Eib

849 posts

Eib banner
Eib

Eib

@eib_____

The World is Yours # Bug Bounty Blog @ https://t.co/ccm9ey1x1r

Katılım Ağustos 2024
430 Takip Edilen128 Takipçiler
Sabitlenmiş Tweet
Eib
Eib@eib_____·
I just achieved one of my 2025 goals by gaining my first private invite on Bugcrowd ✌️✌️✌️
English
0
0
8
737
Eib retweetledi
Jopraveen
Jopraveen@jopraveen18·
people are too busy in exploring chrome, kernel and other oss CVEs, meanwhile a DOMPurify bypass was silently dropped 👀 github.com/cure53/DOMPuri…
Jopraveen tweet media
English
3
70
407
17.6K
Eib
Eib@eib_____·
@F4tM4n2k Send a video poc, it works better
English
0
0
1
57
F4tM4n2k
F4tM4n2k@F4tM4n2k·
Got an RCE marked as Out of Scope because triage “couldn’t build the PoC file”. Meanwhile I had already documented almost every single step, note, and requirement needed to reproduce it. At this point I’m wondering if the vulnerability was harder to exploit… #RCE #bugbounty
F4tM4n2k tweet media
English
6
0
74
5.4K
Eib retweetledi
Intigriti
Intigriti@intigriti·
Our first official Burp Suite extension is live! 🤠 Intigriti Quick Scope (IQS) fetches all your public & private programs directly from the Researcher API and auto-configures your Burp scope, and mandatory request headers with a single click! 😎 Get it now in the BApp Store! 👇 go.intigriti.com/get-iqs-bapp
Intigriti tweet media
English
5
25
187
12K
Rohan.exe 🖤
Rohan.exe 🖤@roohaa_n·
How u guys are using AI for bugbounty just curious to know about it or is there any blog or youtube channel :)
English
6
0
88
9.1K
Eib retweetledi
zseano
zseano@zseano·
i'm taking a pause from hacking to resume building bugbountyhunter.com. i regret closing it down and I shouldn't of done it. everything will be back online EXACTLY as it was very soon and i've got some big plans for the future. and yes, that includes zseano methodology v2 ;)
English
43
53
640
24.3K
Eib retweetledi
Abhi Sharma 𝕏
Abhi Sharma 𝕏@a13h1_·
One thing I’ve observed while doing bug bounty: It’s not always about learning more tools or techniques. Often, the difference comes from how deeply you analyze a feature. The same endpoint, tested with different perspectives, can lead to completely different findings. #bugbounty
English
1
3
41
1.4K
Eib retweetledi
Ridwan Adebayo
Ridwan Adebayo@RadoGold57·
Check this out. @cyberrado57/exploiting-supabase-misconfigurations-authentication-bypass-and-privilege-escalation-for-1-800-f20d02557e47" target="_blank" rel="nofollow noopener">medium.com/@cyberrado57/e…
English
4
8
149
5K
Eib retweetledi
Robert Greene
Robert Greene@RobertGreene·
Always stick to what makes you weird, odd, strange, different. That’s your source of power.
English
185
1.6K
9.3K
177.1K
Eib retweetledi
James Kettle
James Kettle@albinowax·
We've launched a new @WebSecAcademy topic on exploiting AI-powered security scanners! Learn how to use indirect prompt injection to steal data, cause damage & trigger exploit chains!
James Kettle tweet media
English
19
135
910
37.9K
Eib retweetledi
3NVZ | Robert S.
3NVZ | Robert S.@YourFinalSin·
Here is a payload which might work for you, if you got an XSS, but it's blocked by Cloudflare WAF💥 Was able to bypass Cloudflare WAF with this and escalated it ultimately to ATO!
3NVZ | Robert S. tweet media
English
1
19
210
9.7K
Eib retweetledi
Intigriti
Intigriti@intigriti·
friendly reminder 🙃
Intigriti tweet media
English
12
26
252
8.2K
Eib retweetledi
Robert Greene
Robert Greene@RobertGreene·
Let others worry about being socially acceptable; those types are a dime a dozen, and you are after a power greater than they can imagine.
English
56
233
2.1K
38.3K
Eib retweetledi
ArtSec
ArtSec@_ArtSec_·
ROOT FOR YOUR FRIENDS
English
1
1
11
489