
Bug X Hunter 💻
682 posts

Bug X Hunter 💻
@Bug_X_hunter
Bug Hunter 🪲 .👨💻 - Together, let's make the internet a safer place. 🌐 - Join the fight against Bug's 🪲 today. 🐞 - Follow me on my journey.
United States Katılım Nisan 2023
10 Takip Edilen6.3K Takipçiler
Sabitlenmiş Tweet

We have Created the Telegram Group for hackers & bug hunters .
Everyone is welcome to join our group and access to the resources, collabs & enquiries.
Here's the telegram link :
t.me/+oaLjKstDPq1jZ…
See you on the other side
Happy hacking
English

Hey @IAmAlenSultanic ,
You should probably look into this asap.
The user data is at risk.
English
Bug X Hunter 💻 retweetledi

$0 Access is now live. 🚀
No upfront fee.
Only pay after you pass.
This is your chance to get started with Atlas without paying on day one.
Big opportunity. Big momentum. Big month ahead.
Start now: atlasfunded.com/free-access

English

Anyone from @zerion & @zebastieneth security team.
Prompt action is needed .
Please reach out immediately
Via dm
Thanks
English


@harryzhangs While researching i found the security issues in the @HackQuest_ domain which discloses the sensitive data of all the hackquest users whether its set to private.Let me know if you have bug bounty program or something like that so where i can responsible disclose them
English

@Giveaways_au I’m a security researcher and have identified a critical Account Takeover vulnerability in your app. This issue poses serious risk to user accounts.Please DM me .Ugent response requested.
English

My team at @Bugcrowd is hiring an Application Security Engineer in India! Feel free to hit me up with questions, or apply directly at grnh.se/iws1uqjs1us
#cybersecurity #hiring #bugcrowd
English

I do web bug bounty work from time to time, and I always start without tools. I begin with just the browser. I sign up, verify my email, log in if needed, and simply use the application as a normal user. How long I stay in this phase depends on the size and complexity of the system. If it is too large, I break it into smaller services and explore each one separately.
Once I understand how the product works, I try to understand the problem it solves and who uses it. This might seem unrelated, but it helps a lot when writing reports, especially when explaining impact and risk from the perspective of the business.
After I am comfortable with the application, I begin a simple threat-modeling exercise. I ask myself what can go wrong, focusing on logical issues and overlooked edge cases. Then I connect the dots between features to see how they interact. This step often leads to the more interesting and creative findings.
When I finish mapping the assets, understanding authN/authZ , and listing all potential threats, I start testing to confirm or reject each one. And I never assume that something is already secure. Developers get tired, deadlines happen, and even security engineers sometimes miss things.
By following this approach, you do more than find vulnerabilities. You learn the business domain, understand the architecture, and develop the skill to consistently spot security issues.
Focus on learning, and always start with a clear timeline.
English


@S1r1u5_ Congrats, will you let me know about the supabase one?
I've target integrated to it let me know.if we can submit findings to them.
English

@tommyboyhacking @Hacker0x01 Platform doesn't matter, program does
English

@newbiepath @skulldentist Would you please explain it lil more?
English

I hope everyone is having an amazing day :) I see a lot of interest in our new platform wayhack.sh which is great!
Can I please kindly request everyone who is interested in trying out the platform to DM us over at:
✍️x.com/wayhacksh
English

Hey @grok based on your analysis of the last 365 days, list in sequence 10 accounts that frequently visit my profile. Do not mention the person, only @.username and the rate of visits to the profile per month.
English












