Hussam Linux (@hussamlinux) 's Twitter Profile
Hussam Linux

@hussamlinux

ID: 2576556256

calendar_today02-06-2014 03:59:58

3,3K Tweet

614 Takipçi

2,2K Takip Edilen

Fadi Quran (@fadiquran) 's Twitter Profile Photo

Israeli drone operator, probably an Israeli 20-some year old you’ll run into somewhere in Europe or Thailand, dropped a bomb on a starving girl carrying water home to her family. He’s probably done this dozens of times. This time it’s on camera

Behi (@behi_sec) 's Twitter Profile Photo

I found a simple IDOR that turned into an account takeover. The bounty? $5,000. Here’s exactly how I found it 🧵👇

Behi (@behi_sec) 's Twitter Profile Photo

1. The target had an "Add Contact" feature. It was used to add contacts to an account, but those contacts could be given a wide range of permissions. The request to add a contact looked like this: POST /addcontact?accountId=123 { "accountId": 123, "email": "[email protected]" }

chux (@chux13786509) 's Twitter Profile Photo

🚨 NGINX Misconfiguration Challenge 🚨 I created a vulnerable nginx.conf for learning purposes 🔥 Can you find and explain at least one vulnerability? Bonus points if you find them all 😎 Drop your findings in the comments 👇

🚨 NGINX Misconfiguration Challenge 🚨
I created a vulnerable nginx.conf for learning purposes 🔥
Can you find and explain at least one vulnerability? Bonus points if you find them all 😎
Drop your findings in the comments 👇
Behi (@behi_sec) 's Twitter Profile Photo

I bypassed the paywall of an entire learning platform... They marked it "medium". I tried harder and raised the severity. That turned into a $1,500 bounty. Here’s the full story 🧵👇

VIEH Group (@viehgroup) 's Twitter Profile Photo

Cloudflare 403 bypass to time-based blind SQLi: PL: (select(0)from(select(sleep(10)))v) → 403 but PL: (select(0)from(select(sleep(6)))v)/*'%2B(select(0)from(select(sleep(6)))v)%2B'%5C"%2B(select(0)from(select(sleep(6)))v) → Time-based Blind SQLi #BugBounty #SQLi

Cloudflare 403 bypass to time-based blind SQLi:
PL: (select(0)from(select(sleep(10)))v) → 403
but PL: (select(0)from(select(sleep(6)))v)/*'%2B(select(0)from(select(sleep(6)))v)%2B'%5C"%2B(select(0)from(select(sleep(6)))v) → Time-based Blind SQLi  
#BugBounty #SQLi
Ibrahim Kamel (@abrahimkamal74) 's Twitter Profile Photo

If you respond with 3 replys, you will help me a lot to make my post visible to everyone, even if a dot. gofundme.com/f/help-ibrahim…

If you respond with 3 replys, you will help me a lot to make my post visible to everyone, even if a dot.
gofundme.com/f/help-ibrahim…
VIEH Group (@viehgroup) 's Twitter Profile Photo

Find the origin servers of websites protected by Cloudflare, Sucuri, or Incapsula with a misconfigured DNS. ⚔️ - github.com/MrH0wl/Cloudma… Credit: Md Ismail Šojal 🕷️ #infosec #bugbountytips #Cybersecurity

Find the origin servers of websites protected by Cloudflare, Sucuri, or Incapsula with a misconfigured DNS. ⚔️ 
- github.com/MrH0wl/Cloudma… 

Credit: <a href="/0x0SojalSec/">Md Ismail Šojal 🕷️</a> 
#infosec #bugbountytips #Cybersecurity
Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile Photo

WAFs still blocking your payloads? Try our newest pointer capture tricks. Our XSS cheat sheet just got an upgrade thanks to Ahsan Shahid. portswigger.net/web-security/c…

WAFs still blocking your payloads? Try our newest pointer capture tricks. Our XSS cheat sheet just got an upgrade thanks to <a href="/hunter0x8/">Ahsan Shahid</a>.

portswigger.net/web-security/c…
Brandon Taylor Moore (@letsgobrando45) 's Twitter Profile Photo

Thank goodness they found those indestructible pilot’s passports on the ground below the World Trade Centres. Otherwise, we wouldn’t have been able to confirm it was the Muslims that did it. P.S. Jet fuel melts steel beams but has no effect on paper. They think you’re

Thank goodness they found those indestructible pilot’s passports on the ground below the World Trade Centres. 

Otherwise, we wouldn’t have been able to confirm it was the Muslims that did it. 

P.S. Jet fuel melts steel beams but has no effect on paper. 

They think you’re
Kirill Firsov (@k_firsov) 's Twitter Profile Photo

How to access servers behind Cloudflare by bypassing the firewall? FearsOff Cybersecurity #bugbountytips #cloudflare #firewall #bypass 1) Found a sweet hostname but Cloudflare Firewall blocks you? There's a neat trick attackers can use if the origin is misconfigured.

How to access servers behind Cloudflare by bypassing the firewall?
<a href="/FearsOff/">FearsOff Cybersecurity</a> #bugbountytips #cloudflare #firewall #bypass

1) Found a sweet hostname but Cloudflare Firewall blocks you? There's a neat trick attackers can use if the origin is misconfigured.
urlscan.io (@urlscanio) 's Twitter Profile Photo

Thanks to the awesome work by our team we can finally announce our official urlscan cli tool: urlscan.io/blog/2025/09/0… - Submit scans, run searches, find domains, get creative. Feel free to share your use-cases with us on X! Download on Github or homebrew.

Thanks to the awesome work by our team we can finally announce our official urlscan cli tool: urlscan.io/blog/2025/09/0… - Submit scans, run searches, find domains, get creative. Feel free to share your use-cases with us on X! Download on Github or homebrew.
Behi (@behi_sec) 's Twitter Profile Photo

In 4 years of hacking, dorks only worked for me once. But that single hit earned me $6,700. Here's exactly how it happened 🧵👇

0vulns (@0vulns) 's Twitter Profile Photo

Kirill Firsov FearsOff Cybersecurity I wrote two writeups about cloudflare: The first one about bypassing WAF rules if it only allows cloudflare ips only 0vulns.medium.com/rip-cloudflare… The second one about finding the origin server behind cloudflare using cookies name 0vulns.medium.com/a-deep-dive-in…