Bug Bounty Center

147 posts

Bug Bounty Center banner
Bug Bounty Center

Bug Bounty Center

@BugBountyCenter

The all-in-one app for bug bounty hunters. 100% local. Your data never leaves your machine.

Katılım Kasım 2024
765 Takip Edilen140 Takipçiler
Sabitlenmiş Tweet
Bug Bounty Center
Bug Bounty Center@BugBountyCenter·
Bug Bounty Center v1.2.2 🎉 Improved license validation and integrity checks. Single-target scans now enforce strict hostname filtering on all tools to prevent out-of-scope results. Added a performance advisory for large-scale scans. Note: after updating, you may need to re-enter your license key once due to security improvements #BugBounty #BugBountyTips #AppSec #WebSec #Cybesecurity bugbountycenter.com
English
0
0
0
42
Bug Bounty Center
Bug Bounty Center@BugBountyCenter·
@EvanKlein338226 I think the key is to enjoy what you do. That applies to every aspect of life. Revisiting old targets or starting a new one from scratch and seeing what I discover along the way feeds my curiosity. That’s what keeps me working day after day
English
0
0
0
12
Evan Klein
Evan Klein@EvanKlein338226·
Unpopular opinion: The hardest part of bug bounty isn't finding vulns - it's the mental game. Dupes after 6 hours of work. N/A after writing a detailed report. Waiting weeks for triage. What keeps you going when the grind gets brutal? 👇
English
1
0
2
60
Bug Bounty Center
Bug Bounty Center@BugBountyCenter·
Been running real-world tests with the AI Briefcase workflow on live bug bounty programs. Found some areas where the briefcase output can be improved to give better results when paired with AI assistants. Fixes and improvements coming soon in the next update One thing that no update can fix though: you still need a real hunter behind the screen. AI can process data, suggest directions and speed up your workflow but it does not understand context the way you do. The thinking is still yours. AI is a force multiplier, not a replacement #BugBounty
English
0
0
1
60
Bug Bounty Center retweetledi
Medusa
Medusa@medusa_0xf·
MCP is the new attack surface most people are ignoring. Just published a breakdown of the most common security misconfigurations in MCP deployments. Read here 👇 medusa0xf.com/posts/mcp-serv…
English
6
25
136
6.3K
Bug Bounty Center retweetledi
key
key@VulkeyChen·
Web-Fuzzing-Box - A curated collection of fuzzing dictionaries & payloads for web security testing. Brute force, directory enumeration, vulnerability exploitation — all in one place. Passwords, usernames, paths, API endpoints, XSS/SQLi payloads, file upload bypasses, 403 bypasses, and more. Many dictionaries are battle-tested — extracted from real-world engagements via the CaA project (Collector and Analyzer), not randomly generated wordlists. Ready for Burp Intruder, ffuf, dirsearch, or any tool you throw at it. Free. Open source. github.com/gh0stkey/Web-F… #bugbounty #infosec #pentesting #fuzzing #wordlists
key tweet media
English
4
29
212
12.9K
Bug Bounty Center
Bug Bounty Center@BugBountyCenter·
I love the way the cybersecurity community supports itself. My feed is full of people creating tools, people sharing knowledge, people helping others... it's just wonderful
English
0
0
4
40
Victor 🧢
Victor 🧢@victor_bigfield·
what are you working on this week? share your website to get some traffic ↓ (I would choose 3 projects to feature in my newsletter, FromScratch + 2K subscribers)
English
290
4
120
8.4K
DestroyerX
DestroyerX@ide9x·
pain 😭😭😭😭
DestroyerX tweet media
English
5
0
35
1.3K
Bug Bounty Center retweetledi
Valeriy
Valeriy@Krevetk0Valeriy·
@Cryptycore @Hacker0x01 Stay passionate and curious. That’s the main takeaway. Certifications will not find bugs for you.
English
1
3
22
1.5K
kstack
kstack@bts_leandro·
First bounty 😃 I expected more from this bug, but it's okay.
kstack tweet media
English
15
8
248
12.7K
Bug Bounty Center retweetledi
Patrickbatman
Patrickbatman@hamidonsolo·
I don't run automated scanners and pray. Everyone wants the $10K months. Nobody wants to spend 6 hours reading JavaScript understanding how one feature passes data to another. I read the code. I trace the logic. I click every button. I test the feature nobody thinks is interesting. I sit with one application for weeks until I understand it better than the developers who built it. That's how you go from "no bugs found" to: → Top 10 on Netlify. 16 reports submitted. → #1 on Temu. 8 reports submitted. → High and Critical severity bugs dropping in the same night. Automation finds the easy stuff. The stuff 50 other hunters already reported. The duplicates. Manual hunting finds the chains. The logic flaws. The bugs that make engineers say "how did you even find this." I'm 19. I don't have 10 years of experience. I don't have fancy tools. I have patience and my browser. That's enough. Deep dive > wide scan. Every time.
Patrickbatman tweet mediaPatrickbatman tweet media
English
9
18
284
11.7K
Intigriti
Intigriti@intigriti·
what's your most used bug bounty tool? 😎
English
37
0
65
14K
Bug Bounty Center retweetledi
iShowCybersecurity
iShowCybersecurity@ishowcybersec·
10 platforms to sharpen your cybersecurity skills: 1. Hack The Box 2. OverTheWire 3. TryHackMe 4. Root Me 5. PentesterLab 6. CyberSecLabs 7. Offensive Security (PWK) 8. HackThisSite 9. VulnHub 10. Immersive Labs Hands-on practice is where real skills are built. Level up
English
4
116
607
14.2K
MrKay
MrKay@mr_kay7·
Day25/30 #30DaysTechJourney Understanding the relationship between the Front End (Client-Side) and the Back End (Server-Side). It’s wild how much is happening in that split second when you hit Enter on a URL. The journey continues💻🛡️ #InfoSec #BuildInPublic #LearningWithTS
MrKay tweet mediaMrKay tweet mediaMrKay tweet mediaMrKay tweet media
MrKay@mr_kay7

Day 24/30 #30DaysTechJourney Today is all about Linux Basics, From navigating the file system with cd” and ls”to reading sensitive files with cat”. Getting comfortable with the CLI is a must. There’s something so satisfying about seeing that "Room Completed" #LearningWithTS

English
3
4
16
838