Wr4ith

32 posts

Wr4ith banner
Wr4ith

Wr4ith

@Xg0d_

Earth Katılım Haziran 2022
200 Takip Edilen6 Takipçiler
Wr4ith retweetledi
Deepak bug_vs_me
Deepak bug_vs_me@bug_vs_me·
Nothing is Unhackable, change my mind
English
1
1
12
580
Wr4ith
Wr4ith@Xg0d_·
@YourFinalSin Same bro reported 11 days ago and still no response on bugcrowd 🥲
English
1
0
1
238
3NVZ
3NVZ@YourFinalSin·
Is it just me or do various bug bounty platforms feel increasingly worse? First response and triage experience has gone downhill big time. I have multiple P2/High severity reports that are 15-30 days old that weren’t even looked at by triage yet..
English
7
0
46
2.4K
Wr4ith retweetledi
Behi
Behi@Behi_Sec·
No bugs = keep going. Duplicate = keep posting. N/A = keep learning. Informative = keep going. Don't stop for nothing!
English
3
23
191
3.9K
Wr4ith retweetledi
Behi
Behi@Behi_Sec·
Recon is boring. Reading the API docs is boring. Testing every single edge-case you know is boring. If you want to find bugs, do boring.
English
10
32
266
8.6K
Wr4ith
Wr4ith@Xg0d_·
@zseano Bug bounty dead? Bro I just switched to selling undetectable game cheats 💀 way more profit, less headache
English
1
0
11
1.8K
zseano
zseano@zseano·
Sooooo what’s everyone doing when bug bounties is dead? 😅
English
75
16
392
35.9K
Wr4ith retweetledi
RogueSMG
RogueSMG@RogueSMG·
Claude is down. My Agentic AI friends, have faith.
GIF
English
0
1
6
670
Wr4ith
Wr4ith@Xg0d_·
@AadityaSingh771 i think u can also use --break-system-packages correct me if i am doing something wrong
English
0
0
0
12
Wr4ith retweetledi
Behi
Behi@Behi_Sec·
Use this prompt for a thorough JS analysis: You are an expert JavaScript reverse engineer and code analyst. I will provide you with a JavaScript file. Perform a structured analysis with the following objectives: ## 1. High-Level Overview - What is this code's purpose? - Architecture pattern - Key dependencies and frameworks used - Execution flow: how does the code initialize and what is the main entry path? ## 2. Attack Surface & Endpoints Extract and list ALL of the following in structured tables: | Category | Examples to look for | |-----------------------|---------------------------------------------------------| | API routes/endpoints | paths, HTTP methods, route patterns | | Parameters | query params, body fields, URL params, headers expected | | Auth mechanisms | tokens, cookies, session logic, OAuth flows, API keys | | WebSocket events | event names, channels, message schemas | | External calls | fetch/axios URLs, third-party APIs, webhook targets | ## 3. Hidden & Interesting Artifacts Look beneath the surface for: - Hardcoded strings: URLs, IPs, hostnames, ports, internal service names - Environment variables referenced (process.env.*) - Database schemas, table/collection names, field names - Role names, permission levels, feature flags - Debug/admin/test routes or commented-out functionality - Error messages that reveal internal structure - Regex patterns (what are they validating/extracting?) - File system paths (uploads, logs, configs, temp dirs) ## 4. Data Flow Map Trace how user input moves through the code: - Entry point (where does external data come in?) - Transformations (parsing, validation, sanitization, or lack thereof) - Storage (where does it end up: DB, file, cache, external service?) - Output (what gets returned/rendered to the user?) ## Formatting Rules - Use tables for structured data (endpoints, params, env vars) - Use code snippets with line references for each finding - Flag anything that seems intentionally obscured or unusual - If the code is minified/obfuscated, note patterns and attempt to identify the original framework or library --- Here is the code:
English
1
41
263
10.1K
Wr4ith retweetledi
Behi
Behi@Behi_Sec·
The more time you spend on a target, the higher your chances of finding bugs. However, very few people are willing to spend weeks or even months just to understand how an application truly works.
English
3
6
107
3K
Wr4ith retweetledi
Behi
Behi@Behi_Sec·
Bug hunting is straightforward. - Read the documentation. - Use the target platform as a customer. - Analyze HTTP requests. - Consider the logic behind features. - Ask Opus 4.6 to threat model the target. Don't overcomplicate it.
English
9
27
312
10.2K
Wr4ith retweetledi
⚡🌌🌌teslatheg0d🌌🌌⚡
"You learn more from failure than from success. Don't let it stop you. Failure builds character."
English
4
7
121
3.1K
Wr4ith retweetledi
Manliness Norms ⚡
Manliness Norms ⚡@ManlinessNorms·
Man to man.
Manliness Norms ⚡ tweet media
English
55
3.2K
44.4K
938.5K
Ben Sadeghipour
Ben Sadeghipour@NahamSec·
I'm hosting one final giveaway for my "Bug Bounty Essentials" with over 20 hours of content and 100+ labs. All you have to do is drop a 🧑🏽‍💻 under this tweet to enter! Winner will be announced on December 31. Or purchase it directly on @hackinghub_io for 30% off 👉🏼 hhub.io/eoybbex
Ben Sadeghipour tweet media
English
295
24
243
26.6K
Wr4ith
Wr4ith@Xg0d_·
@tabaahi_ Honestly, nothing held me back except me. I knew the path worked — I just didn’t walk it consistently. 2026 is about discipline, not motivation
English
0
0
7
518
Mohsin Khan
Mohsin Khan@tabaahi_·
What held you back from reaching your bug bounty goals in 2025 and what will you change in your approach in 2026?
English
16
2
73
11.8K
Younis Jabr
Younis Jabr@Younis_J_·
@GladiatorXg0d @zack0x01 Thanks a lot i start just reading reports just to have knowledge about what it look like ...and i start to do testing ... I will increase my knowledge throw reports and do testing in the same time🖤
English
1
0
1
33
Wr4ith
Wr4ith@Xg0d_·
@Younis_J_ @zack0x01 Stop over preparing. Pick one target, map the actual flows, and test daily even if it feels messy. Write-ups teach patterns, but real bugs come from touching the app. Consistency > knowledge.
English
1
0
1
27