K4e

284 posts

K4e banner
K4e

K4e

@YKatone

K4e just somebody who want live on bug bounty in full time.

가입일 Temmuz 2024
141 팔로잉385 팔로워
K4e
K4e@YKatone·
@Wakedxy1 It's very frustrating, it really makes me angry
English
0
0
0
95
Wakedxy
Wakedxy@Wakedxy1·
I love it when you escalate a vulnerability, the program marks it as "out of scope," and then a few weeks later you discover they quietly patched it anyway 🤡
English
1
0
12
969
K4e 리트윗함
Gospel
Gospel@4osp3l·
I’ve officially launched my startup. To kick things off, I'm offering a free 72-hour full blackbox pentest for startup/org digital assets. If you're interested, say "hello," and I'll reach out.
DorkixAI@DorkixAI

DorkixAI An autonomous pentest agent for offensive security researchers. $0.00 — Free security assessment ( 2 scans only & it's under control of the company ) $200 — Full blackbox pentest ( lifetime access & it's under your control )

English
101
31
237
28.7K
K4e
K4e@YKatone·
@4osp3l You have a beast of a machine then
English
0
0
0
42
K4e
K4e@YKatone·
@4osp3l Congrat bro 🔥
English
0
0
0
80
Gospel
Gospel@4osp3l·
🚶‍♂️
Gospel tweet mediaGospel tweet media
QME
8
0
66
5.6K
K4e
K4e@YKatone·
@4osp3l 😂😂😂So funny!
English
0
0
1
21
Gospel
Gospel@4osp3l·
@Nccbella Duplicate! Informative! N/A!
Română
2
0
15
385
D'bella
D'bella@Nccbella·
Write ✍️ a sad story, using only 3 words 😢
English
2.5K
282
3.9K
657.7K
K4e
K4e@YKatone·
@Wakedxy1 @Bugcrowd But it's so complicated, I bypassed a 401 and accessed an admin page, yet it's still asking me about the impact.
English
1
0
1
105
Wakedxy
Wakedxy@Wakedxy1·
Imagine arguing with a triager on @Bugcrowd for a VDP where I'm not paid and won't earn any points. I found a way to bypass a 401 restriction and get access to a dev JWT. I now need to prove the impact of the vulnerability... It's getting harder to be an ethical hacker.
Wakedxy tweet media
English
1
0
3
1.7K
K4e
K4e@YKatone·
@4osp3l congrats bro
English
0
0
1
126
K4e
K4e@YKatone·
@4osp3l well done big 🔥🔥🔥
English
0
0
1
38
Gospel
Gospel@4osp3l·
DAY 72/365
Gospel tweet media
2
1
33
1.3K
K4e
K4e@YKatone·
Under Review : 1 Need more info : 1 Duplicate : 1 RTFS : 3 OOS : 1 #bugbounty @yeswehack
K4e tweet media
English
0
0
15
304
K4e
K4e@YKatone·
@_SaxX_ 🤣🤣j’aime trop voir ça
Français
0
0
1
351
SaxX ¯\_(ツ)_/¯
SaxX ¯\_(ツ)_/¯@_SaxX_·
Joli fail de cet hôtel ! L'IA par ci, l'IA par là 👍🏽
SaxX ¯\_(ツ)_/¯ tweet media
Français
11
3
145
13.5K
drak3hft7
drak3hft7@drak3hft7·
I’ve added a new entry to my CVE list , CVE number 1️⃣ 3️⃣ . CVE-2026-4315 The issue is a Cross-Site Request Forgery (CSRF) in the Fireware OS Web UI that can allow a remote attacker to trigger a denial-of-service (DoS) condition by luring an authenticated administrator into visiting a malicious page. Impact: High (CVSS 7.1) Advisory: watchguard.com/wgrd-psirt/adv… The issue was identified through @Hacker0x01 . #bugbounty #cybersecurity #securityresearch #cve
English
1
1
22
2K
K4e
K4e@YKatone·
@w4rcrypt @yeswehack Hey man, YWH is the platform where I started exploit hunting, so I can tell you it's the best out of habit, but no, there are programs that pay in a day after you submit your report 😅. And above all, the triage workflow means you really don't feel the wait because it's detailed
English
1
0
1
50
Pramod Kumar⚡
Pramod Kumar⚡@w4rcrypt·
@YKatone @yeswehack Hey bro, can you share you experience on yeswehack platform like what’s average response time, triage experience and programs ?
English
1
0
1
52