Osama h0$#@

558 posts

Osama h0$#@

Osama h0$#@

@HackeroneO33301

not found

whoami Katılım Ocak 2026
209 Takip Edilen10 Takipçiler
رَهَفْ
رَهَفْ@Videoohat·
أعطوني عنوان مناسب لهالصورة ؟!
رَهَفْ tweet media
العربية
62
7
37
17.7K
Joseph Thacker
Joseph Thacker@rez0__·
I and @WorstWursts successfully articulated impact to Amazon*** Fixed that for you
.@696e746c6f6c

I and @WorstWursts beat Amazon. After months without a payout, the Amazon team has today readjusted our report's severity to critical. This is insane, lets fucking goo!

English
4
0
64
7.6K
Osama h0$#@
Osama h0$#@@HackeroneO33301·
@arabmemesss اخوانا المصرييين نوابغ بكل شيء
العربية
0
0
0
138
Arab Memes
Arab Memes@arabmemesss·
هذه السيدة من غزة أصيبت في الحرب بتشوهات كبيرة ظنت بعدها أن حياتها قد انتهت !! فجاء هذا الدكتور المصري…See More
Arab Memes tweet media
العربية
281
2.2K
32.2K
4.4M
Osama h0$#@
Osama h0$#@@HackeroneO33301·
@Hajjaj0x محفظه بينانس ومن المحفظه بيع عبر p2p ولابتخسر شي ويمكن تكسب فارق الصرف ةمن المشترييين كثير
العربية
0
0
1
204
Hajjaj 🇵🇸
Hajjaj 🇵🇸@Hajjaj0x·
أخواتي الهكرز أسهل طريقة سحب فلوس من هاكر ون بدون ما يشفطوا نص الفلوس ؟
العربية
12
0
49
9.2K
Osama h0$#@
Osama h0$#@@HackeroneO33301·
@0xwer8 رد الاصلاح يتاخر طبعا
العربية
1
0
1
88
Tarek Abdulal
Tarek Abdulal@0xwer8·
مش ممكن والله، هل هو طبيعي ولا لا؟ ثغرة critical تمر 5 ايام مع انها Assessed بدون اي رد ويردو على ثغره Mid بدل هاي الثغرة 🤨 **اثنينهم نفس ال Program على فكرة**
Tarek Abdulal tweet mediaTarek Abdulal tweet media
العربية
10
0
39
2.2K
Osama h0$#@ retweetledi
Bug bounty wizard
Bug bounty wizard@bugbountywizard·
SQL Injection in GraphQL/WebSocket Escalated to PII Document Leak by DarkyOS @DarkyOS/sql-injection-in-graphql-websocket-escalated-to-pii-document-leak-09ba7ad2800a" target="_blank" rel="nofollow noopener">medium.com/@DarkyOS/sql-i… #bugbounty #bugbountytips #bugbountytip
English
0
4
20
710
Osama h0$#@ retweetledi
sin99xx
sin99xx@sin99xx·
This time HIGH severity triaged, 5th bug in 9 days in Public Program Back to back Same day triage 🚀
sin99xx tweet media
English
12
7
166
3.6K
Osama h0$#@ retweetledi
sudi
sudi@sudhanshur705·
Last year I found a MXSS (dream) bug in a Mail app,it involved bypassing 2 consecutive sanitizers recursive Dompurify calls plus CKEditor.Hope you will like it sudistark.github.io/2026/04/07/mxs… All thanks to @kevin_mizu for putting such great content around mxss and those bypasses🙇‍♀️
English
5
47
281
11.4K
Osama h0$#@ retweetledi
termireum
termireum@termireum·
RCE via Insecure JS Sandbox Bypass @win3zz/rce-via-insecure-js-sandbox-bypass-a26ad6364112" target="_blank" rel="nofollow noopener">medium.com/@win3zz/rce-vi…
English
1
36
240
16.3K
Osama h0$#@ retweetledi
mrx_w_
mrx_w_@MrxXb12·
I just published a full write-up about how I discovered a blind SQL injection in a private bug bounty program. @mrx_w_/how-i-discovered-a-blind-sql-injection-in-a-private-program-7eebd77ad286" target="_blank" rel="nofollow noopener">medium.com/@mrx_w_/how-i-… #BugBounty #BugBountyTips #Bugcrowd #CyberSecurity
mrx_w_ tweet media
English
5
27
225
8.6K
riri
riri@grayrwn·
بحس gemini اذكى من chat gpt
362
230
5.3K
512.9K
Osama h0$#@ retweetledi
Casper0x
Casper0x@_casper0x·
Simple XSS payload for AngularJS testing. Older AngularJS versions are still vulnerable to expression injection. {{$on.constructor('alert(document.domain)')()}} #BugBounty #XSS #bugbountytips #hackerone
Casper0x tweet media
English
1
22
161
6.6K
Osama h0$#@ retweetledi
Casper0x
Casper0x@_casper0x·
Finding the right SQLi payload isn’t always easy @lu3ky13 Built this with AI (obsidianlabs.cloud) For POC: ';IF(LEN(USER_NAME())>=5)WAITFOR DELAY '0:0:20'-- #BugBounty #SQLi #bugbountytips #hackerone #SQL
Casper0x tweet media
Casper0x@_casper0x

Finding the right SQLi payload isn’t always easy. If you can’t craft custom logic, use Time-Based techniques to prove control. Built this with AI (obsidianlabs.cloud) for a POC: ';IF(LEN(USER_NAME())>=5)WAITFOR DELAY '0:0:20'-- #BugBounty #SQLi #bugbountytips #hackerone

English
2
28
221
14.5K
Osama h0$#@ retweetledi
Sayed Abdelhafiz
Sayed Abdelhafiz@dPhoeniixx·
four bugs to the same program, 1-click rce (lowerd to high), 3 access token leaks (some lowered to medium). what is impressive, no single response from the program for about 5 months, h1 mediation didn't reply, what is going on? h1 is dead?! @Hacker0x01 what?!
Sayed Abdelhafiz tweet media
English
9
4
184
8.3K
Osama h0$#@ retweetledi
Muhammad Saqib Arif 🇵🇰
Muhammad Saqib Arif 🇵🇰@saqibarif98·
$1,500 Recon Secrets: Dorks to Dollars @tinopreter/1-500-recon-secrets-dorks-to-dollars-0e7eca022708" target="_blank" rel="nofollow noopener">medium.com/@tinopreter/1-…
English
0
17
142
7.2K
Osama h0$#@ retweetledi
pyn3rd
pyn3rd@pyn3rd·
#CVE-2026-22738: Spring AI SimpleVectorStore Hit by SpEL Injection — Remote Code Execution Risk in AI Pipelines
pyn3rd tweet media
English
1
10
74
5K