IronCardinalSecurity

1.5K posts

IronCardinalSecurity banner
IronCardinalSecurity

IronCardinalSecurity

@ironCardSec

Pentesting using AI and Automation. ReconKit Early Access👉👉👉https://t.co/LcytdpKLk5👈👈👈

Katılım Aralık 2024
680 Takip Edilen741 Takipçiler
Sabitlenmiş Tweet
IronCardinalSecurity
IronCardinalSecurity@ironCardSec·
Our solution to the incredibly monotonous recon tasks at the beginning of Bug Bounties is now live as a pre release beta! Access here! palomasecurities.com Run fast, proof‑based recon on authorized bug bounty targets and get a clean, exportable summary in minutes. I have done a ton of testing and using this myself and I personally love it, any feedback or roasts are appreciated, let me know what I missed!
English
1
0
18
2K
Abhi
Abhi@AbhiX10010·
Heartfelt thanks to my 1,000 followers! Your support means the world. Excited for what's next! 🙌
Abhi tweet media
English
2
1
9
209
RoHiT
RoHiT@Dedrknex·
Found a very cool bug leaking PII of users /Abc/cart/current/1234 authenticated 200 Ok /Abc/cart/current/1938/ 401 /Abc/cart/anonymous/1938 200 OK Response: anonymous| email : test@xym,phone number, name, address etc!!
RoHiT tweet media
English
9
3
159
4.7K
Hike
Hike@hackrkid·
Made a report on the bugcrowd platform today, please don't be a N/A or duplicate 🙏 Got the idea for this bug during my sleep
Hike tweet media
English
6
0
61
5K
.
.@696e746c6f6c·
I was awarded a $2,500 bounty on @Hacker0x01 by TikTok. Long time no see TikTok. Still feels like a good comeback.
. tweet media
English
3
2
179
4.3K
Olajeedae Jr 🇳🇬
Olajeedae Jr 🇳🇬@r007User·
Opened my HackerOne account in 2023, haven't hunted on the platform since then. Took a long break. Back now. Now we wait.
Olajeedae Jr 🇳🇬 tweet media
English
8
2
92
5.1K
Hugo Picanzo
Hugo Picanzo@hugopicanzo·
It’s oficial - I suck at Bug Bounty hunting :/
English
14
2
50
4.5K
Patrickbatman
Patrickbatman@hamidonsolo·
Two characters broke an entire platform. ../ That's it. That's the payload. for $2,500. I put a path traversal in a URL hash fragment — the # part that the server never sees. No WAF caught it. No server log recorded it. No security tool flagged it. Because the attack only existed in the browser. JavaScript parsed the hash. Built an API request with it. Zero validation. I redirected it to the email change endpoint. One click: → Victim's email changed to mine → Password reset sent to my inbox → Full account takeover → Every secret in the system leaked → Victim locked out permanently I almost didn't test this feature. It looked boring. Nothing interesting. I was about to close Burp and go to bed. Glad I didn't. $2,500. I wrote the full story — the 1am discovery, the chain, the severity fight, and why the boring features are where the best bugs hide. Full writeup ↓ patrickbatman.hashnode.dev/how-i-took-ove…
English
18
42
324
17.2K
IronCardinalSecurity retweetledi
IronCardinalSecurity
IronCardinalSecurity@ironCardSec·
Check out our ReconKit Pro Demo at the attached link! palomasecurities.com/recon/ReconKit… I’ve been very blessed lately leveraging recon from this tool into reportable findings! Check it out if you have the time!
IronCardinalSecurity tweet media
English
1
2
7
868
IronCardinalSecurity
IronCardinalSecurity@ironCardSec·
Happy Blessed Friday! Was able to kick it off with a hardcoded API token found in public JS🤞🙏 Big recon assist with Pro palomasecurities.com!
IronCardinalSecurity tweet media
English
3
1
57
1.5K
DuckywantDucky
DuckywantDucky@DuckyWantDucky·
Day 112/365 of the Until get 10.0 Critical report 📤 Reports Submitted:- 1 🟠 triaged - 1 🟦 new status - 0 🟤 Duplicate - 0 🟣 New -0 💰 Paid - 0 💻 Worked- 11 HOUR #BugBounty
English
2
0
21
848
SickSec 🇲🇦 🇵🇸
SickSec 🇲🇦 🇵🇸@OriginalSicksec·
Built an MCP server for HackerOne — search your reports, read triage conversations, check program scope, analyze your hunting patterns, and track earnings. Works with any MCP-compatible client github.com/Sicks3c/hacker…
SickSec 🇲🇦 🇵🇸 tweet media
English
5
8
140
6.3K
0xZyo
0xZyo@Zierax_x·
Hi,hackers Now I am officially a security researcher, my latest research have been accepted in IEEE AIITA'26 "PTRR: A Metacognitive Framework for Measuring and Mitigating Automation Bias in AI-Assisted Vulnerability Research" I hope you find it well <3 doi.org/10.5281/zenodo…
0xZyo tweet media
English
6
1
28
1.7K
Ertugrul
Ertugrul@ertugrulphp·
The company has over 10m users and the annual premium plan is $80 "Reports that do not relate to legitimate data privacy or security concerns may be accepted as Informational, but will not be rewarded"
Ertugrul tweet media
English
4
0
110
7.8K