Nichrome..

39 posts

Nichrome..

Nichrome..

@om33iii

Katılım Ocak 2026
41 Takip Edilen3 Takipçiler
Nichrome..
Nichrome..@om33iii·
@0xOmeiza If you find the entry let me know I’d do it for free i wanna be the minion in a ransomware group..
English
0
0
0
9
Het Mehta
Het Mehta@hetmehtaa·
Gun pointed at your head, name a vulnerability.
English
23
0
23
5.8K
Nichrome..
Nichrome..@om33iii·
@hetmehtaa 😂😂😂 what the f who talks like that... May be Ass-lickers.
English
0
0
1
27
Het Mehta
Het Mehta@hetmehtaa·
This website turns your text to Linkedin style post lmao
Het Mehta tweet media
English
8
1
20
2.5K
Nichrome..
Nichrome..@om33iii·
@thedawgyg @_lopseg_ Bug bounty platforms talk about ethics but can’t even handle a $10k payout without delays and excuses and then wonder why hackers go down the wrong path. Seriously I have found anything like that I have just exploited them 😜😜
English
0
0
2
78
dawgyg - WoH
dawgyg - WoH@thedawgyg·
Now this does have its caveats tho. For example: If you are selling 0days/vulnerabilities in web apps, then there are laws that would make it illegal. Since even testing in any way violates the CFAA (here in the US), and the only thing that protects you from the CFAA is the Rules of Engagement of the program. All of which will say you cant sell/disclose the info to anyone else without thier permission. So if you do it for a web app (or API) then you can get in trouble. However, when you are talking about 0days in open source software that you download onto your own system, and test on your own system(s) you are not violating any law if you then sell that information to another person, since in order to violate CFAA, you have to attack systems you down own or have permission to attack, and well you have permission to attack your own system since its yours.
English
1
0
5
618
dawgyg - WoH
dawgyg - WoH@thedawgyg·
3 weeks of complete radio silence since giving the Chrome team the RCE exploit... And people wonder why some choose to sell to exploit brokers instead lol
English
17
8
220
18.4K
zack0x01
zack0x01@zack0x01_·
I see some vdp hackers , calling themselves:bug bounty hunters 😂 Where is the bounty!!
English
19
4
104
5.9K
ergo
ergo@UNIXTCPIP·
@aussinfosec Bug bounty is so cucked. Not real hacking
English
3
0
2
1.1K
Griffin
Griffin@aussinfosec·
I have been doing bug bounty since 2011 and ran a program for a multinational bank. Put everything I've learned into bugbounty.info. Target selection, recon pipelines, chain patterns, report templates, the business side. Free, no paywall, no course upsell.
English
27
161
971
48.8K
Nichrome..
Nichrome..@om33iii·
@0xOmeiza Isn't it super hard to find the bug that have direct fund related impact ??? Like something where a user can steal the money 💰
English
0
0
0
93
Omeiza (💻,🧑‍🔧)
im not a blackhat hacker neither do i support their acts. im only pointing out the current state of the web3 security industry.
English
3
1
24
2.1K
Omeiza (💻,🧑‍🔧)
> be a blackhat > find a vulnerability > exploit the vulnerability > steal funds > return 90% > become whitehat
English
29
33
526
25K
Nichrome..
Nichrome..@om33iii·
@0xOmeiza Why return.. just take the risk exploit and take the money..
English
1
0
0
304
Nichrome..
Nichrome..@om33iii·
@AegisTrail @Hacker0x01 It’s only a matter of time before we start seeing new blackhat groups emerge and all this AI hype won’t matter then When systems feel stacked people stop caring about ethics and start thinking about survival Love to join any blackhat group If i ever have the chance
English
0
0
2
143
n4r35h
n4r35h@AegisTrail·
@Hacker0x01 When white hats feel the legal system is rigged against them, the appeal of the "dark side" becomes a matter of anger and survival rather than ethics. Just saying 🫡
English
1
3
58
4.1K
HackerOne
HackerOne@Hacker0x01·
Point-in-time pentests can’t keep up, while fully autonomous testing creates noise. The solution? HackerOne Agentic PTaaS pairs specially trained AI agents with elite human validation to deliver results based on real-world exploitability, not theory. This 50-second video shows you how it works.
English
30
10
114
213.3K
Deepak bug_vs_me
Deepak bug_vs_me@bug_vs_me·
Is bug bounty going to be dead in the next 5 years?
English
32
2
117
17.1K
Nichrome..
Nichrome..@om33iii·
@thedawgyg The day isn’t far when this will create more black hat hackers, and we’ll start seeing more cyber attacks or even new hacking groups doing some nasty stuff. After all, it’s all about survival.
English
0
0
2
198
dawgyg - WoH
dawgyg - WoH@thedawgyg·
"HackerOne Agentic PTaaS pairs specially trained AI agents"... specially trained on a decade worth of work from the largest pool of bug hunters on the planet.... without their consent... Maybe its time to find out how class action suits work and see if we have any ability to prevent them from using our work?
HackerOne@Hacker0x01

Point-in-time pentests can’t keep up, while fully autonomous testing creates noise. The solution? HackerOne Agentic PTaaS pairs specially trained AI agents with elite human validation to deliver results based on real-world exploitability, not theory. This 50-second video shows you how it works.

English
15
28
288
30K
Nichrome..
Nichrome..@om33iii·
@GodfatherOrwa This is what hacking was once meant to be, but now it feels like the mouse has created its own trap. What once started on the basis of ethics has now gone unethical. corporations are always the evil ones.
English
0
0
1
62
Godfather Orwa 🇯🇴
Godfather Orwa 🇯🇴@GodfatherOrwa·
To be honest waiting this to happen and then I start testing the AI and will spend very very good time to hack it and then without reporting will gift the community best and biggest disclosure in history 😊
H4x0r.DZ 🇰🇵@h4x0r_dz

HackerOne is invading privacy by allowing its AI to access researchers’ bug reports without consent. This is unethical and exploits the community that built the platform. It’s time to respect creators and stop data misuse. #BoycottHackerOne

English
4
1
82
8.9K
Nichrome..
Nichrome..@om33iii·
@0xlevi_87 Hey is there any way if you can share the target if it's not private invite. Just curious
English
1
0
0
93
Pranav Patil
Pranav Patil@0xlevi_87·
Day 4 - Bug Bounty - Did more recon on target using new tools - Found more subdomains but not interesting - 1 more day recon and I'm going to start manual hunting. - Just an update for myself: found 10 vuln in a day in office pentest for client. 2 were critical:) #BugBounty
English
3
2
39
2.2K
Winston Ighodaro
Winston Ighodaro@Officialwhyte22·
If you are into ethical hacking and already have some knowledge comment “hi” I have something for you.
English
150
8
124
10.7K
Nichrome..
Nichrome..@om33iii·
@zseano Any specific reason you prefer 1.7? Other then Spider...
English
1
0
1
849
zseano
zseano@zseano·
zseano tweet media
ZXX
15
20
436
20.5K
the_IDORminator
the_IDORminator@the_IDORminator·
Weird graphQL IDOR / access control bypass: In this one, graphQL would check the "tin" (tax identification number), if supplied, against the Bearer token. If the Bearer did not have access to the tin, you would get access denied. Normal stuff there. So my thought was, how could I make the server still lookup the tin value without the access check? It regularly expected: \"tin\" This causes the server, since "tin" is present, to check access control prior to returning data. What worked was: \"tin\\\"\" So adding \\\" after tin bypassed the access control logic (for some reason), meanwhile the graphQl query still ran and sent back the PII for any TIN I sent it. #bugbounty is just strange sometimes. Some of the battle is finding neat endpoints and places, and some of it is endless tinkering.
the_IDORminator tweet media
English
17
64
610
19.3K
Het Mehta
Het Mehta@hetmehtaa·
@om33iii XML external entity (XXE) injection in SOAP services
English
1
0
1
34
Het Mehta
Het Mehta@hetmehtaa·
Say hi and I’ll recommend a security research topic that perfectly fits your profile.
English
85
2
37
7.9K