Walid Hossain (@walidhossain_) 's Twitter Profile
Walid Hossain

@walidhossain_

Web app tester || Everything is vulnerable! || bugcrowd.com/walidhossain For pentest: DM! 👆

ID: 904037554386681856

linkhttp://localhost.com calendar_today02-09-2017 17:45:23

2,2K Tweet

2,2K Takipçi

450 Takip Edilen

Walid Hossain (@walidhossain_) 's Twitter Profile Photo

I earned $xxx for my submission on @bugcrowd bugcrowd.com/walidhossain #ItTakesACrowd /partner/ -403 /partner/dynamic/ - 403 /partner/dynamic/trace.axd - 200 - P1 - Full read trace.axd live log access lead to leakage of many users PII

André Baptista (@0xacb) 's Twitter Profile Photo

This email domain confusion technique from Gareth Heyes \u2028 is so cool! Some really weird behavior can be found between different mail agents and the right characters/symbols 🤔

This email domain confusion technique from <a href="/garethheyes/">Gareth Heyes \u2028</a> is so cool!

Some really weird behavior can be found between different mail agents and the right characters/symbols 🤔
Jason Haddix (@jhaddix) 's Twitter Profile Photo

A lot of people lead with "forget previous instructions" in Prompt Injection. TBH that's more of a jailbreak tactic. More often in the real world "Additional Instruction:" works better. 🫶🤟

DOAM (@doamuslims) 's Twitter Profile Photo

Palestinian children blown from their house onto rooftop of another house after Israeli warplanes bombed a residential building in #Gaza city.

‌Renwa (@renwax23) 's Twitter Profile Photo

It's end of the month and here is a new writing about changing a useless sanitized HTML injection to stored XSS and account takeover by looking through JS files and image upload. medium.com/@renwa/html-in…

slonser (@slonser_) 's Twitter Profile Photo

Today I used a technique that’s probably not widely known in the community. In what cases could code like this lead to a vulnerability? ->

Today I used a technique that’s probably not widely known in the community.
In what cases could code like this lead to a vulnerability? -&gt;
YS (@yshahinzadeh) 's Twitter Profile Photo

just wrote a blog post based on this technique and described the methodology to take advantage of it, the post also includes an easy-to-set-up testbed to practice with, hope you find it useful blog.voorivex.team/leaking-oauth-…

just wrote a blog post based on this technique and described the methodology to take advantage of it, the post also includes an easy-to-set-up testbed to practice with, hope you find it useful
blog.voorivex.team/leaking-oauth-…
André Baptista (@0xacb) 's Twitter Profile Photo

Hidden or disabled fields are commonly overlooked, but they can still open the door to some cool bugs. Try creating a bookmarklet to instantly reveal these fields. Here are some quick examples you can copy and paste: 🔖 Enable all disabled or readonly fields:

Shaykh Hasan Ali (@shaykhhasanali) 's Twitter Profile Photo

❝Four things ruin the body: Worry, grief, hunger and sleeplessness. And four things bring joy: Looking at greenery, running water, a beloved person and fruits.❞ ~ Ibn Qayyim رحمه الله in Zad al-Ma'ād

Justin Gardner (@rhynorater) 's Twitter Profile Photo

I love bug bounty data like this. So insightful, especially from rising star in the community like Evan Connelly evanconnelly.com/post/my-first-…

YS (@yshahinzadeh) 's Twitter Profile Photo

How did we (AmirMohammad Safari) earn $50k using the Punycode technique? I’ve published a detailed blog post about our recent talk, we included 3 attack scenarios, one of which poses a high risk of account takeover on any "Login with GitLab" implementation blog.voorivex.team/puny-code-0-cl…

MG 🏳️ (@favafghan_x) 's Twitter Profile Photo

On the day of Arafah, ask big, ask for Jannah, for healing, for the impossible. Your biggest dreams are nothing before "Kun Faya kun". Be delusional in your duas because nothing is too big for Allah.

Godfather Orwa 🇯🇴 (@godfatherorwa) 's Twitter Profile Photo

Slides of the talk in #PHDays PT Security docs.google.com/presentation/d… hoping be very helpful for all of you ♥ #bugbounty #bugbountytips #bugbountytip If you didn't check the video of the talk , then its time ===>