whatever

198 posts

whatever

whatever

@__mutale__

#bughunter #pentester

Katılım Temmuz 2024
218 Takip Edilen38 Takipçiler
HackenProof
HackenProof@HackenProof·
Spot the Bug 🧠 Session restore helper What’s the issue in this code?👇
HackenProof tweet media
English
8
2
45
3.4K
Web Security Academy
Web Security Academy@WebSecAcademy·
Everyone who wants to learn: 1️⃣ XSS ↪️ SSRF 🤔 OWASP 🪟 DOM XSS 🔐 Auth bypass 💉 SQL injection 📁 File upload vulns 📦 GraphQL Hacking 🧰 Burp Suite Mastery 🧠 Business Logic Flaws 💔 Broken Access Control 🏴‍☠️ Real Exploit Techniques 💥 Much, much, much, more I hope you found this account.
English
14
124
1.4K
54.1K
whyusaa
whyusaa@w_n1rmala·
less than 30 days, i’ve earned over $7.000 from bug bounties (Shopify, TikTok, and others). today, Shopify awarded me $3,475 for a security finding. im 19 and this feels unreal. you dont need to be a “genius.” you just need to stay curious long enough. #bugbounty #hackerone
whyusaa tweet media
English
58
13
634
22K
chux
chux@chux13786509·
Hackers 🔥 Do you see the critical bug here?
chux tweet media
English
12
9
136
19K
whatever
whatever@__mutale__·
@devs_lyfe Depends on the effort bro. ...for an xss, yeah!!!!!!! But for rce on a multi-trillion dollar company????...18k can't even satisfy a help-desk
English
1
0
1
63
Het Mehta
Het Mehta@hetmehtaa·
Okay claude, now build me a tool that finds RCE in single scan
Het Mehta tweet media
English
6
10
149
9.7K
Intigriti
Intigriti@intigriti·
Your best tool for SQLi vulnerabilities? 😄
English
32
4
106
16.6K
HackingHub
HackingHub@hackinghub_io·
$5K on the line. 💰  3 minutes to find one bug. Which vuln class are you betting on? 👇
English
19
2
48
6.3K
whatever retweetledi
X
X@TheMsterDoctor1·
🚀 **Hack Like a Pro:** Extract IPs from Shodan HTML in Seconds! 🔥 Sick of digging through HTML? Let `grep` do the work! 💻 ```bash grep -oP '(?<=).*?(?=)' ip.html > ips ``` 1️⃣ **Save Shodan page source as HTML** 2️⃣ **Run this command** 3️⃣ **BOOM 💥** — All IPs extracted to `ips`! Master your toolkit! #KaliLinux #HackingTips #CyberSecurity #Shodan #OSINT
English
0
58
289
17.4K
whatever
whatever@__mutale__·
@thedawgyg I haven't yet used AFL++...what's the difference with ffuf, I come in peace🛀
English
1
0
1
196
dawgyg - WoH
dawgyg - WoH@thedawgyg·
ALF++ Customer Mutators.... Using one for the first time... Its incredible how much of a difference these little things make in the fuzzing campaign. No crashes yet on the new target (only been running for 20 hours, so thats expected). But added the custom mutators 30 mins ago, and they are doing very well finding new paths.
English
3
0
41
3K
dawgyg - WoH
dawgyg - WoH@thedawgyg·
@bumbukacan48228 thank you! both move to P1 this morning as well. And have a 3rd that should be S0/P1 xD
English
2
0
19
1K
Behi
Behi@Behi_Sec·
Good morning, guys. If you have any questions about bug hunting, feel free to ask.
English
37
3
93
6.9K
whatever
whatever@__mutale__·
@nav1n0x Sorry to ask but can u plz provide the github for ur payloads..it will help alot of people
English
0
0
0
3
N$
N$@nav1n0x·
Another day, another #SQLInjection. This time, it's in the User-Agent header, leading a full database takeover. Keep testing SQLi on everything and everywhere... #SQL #SQLinjection #BugBounty.
N$ tweet media
English
24
134
942
78.8K
whatever
whatever@__mutale__·
@thedawgyg did you at least put a rate-limit on the Agents before they achieve full autonomous bug bounty optimization? 😭
English
0
0
0
19
dawgyg - WoH
dawgyg - WoH@thedawgyg·
I gave the Agents access to all 3 of my fuzzing rigs. They are now controlling all 3 of them, putting the better harness on the others, and relaunching the campaigns on all machines lol. It has now taken over my distributed fuzzing network 😂😂😂
dawgyg - WoH@thedawgyg

After it wrote a better harness and proved my 3 bugs would trigger it, it killed all my running fuzzers and launched the new ones telling me it would have abetter chance of fidning bugs that way lol

English
2
0
12
2K
dawgyg - WoH
dawgyg - WoH@thedawgyg·
Waking up to a vuln from my Agent is the best possible outcome <3 it has a report and poc (html trigger + exploit) that works in production chrome waiting for me... this is gonna be fun
English
6
0
42
4.3K
whatever
whatever@__mutale__·
@thedawgyg Meanwhile I’m still manually refreshing my terminal like it owes me money.🤦‍♂️
English
0
0
3
114
dawgyg - WoH
dawgyg - WoH@thedawgyg·
'Watcher Agent' is now watching the afl-whatsup output (with watch updating every 2 seconds). and when any of the 50 fuzzer instances finds a crash, its going to let 'Triage Agent' know, who will use my trige scripts to validate the bug. Then pass it on to 'Exploit Dev Agent' to work on creating and verifying (with screen shots, asan traces, build commands etc) and providing me with a report on what to verify and where to submit lol
English
4
2
22
2.7K
Higinio “w0rmer” Ochoa
Emulator up, now to throw in frida. Pixel 8 AVD / google api/emu root Rawr.
Higinio “w0rmer” Ochoa tweet mediaHiginio “w0rmer” Ochoa tweet mediaHiginio “w0rmer” Ochoa tweet mediaHiginio “w0rmer” Ochoa tweet media
English
3
0
17
1.8K