iQimpz

627 posts

iQimpz banner
iQimpz

iQimpz

@iqimpz

Full-Time Bug Bounty | Christian | https://t.co/lqwI4J261E

Katılım Kasım 2020
226 Takip Edilen1.3K Takipçiler
iQimpz
iQimpz@iqimpz·
@ArchAngelDDay Option 1 💯. Option 2 doesn’t sound fun tbh👀
English
0
0
1
225
Douglas Day
Douglas Day@ArchAngelDDay·
Would you rather - be the best bug hunter in the world (earnings-wise), but have no one know it. - be a top 100 hunter in the world and have 100k+ followers 🤔🤔🤔
English
22
0
77
9.4K
N0xi0us
N0xi0us@_N0xi0us_·
Excited to reach 20k rep on @Hacker0x01 Time to keep cooking 🧑‍🍳
N0xi0us tweet media
English
15
0
122
2.7K
iQimpz retweetledi
sebsrt
sebsrt@s3bsrt·
I’ve been digging into HTTP Trailers and found some new smuggling techniques: sebsrt.xyz/blog/trailing-…
English
4
103
405
40K
iQimpz retweetledi
spaceraccoon | Eugene Lim
spaceraccoon | Eugene Lim@spaceraccoon·
Vulnerability-spoiler-alert has detected its first two live “negative-days” in Grafana! CVE-2025-41117 (XSS) and CVE-2026-21722 (Privesc) are still unpublished right now, but is detectable via commits in the open-source repo. That’s at least 1 hour early. PoCs and more at vulnerabilityspoileralert.com
spaceraccoon | Eugene Lim tweet mediaspaceraccoon | Eugene Lim tweet mediaspaceraccoon | Eugene Lim tweet mediaspaceraccoon | Eugene Lim tweet media
English
0
26
204
12K
iQimpz retweetledi
PortSwigger Research
PortSwigger Research@PortSwiggerRes·
Voting is now live for the top ten web hacking techniques of 2025! Grab a coffee, browse the 61 quality nominations and cast your vote on the most creative and ground-breaking techniques: portswigger.net/polls/top-10-w…
English
1
33
139
52.1K
iQimpz retweetledi
GMO Flatt Security Inc.
GMO Flatt Security Inc.@flatt_sec_en·
We've published a new blog post by RyotaK @ryotkak He discovered 8 methods to bypass safety mechanisms in Claude Code, leading to arbitrary command execution. We recommend updating to v1.0.93 or later to fix this vulnerability (CVE-2025-66032). flatt.tech/research/posts…
English
3
83
240
62K
iQimpz
iQimpz@iqimpz·
@monkehack We on the same page this week! I’ve been closing those “open loops” and figuring out where AI fits into my workflows.
English
0
0
1
74
iQimpz retweetledi
Jenish Sojitra
Jenish Sojitra@_jensec·
Sharing my Burp Extension that earned me $200k in 2025 while API testing heavy JS-rich targets. github.com/jenish-sojitra… The tool helps find endpoints, files, internal emails, and some secrets from minified JS. Its goal is to achieve maximum efficiency with reduced noise in results. Contributions and feedbacks are welcome.
Jenish Sojitra tweet media
English
39
411
2.3K
125.2K
Ciarán Cotter
Ciarán Cotter@monkehack·
my 2025, in review: - shattered my income goals by a huge margin - adopted 2 stupid cats (I love them) - 5 LHEs, 4 awards at LHEs - 1600 day duolingo streak with 90 perfect weeks in a row so far - 2200 day journalling streak - started taking guitar lessons and going to therapy - spoke at Nahamcon, Bsides Dublin, HackAICon and the Irish government's conference - visited Australia, NZ, Mexico, Taiwan, Japan, Vegas, and more - newsletter almost at 1,000 subs crazy year. here's to a good 2026! #bugbounty #rewind
English
9
0
129
9K
iQimpz retweetledi
shubs
shubs@infosec_au·
Great blog from @elttam's team diving into the ORM leak vulnerability class! I don't see many other writeups about this, but it's super interesting and worth remembering/looking for next time you're looking at code with no manually concatenated SQL - elttam.com/blog/leaking-m…
English
3
35
175
15.1K
iQimpz retweetledi
kiddo
kiddo@kiddo_pwn·
My very first blog post is live: kiddo-pwn.github.io/blog/2025-11-3… During research, I've run into and documented a simple universal SQLite Injection RCE trick. Enjoy! N-day Analysis about Synology Beestation RCE (CVE-2024-50629~50631) by legendary DEVCORE 🎃 🍊 Thanks to @u1f383 @orange_8361 for original finding and allowing to post, and to @the_emmons for the invaluable references 🔥 Enjoy the Demo! PoC: github.com/kiddo-pwn/CVE-…
English
13
113
417
33K
iQimpz retweetledi
watchTowr
watchTowr@watchtowrcyber·
The watchTowr Labs team is back, providing our full analysis of the Oracle E-Business Suite Pre-Auth RCE exploit chain (CVE-2025-61882). Enjoy with us (or cry, your choice..) labs.watchtowr.com/well-well-well…
English
5
136
383
96.2K