3NVZ

880 posts

3NVZ banner
3NVZ

3NVZ

@YourFinalSin

Simplicity is the Ultimate Sophistication.

California 가입일 Ağustos 2024
97 팔로잉4.2K 팔로워
3NVZ
3NVZ@YourFinalSin·
@HarrySandh21970 If bug bounty/cybersecurity would be solved, any other digital field would’ve been solved as well AI is a tool with limits, just as any other tool. If you love hacking, don’t leave
English
0
0
2
17
solo_€
solo_€@HarrySandh21970·
@YourFinalSin sir i am beginner i want to learn cyber security&bug bounty but all are saying this is end leave this area
English
1
0
1
33
3NVZ
3NVZ@YourFinalSin·
Is it just me or do various bug bounty platforms feel increasingly worse? First response and triage experience has gone downhill big time. I have multiple P2/High severity reports that are 15-30 days old that weren’t even looked at by triage yet..
English
7
0
46
2.4K
3NVZ
3NVZ@YourFinalSin·
@3ftetfw If you do it for the love of hacking and puzzle solving, you’ll be good!
English
0
0
0
7
3tftee
3tftee@3ftetfw·
@YourFinalSin it's kinda making me reconsider studying bug bounty. i'm fairly new, time before i can attempt finding a bug is like early next year. by then, shit might be even worse. everything seems cooked.
English
2
0
2
56
3NVZ
3NVZ@YourFinalSin·
@3ftetfw That’s crazy I didn’t know that it’s that bad
English
2
0
1
122
3NVZ
3NVZ@YourFinalSin·
@Xg0d_ I feel you bro
English
0
0
2
119
Wr4ith
Wr4ith@Xg0d_·
@YourFinalSin Same bro reported 11 days ago and still no response on bugcrowd 🥲
English
1
0
1
240
kjulius
kjulius@ethical_h4ck3r_·
@YourFinalSin You feel like wasting your time sometimes in bug hunting... after all this wait, and it's marked as duplicate. ☻️
English
1
0
1
195
s4botai
s4botai@s4botai77563·
@YourFinalSin This has to be the AI slop for sure. I reported a vuln on a program that you needed to pay a $50 fee to submit a report. Was triaged and payed the same day I reported it
English
1
0
6
193
3NVZ
3NVZ@YourFinalSin·
@Jayesh854255941 I only hunt on main apps, so I don’t do any subdomain enumeration or similar
English
0
0
0
3
Jayesh
Jayesh@Jayesh854255941·
@YourFinalSin Bro how do u select targets man I select targets with wildcards and don't get more than 10-20 Subdomains even which most of them don't have features 😭
English
1
0
1
26
3NVZ
3NVZ@YourFinalSin·
Here is a little dork for you, if you wanna learn a thing or two about Client-Side Vuln Hunting! site:blog.criticalthinkingpodcast.io "client-side"
English
1
4
105
4.1K
Jayesh
Jayesh@Jayesh854255941·
@YourFinalSin Ohh so like when u find Subdomains and all and select a target u try to find bug by checking what feature can have what bugs like Comment section can have a stored xss so u use notes that time to find bypasses and all right?
English
1
0
1
17
3NVZ
3NVZ@YourFinalSin·
@Jayesh854255941 Yeah, I kept notes on everything that I was learning and also came back to these notes if I found something similar on a target I’m using Notion for that - it’s free
English
1
0
3
103
Jayesh
Jayesh@Jayesh854255941·
@YourFinalSin Bro how did u learn about a bug like u made notes for all bugs after solving or while solving portswigger and then reused those notes while hunting?
English
1
0
2
182
3NVZ
3NVZ@YourFinalSin·
@Abdelmajid14619 Can't disclose, otherwise it wouldn't be a challenge anymore!
English
0
0
1
15
3NVZ
3NVZ@YourFinalSin·
First report accepted and paid on GitLab! 💥 Tip: Learn as much as you can about your target from public data/reports, before you start hunting on them
3NVZ tweet media
English
10
3
224
6.3K
3NVZ
3NVZ@YourFinalSin·
@th31nitiate Yeah for sure. Especially for highs and crits there’s always a window for an attacker
English
0
0
1
25
Dr.Moon
Dr.Moon@th31nitiate·
@YourFinalSin Dammmmm, dups are generally pain, but I always wonder if they can detect them. Cause an attacker can surely use those, if they can't detect them.
English
1
0
1
137
3NVZ
3NVZ@YourFinalSin·
Another high-impact GitLab vuln found 💥 Ended up duplicate, but this one involved a nice server-side filter bypass. Getting closer, I’m not stopping until I land that paid High on GitLab!
3NVZ tweet media
English
3
0
95
2.7K
RootExe
RootExe@root_exe_ind·
I am officially starting the everyday posting of the cyber security journey and sharing the daily stuffs and some good stuffs and my daily progress in the cyber security. I am gonna document my never ending journey here. #cybersecurity #motivation #study #hacking #consistency
RootExe tweet media
English
4
0
11
235
3NVZ
3NVZ@YourFinalSin·
@EvanKlein338226 Yeah, for sure. They left it open for you to find it haha
English
0
0
1
461
Evan Klein
Evan Klein@EvanKlein338226·
@YourFinalSin "Internal Duplicate" after 2 months is brutal. The paid features tip is gold though — found an IDOR in a "premium" endpoint once that was still accessible because they only gated the UI, not the API. Defense in depth? Never heard of her.
English
1
0
6
717
3NVZ
3NVZ@YourFinalSin·
A nice IDOR that gave access to essentially every user's private data 💥 Reported -> Triaged -> 2 months later marked as "Internal Duplicate" by the company🫠 Tip: Go deep into the app, you might find endpoints for paid features that are still accessible
3NVZ tweet media
English
3
1
159
7.6K
3NVZ
3NVZ@YourFinalSin·
Just published a new writeup about a nice chain that led to credit card theft, including a stored XSS, cookie tossing and cookie jar action 💥 Unfortunately, this was marked as informational and my disclosure request was denied lol @YourFinalSin/from-stored-xss-to-cookie-tossing-into-credit-card-theft-396b59b49326" target="_blank" rel="nofollow noopener">medium.com/@YourFinalSin/…
English
0
2
58
2.5K
3NVZ
3NVZ@YourFinalSin·
@1___Khalid___ @_tomek7667 I don’t have a special setup. I’m using Burp community edition and a 64gb ram windows laptop with WSL If I need to do sth in a VM I use virtualbox
English
0
0
1
41
Khalid ibn Al-walidۣ
Khalid ibn Al-walidۣ@1___Khalid___·
@YourFinalSin @_tomek7667 Hi my friend, hope you're doing well. I've been following you since the beginning and learned a lot from your posts. Could you recommend a PC setup specifically for bug hunting? I don’t play games—only bug bounty hunting (Burp, browsers, VMs).
English
1
0
1
57
3NVZ
3NVZ@YourFinalSin·
This is a very interesting approach on bypassing DOMPurify via String.replace It was for a CTF, but I'm pretty sure it could come in very handy 💀 Kudos to @_tomek7667, insane job! youtube.com/watch?v=mniM5H…
YouTube video
YouTube
English
1
0
14
1K