7h3h4ckv157(@7h3h4ckv157) 's Twitter Profileg
7h3h4ckv157

@7h3h4ckv157

Reformed Hacker | Hall of Fame: Google, Apple, NASA, 𝕏 (FKA Twitter) & Many more | CVE ×4 | HTB Rank: Guru | Engineering + Research | Clandestine

ID:1277496365145133056

linkhttps://linktr.ee/7h3h4ckv157 calendar_today29-06-2020 06:57:46

4,5K Tweet

18,1K Takipçi

91 Takip Edilen

Amal Murali(@amalmurali47) 's Twitter Profile Photo

My team at bugcrowd is hiring an Application Security Engineer in the UK!

Feel free to hit me up with questions, or apply directly at grnh.se/aa0289b71us

Remote position open to applicants located in the UK 🇬🇧

account_circle
James Kettle(@albinowax) 's Twitter Profile Photo

XSS in PDF.js! I think this is going to cause some chaos both client-side and server-side... really nice finding by Codean
codeanlabs.com/blog/research/…

account_circle
Roll4Combat(@BadAt_Computers) 's Twitter Profile Photo

Excited to explore new web app pentesting opportunities! I'm seeking a mid-level role where I can continue to learn and grow. Looking for fully remote positions (MST timezone). Happy to provide an updated resume and would love to chat about any opportunities!

account_circle
N$ 🍥(@nav1n0x) 's Twitter Profile Photo

You can still find SQL injections in User-Agent/ or other request-headers; you just need a keen eye to find it.
Make sure to include SQLi testing on headers in your methodology. Developers often tend to ignore headers.

You can still find SQL injections in User-Agent/ or other request-headers; you just need a keen eye to find it. Make sure to include SQLi testing on headers in your methodology. Developers often tend to ignore headers. #BugBounty #SQLi #SQLInjection
account_circle
Google VRP (Google Bug Hunters)(@GoogleVRP) 's Twitter Profile Photo

Don't get caught off guard by post-quantum cryptography threats 👀. Check out our latest blog post to learn how hybrid deployments can help future-proof your data security strategy.

bughunters.google.com/blog/526688204…

account_circle
Gunnar Andrews(@G0LDEN_infosec) 's Twitter Profile Photo

Bug Bounty Hunters... Please drop anyone's blog that you have read EVERY article from that you feel as really helped you :) TYTY

account_circle
N$ 🍥(@nav1n0x) 's Twitter Profile Photo

Cool Blind . The target has an admin login page where certain methods are allowed. I found the API endpoint for the admin login and sent the same payload. Success.

POST /admin/login ==> 405
POST /api/v01/admin/login ==> 200 OK + Blind SQLi

Cool Blind #SQLi. The target has an admin login page where certain methods are allowed. I found the API endpoint for the admin login and sent the same payload. Success. POST /admin/login ==> 405 POST /api/v01/admin/login ==> 200 OK + Blind SQLi #bugbounty #SQLi
account_circle