injection → Nested Response Splitting (CSP gadget). Inject \r\n\r\n in headers to push HTML into the body and bypass script-src 'self'.