snowman ๐Ÿ‡ต๐Ÿ‡ธ (@snowflakes4l) 's Twitter Profile
snowman ๐Ÿ‡ต๐Ÿ‡ธ

@snowflakes4l

InfoSec Enthusiast, Bug Bounty Hunter and Penetration Tester

ID: 1914163533979541504

calendar_today21-04-2025 03:45:51

23 Tweet

3 Takipรงi

45 Takip Edilen

snowman ๐Ÿ‡ต๐Ÿ‡ธ (@snowflakes4l) 's Twitter Profile Photo

Bug Bounty in 3 lines: 1. Continuous Learning. 2. Building Methodology. 3. Identifying Unique Attack Vectors. #BugBounty #bugbountytips

Rana Khalil ๐Ÿ‡ต๐Ÿ‡ธ (@rana__khalil) 's Twitter Profile Photo

๐ŸŽ‰ New Course Alert + Giveaway! ๐ŸŽ‰ I'm excited to announce a brand-new course on Rana Khalil's Academy - HTTP Host Header Attacks. This course includes: ๐Ÿ“š A technical deep dive into host header attacks. ๐Ÿงช 7 hands-on labs ๐Ÿ“ƒ Subtitles in 8 languages for all the videos in this

๐ŸŽ‰ New Course Alert + Giveaway! ๐ŸŽ‰

I'm excited to announce a brand-new course on <a href="/RanaKhalilAcad/">Rana Khalil's Academy</a> - HTTP Host Header Attacks.

This course includes:
๐Ÿ“š A technical deep dive into host header attacks.
๐Ÿงช  7 hands-on labs
๐Ÿ“ƒ Subtitles in 8 languages for all the videos in this
snowman ๐Ÿ‡ต๐Ÿ‡ธ (@snowflakes4l) 's Twitter Profile Photo

Huge thanks to Rana Khalil ๐Ÿ‡ต๐Ÿ‡ธ Rana Khalil's Academy for the generous giveaway! Itโ€™s an honor to be selected, but more than thatโ€”thank you for being a consistent source of knowledge, motivation, and support in the infosec world. Proud to be learning alongside this amazing community.

snowman ๐Ÿ‡ต๐Ÿ‡ธ (@snowflakes4l) 's Twitter Profile Photo

Still have WPS enabled on your router? Pixie-Dust doesn't care about lockouts. It rips the PIN offline in seconds using chipset flaws. Your Wi-Fi password is toast. Disable WPS or stay exposed.

Still have WPS enabled on your router? Pixie-Dust doesn't care about lockouts. It rips the PIN offline in seconds using chipset flaws. Your Wi-Fi password is toast. Disable WPS or stay exposed.
bugcrowd (@bugcrowd) 's Twitter Profile Photo

A lot of hackers fail because they only look for bugs, not systems. If you want to find vulnerabilities others miss, you need to model how the application works first. Here are 5 ways to do it right ๐Ÿ‘‡ 1๏ธโƒฃ Identify valuable target data Start by asking: what data does the

A lot of hackers fail because they only look for bugs, not systems.

If you want to find vulnerabilities others miss, you need to model how the application works first.

Here are 5 ways to do it right ๐Ÿ‘‡

1๏ธโƒฃ Identify valuable target data

Start by asking: what data does the
Standoff Bug Bounty (@standoffbb) 's Twitter Profile Photo

New video alert! Alex Moshkov, our Community Bro, chats with the legendary Godfather Orwa ๐Ÿ‡ฏ๐Ÿ‡ด โ€” 1,500+ bugs, 500 critical! From hobbyist to pro hacker, hear his wild journey and top tips for bug bounty success. Watch the full video here: youtu.be/ai2MMrN5lI0?siโ€ฆ

Bug Bounty Village (@bugbountydefcon) 's Twitter Profile Photo

403 on /get_all_users 404 on /get_all_userz Then Justin Gardner fuzzed until a double-encoded โ€œSโ€ slipped past the NGINX filter. Result: 4.5M users' PII dumped. Bounty: $15Kโ€“$20K Full talk โ†’ youtu.be/PXqlHAoF2wc #BugBounty #DEFCON #BBV #AppSec #WebSecurity

snowman ๐Ÿ‡ต๐Ÿ‡ธ (@snowflakes4l) 's Twitter Profile Photo

Handing your device to a repair shop? You might be handing over your data too. Think twice before giving full access to your device youtu.be/IFlDpUeMsKM