sh
142 posts

sh retweetledi

Giveaway and new course 🚨
I just released a nuclei course and we have made it a part of our Black Friday bundle. You can get all of our courses for the price of one.
🎁I’ll give some away. All you gotta do is RT & reply with which bundle you want!
hhub.io/BugBountyBundl…

English
sh retweetledi

🚨 Doing a giveaway for my Blind XSS Masterclass
Most people think they know XSS, until they meet blind XSS, the kind that fires where you’ll never see it.
Same methods that helped me earn $250K+ from real reports. hhub.io/nahamsecbxss
🎁 Retweet and reply to enter.

English

$1,000 GIVEAWAY 🎁‼️
Here’s how to enter:
1️⃣ Fill out the ITMOAH survey
2️⃣ Like this post
3️⃣ Comment your fave tool
4️⃣ Repost bc your friends deserve a chance too
Giveaway closes Sept 30 at 11:59pm ET. One hacker takes home $1K. 20 others will score $200 each. Already filled out the survey? You’re entered to win!
If not, now's your chance: surveymonkey.com/r/bugcrowd-itm…


English
sh retweetledi

#bugbountytips Bypass CloudFlare Rate-Limit
Ever struggled with CloudFlare rate-limiting when brute-forcing endpoints during your bug bounty research?
A simple yet effective bypass is right there in CloudFlare’s documentation — specifically, leveraging the _cfuvid cookie.
1. Send initial requests to your target domain (e.g., target.example.com) to generate multiple _cfuvid cookies.
2. Save these cookies. Remember that _cfuvid cookies are bound to both IP address and user-agent, so ensure consistency to maintain cookie validity.
3. Randomly use the collected cookies when performing endpoint enumeration at scale (e.g., with 1000 threads).
This technique helps you avoid hitting rate limits, significantly improving your enumeration process.
#bugbounty #CFbypass #cloudflare

English
sh retweetledi

Someone posted on Twitter about a CTF where you could use "." in the protocol now. So I fuzzed it:
shazzer.co.uk/vectors/6819f0…
Let me know if it was you and I'll update the description with the link. I couldn't find it anywhere.
English
sh retweetledi

Bug bounties ain't just web. Throwback to when @kernelpaniek and I got RCE on Steam Client via a buffer overflow in Server Browser 🚨
Root Cause:
🎯 Wide-char conversion without boundary checks inside serverbrowser.dll leading to stack corruption
Exploit:
🪲 Crafted oversized Unicode player name payload
🪲 Unicode-compatible ROP chain built from Steam.exe gadgets
🪲 Dynamic call to VirtualProtect to mark stack executable
🪲 Shellcode launches cmd.exe
Impact:
💥 Remote code execution (RCE) on Windows
🤔 Partial control on Linux (2 bytes of EIP)
🤔 SIGABRT on macOS (due to canaries)
Delivery:
📦 User tries to connect to a CS game via Steam client
📦 User visits malicious webpage triggering Steam protocol handler
Tools:
🛠️ Python for UDP server and payload generation
🛠️ Immunity Debugger for base address retrieval
🛠️ Steam Server Query documentation for packet crafting
Read the full report: hackerone.com/reports/470520

English
sh retweetledi

I'm very happy to finally share the second part of my DOMPurify security research 🔥
This article mostly focuses on DOMPurify misconfigurations, especially hooks, that downgrade the sanitizer's protection (even in the latest version)!
Link 👇
mizu.re/post/exploring…
1/2
English
sh retweetledi

Introducing the Cookie Sandwich, a tasty technique to steal HttpOnly cookies using legacy RFC features: portswigger.net/research/steal…
English
sh retweetledi

BEAST GAME EPISODE 3 IS OUT NOW!
To celebrate, I'm giving away $100,000 total to 10 random people who like and retweet this post!
Go watch it here: amazon.com/beastgames
English
sh retweetledi

I recently developed and posted about a technique called "First sequence sync", expanding @albinowax's single packet attack.
This technique allowed me to send 10,000 requests in 166ms, which breaks the packet size limitation of the single packet attack.
flatt.tech/research/posts…
English
sh retweetledi

⚠️ Giveaway ⚠️
Want to learn modern reconnaissance and hacking skills?
Join The Bug Hunter's Methodology Cohort 5!
October 2nd, 3rd, 4th -
jhaddix.gumroad.com/l/kihwd
Like and retweet this post for a chance to win a free seat! Five winners will be announced on Sept 1st!
English





