W31rd0

1.5K posts

W31rd0 banner
W31rd0

W31rd0

@Troll_13

https://t.co/mdiG6zNxyK CTFing with https://t.co/hldWPkzR0Q HackerOne Brand Ambassador for Greece https://t.co/zg77SukAG2

Katılım Ocak 2012
531 Takip Edilen692 Takipçiler
W31rd0
W31rd0@Troll_13·
@hamidonsolo @capablanca_h1 Once you get bounty and triage reputation shows. Only if you have a dupe you get the points when original report is resolved
English
0
0
0
34
W31rd0
W31rd0@Troll_13·
@_jensec i would disagree, the amount of hours you spent does not guarantee that you will have an income, especially one that you have set as goal,given there are many factors that can influence the payments
English
0
0
1
302
Jenish Sojitra
Jenish Sojitra@_jensec·
Biggest disadvantage of bug bounty is that your output (income) is tied directly to input(number of hours)
English
13
9
209
11.7K
W31rd0
W31rd0@Troll_13·
@yeswehack that you have limited control over the outcome of your reports :D
English
0
0
4
403
YesWeHack ⠵
YesWeHack ⠵@yeswehack·
What’s something you wish you’d learned earlier in Bug Bounty? 👇 #BugBountyTips
English
9
2
49
6.4K
W31rd0
W31rd0@Troll_13·
@offsecrunner i suppose if you are happy with the program overall its a good thing to do :)
English
0
0
1
113
Frey
Frey@offsecrunner·
@Troll_13 Thanks It's on h1 for now I informed them, as of good faith
English
1
0
0
369
Frey
Frey@offsecrunner·
Hey folks need some advice. I reported a bug in an API endpoint it got patched and I was asked to re-test. During retesting, I found a different bypass on the same endpoint but it’s a different vulnerability category. Should I disclose it now or wait and report it after payment?
English
5
0
27
4.6K
I am Jakoby
I am Jakoby@I_Am_Jakoby·
Im doing a demo for threatlocker in 20 min The last stage of my job interview is at 2:30 God please recognize my hard work and bless me with these opportunities I am so fucking nervous. Im scared. Im hopeful. God please. 3 years straight ive been grinding everyday. Through hells most people cant imagine. Please I need this.
English
32
3
241
27.7K
W31rd0
W31rd0@Troll_13·
@I_Am_Jakoby those avg bounties per severity are all over the place. looks weird
English
0
0
1
277
I am Jakoby
I am Jakoby@I_Am_Jakoby·
🤬🤬🤬🤬🤬🤬🤬🤬🤬🤬 finally broke the 3 day dry spell find a HIGH just to see their program is paused and they are offering $25 for it didnt even cover my stress induced door dash delivery lol 🙍‍♂️💥🔫 ima go to bed and pretend i dreamt this whole hunt
I am Jakoby tweet media
English
11
0
86
9.1K
W31rd0
W31rd0@Troll_13·
@0xw2w HackerOne should be shaping the industry instead of "following" it, by leading and pushing for better rewards/treatment for researchers. claiming such actions are standard for mature programs feels even weirder
English
0
0
9
555
Max Yaremchuk
Max Yaremchuk@0xw2w·
Here's HackerOne's official response to this matter. /security sets an example of best platform practices, and H1 admits to bounty benchmarking against undisclosed programs “to make sure it is fair and competitive,” which "does not reflect a reduced commitment to researchers."
Max Yaremchuk tweet media
Max Yaremchuk@0xw2w

FYI Spotify H1 bug bounty program has decreased High and Critical bounties by 60% (there was no prior promotions). HackerOne's security program has decreased Mediums, Highs and Crits by 40%. To add to that, the $ devaluation to € was 17% in the past year. Let that sink in...

English
7
0
43
7.9K
W31rd0
W31rd0@Troll_13·
@zseano there were layoffs recently, probably reallocating budget to new products/services AI related
English
0
0
0
1.5K
zseano
zseano@zseano·
uh... why are loads of staff leaving hackerone? what's going on?
English
13
3
162
39.5K
W31rd0
W31rd0@Troll_13·
@zack0x01 understood, but i suppose collabing needs to built some trust first. and to put some time together to get those cool bugs. its not easy for sure
English
0
0
1
111
W31rd0
W31rd0@Troll_13·
@zack0x01 you can always add someone as a collaborator and give them a small % if they pointed you to a target that landed you a bug and maybe they ll return the favor
English
2
0
3
700
Touba ahmed
Touba ahmed@Toubaahmed59·
Thank you everyone for your kind wishes. Your support means a lot. I’ll come back stronger 💪🙏
English
40
19
860
33K
W31rd0
W31rd0@Troll_13·
@pR0MinD σωστος, και κανει και μετα κινηση οταν βλεπει οτι θα παρει το σουτ ο τσεριν ενω ο ρενατο τα χωνε στον σβι διχνει χαρακτηρα και διψα
Ελληνικά
1
0
2
92
Error 404
Error 404@pR0MinD·
To point δεν ειναι αν ειναι αργός ή γρήγορος ούτε ο Ταμπόρδα ούτε ο Μπακασέτας Είναι οτι ο ένας ΨΗΝΕΤΑΙ ΝΑ ΠΑΙΞΕΙ και ο αλλος οχι Το παιδί απλά ΘΕΛΕΙ να παιξει. Γιαυτό,στο σύνολο τον βαριεστημένων υπαλλήλων που λέγονται ποδοσφαιριστές του #paofc ξεχωρίζει σαν τη μύγα μεσ'το γάλα
Ελληνικά
2
2
31
1.6K
Error 404
Error 404@pR0MinD·
Σε αυτά τα 2 στιγμιότυπα βλέπουμε τον "αργό" Ταμπόρδα να ξεκινάει 20 μέτρα πίσω από τον Μπακασέτα και να φτάνει 15μέτρα μπροστά του πατώντας περιοχή σε ~6'' #paofc
Error 404 tweet mediaError 404 tweet media
Ελληνικά
8
15
170
13.6K
W31rd0
W31rd0@Troll_13·
@Bl4ckSec shouldn't this be Critical? or i am missing something
English
1
0
5
845
Black
Black@Bl4ckSec·
🔴 IDOR Vulnerability Discovered an IDOR vulnerability in the Forgot Password feature. The issue is that the password reset token is not properly bound to the account email. An attacker with a valid reset token could change the password of another user’s account due to improper token validation. Example request structure: { "email": "victim@example.com", "newPassword": "NewPassword123!", "token": "VALID_RESET_TOKEN" } #bugbountytip #hackerone #infosec #BugBounty #Hacking
Black tweet media
English
3
8
239
7.9K
Perry Pantelios
Perry Pantelios@perpant·
@triapentedyo Κυκλοφόρησαν τα εισιτήρια? Κι αν ναι,απο που τα προμηθευόμαστε?
Ελληνικά
1
0
1
440
3-5-2
3-5-2@triapentedyo·
Έγινε το τεστ την περασμένη εβδομάδα και πήγε εξαιρετικά, παρά τον καιρό. Πάλι στο ΟΑΚΑ το ματς στις 5/2, αυτήν την φορά με διαφορετική τιμολογιακή πολιτική. €20 στο κέντρο (€30 / €40 απέναντι) €12 στα πέταλα / κόρνερ Ταπεινή μου άποψη: κακή ιδέα.
Panathinaikos A.C.@acpanathinaikos

pao1908.com/nea/pame-gia-t…

Ελληνικά
5
1
48
13.5K
W31rd0 retweetledi
Phillip Wylie
Phillip Wylie@PhillipWylie·
To help celebrate @arcanuminfosec Information Security's two-year anniversary, @Jhaddix gave me 5 codes good for any Arcanum course to give away! Winners will be announced on 1/22. 👍 1 Like = 1 Entry! ♻️ 1 Share = 2 Entries!
Phillip Wylie tweet media
English
60
373
641
19.1K
W31rd0
W31rd0@Troll_13·
Kicking off the New Year the right way 🚀 We’re launching a new hacking meetup with a public @Hacker0x01 program, for the Greek community 🇬🇷 All bounties are doubled—up to $20K for criticals! 📅 Starts Feb 23 More information below: 👉 h1.community/e/m29dgj/ #bugbounty
English
1
0
1
152
bugcrowd
bugcrowd@Bugcrowd·
If you had to choose: Which gift would you pick? 👇🎁 Choose wisely👀
bugcrowd tweet media
English
135
8
120
11.3K
W31rd0 retweetledi
Adam Langley
Adam Langley@BuildHackSecure·
I did have a target of getting to 10k followers by the end of the year, not sure why, it's just a nice round number. Only 195 to go, if you like web app security, CTF or full stack dev give us a follow, if you already follow give us a share 🙏
English
2
9
31
4.7K
Alexandrio
Alexandrio@alexbindrei·
I won the Most Valuable Hacker award at H1 3120! 5 months ago I was invited to my first LHE where I achieved a 2nd place. It was an amazing experience that made me want to work harder to compete against myself. And after spending 15h a day in front of my laptop here we are :) Big thangs to @Hacker0x01 and @salesforce for all the work during this event. Also to all the amazing hackers I’ve met during this days. Last but not least… 🧵
Alexandrio tweet mediaAlexandrio tweet mediaAlexandrio tweet media
English
33
7
185
12.1K