Sabitlenmiş Tweet
Eib
849 posts

Eib
@eib_____
The World is Yours # Bug Bounty Blog @ https://t.co/ccm9ey1x1r
Katılım Ağustos 2024
430 Takip Edilen128 Takipçiler
Eib retweetledi

people are too busy in exploring chrome, kernel and other oss CVEs,
meanwhile a DOMPurify bypass was silently dropped 👀
github.com/cure53/DOMPuri…

English
Eib retweetledi
Eib retweetledi

New redirect tricks from @castilho101 just dropped 🥷
ethiack.com/news/research/…
English

Got an RCE marked as Out of Scope because triage “couldn’t build the PoC file”.
Meanwhile I had already documented almost every single step, note, and requirement needed to reproduce it. At this point I’m wondering if the vulnerability was harder to exploit…
#RCE #bugbounty

English
Eib retweetledi

Our first official Burp Suite extension is live! 🤠
Intigriti Quick Scope (IQS) fetches all your public & private programs directly from the Researcher API and auto-configures your Burp scope, and mandatory request headers with a single click! 😎
Get it now in the BApp Store! 👇
go.intigriti.com/get-iqs-bapp

English
Eib retweetledi

i'm taking a pause from hacking to resume building bugbountyhunter.com. i regret closing it down and I shouldn't of done it. everything will be back online EXACTLY as it was very soon and i've got some big plans for the future. and yes, that includes zseano methodology v2 ;)
English
Eib retweetledi

We've just released a high fidelity scanner for CVE-2026-41940 (cPanel/WHM authentication bypass). All public PoCs so far lead to false negatives, and are not reliable. @SLCyberSec's research team's notes on this here: slcyber.io/research-cente… & tool here: github.com/assetnote/cpan…
English
Eib retweetledi

"I'm still not an automation guy...it's not my style." - @ozgur_bbh
Ozgur Alp joins WE'RE IN to share his views on AI and how he became a full-time independent security researcher: open.spotify.com/episode/7IQbxh…

English
Eib retweetledi

One thing I’ve observed while doing bug bounty:
It’s not always about learning more tools or techniques. Often, the difference comes from how deeply you analyze a feature. The same endpoint, tested with different perspectives, can lead to completely different findings.
#bugbounty
English
Eib retweetledi

Check this out. @cyberrado57/exploiting-supabase-misconfigurations-authentication-bypass-and-privilege-escalation-for-1-800-f20d02557e47" target="_blank" rel="nofollow noopener">medium.com/@cyberrado57/e…
English
Eib retweetledi
Eib retweetledi

We've launched a new @WebSecAcademy topic on exploiting AI-powered security scanners! Learn how to use indirect prompt injection to steal data, cause damage & trigger exploit chains!

English

I've been learning a lot of new techniques by reading Synack exploit explained blogs
synack.com/exploits-expla…
English
Eib retweetledi
Eib retweetledi
Eib retweetledi

Chained CSPT into full account takeover using a 2FA bypass technique I hadn't seen used in bug bounty before.
whoareme.com/blog/cspt-acco…
English
Eib retweetledi

@intigriti I'm going to self plug a relevant one here😁 saurinn.github.io/blog/xxe-oob-v…
English
Eib retweetledi
Eib retweetledi








