Khan Janny

1.2K posts

Khan Janny

Khan Janny

@reboot_ex

Pizza-powered bug bounty hunter. 🍕, Co-founder @penoughcyber

Dhaka, Bangladesh Katılım Mart 2012
1.6K Takip Edilen807 Takipçiler
Zulkar Naim
Zulkar Naim@zulkarnaimx·
I don't understand why people don't just lock in on YouTube My faceless YouTube channels make me $120,000+/mo (long form only) There is 𝗻𝗼 𝗹𝘂𝗰𝗸 involved. Let me send you a free course on exactly how to do it. Just Retweet and Comment "YouTube" (must follow)
Zulkar Naim tweet media
English
781
292
481
106.5K
bugcrowd
bugcrowd@Bugcrowd·
Comment “CISO” to get your own copy 💫 If you haven’t checked out our Inside the Mind of a CISO 2025 report yet, go read it. You’ll thank us later: bugcrowd.com/resources/repo…
bugcrowd tweet mediabugcrowd tweet media
English
449
37
585
79.2K
Khan Janny retweetledi
Harley Kimball
Harley Kimball@infinitelogins·
This week, Disclosed. #BugBounty DEF CON 33 Badge Pre-Orders, Bug Bounty Village Agenda, HackAICon Announcement, NullCon Scholarships, Caido Acquires Shift, and more Highlights below 👇 Full issue → getdisclosed.com @BugBountyDEFCON opened pre-orders for a limited edition Bug Bounty Village badge in a green variant. Pre-order online and pick up in person at the con. @CaidoIO acquired the Shift plugin, now free for users with payload crafting and HTTPQL support. @BugBountyDEFCON released the full agenda for Bug Bounty Village at DEF CON 33. @0xacb announced HackAICon 2025 (Sept 25, Lisbon), featuring AI, hacking challenges, talks, and networking. @nullcon is offering Bug Bounty Hunter Scholarships for their Berlin event (Sep 4–5). Apply by July 28. @hackenproof announced a new bug bounty program for No Ones App with rewards up to $5k per bug. @xss0r shared 6 new @Microsoft domains now eligible for the Identity Bug Bounty program. @yeswehack posted highlights from the live hacking event at leHACK 2025 in a recap video. @Hacker0x01 updates their in-platform color scheme to align better with their updated marketing site. PwnFox (via @BApp_Store) adds multi-session, color-coded testing in Burp Suite. @garethheyes announces Custom Actions to automate request rewriting and payload generation in Burp Suite. @fneves97 updated JXScout Pro for improved JavaScript asset navigation in VSCode. @adce626 launched the Bug Bounty Recon Toolkit, which generates commands for 50+ tools based on target. @KN0X55 introduced XSS Gym to train on real XSS payloads and scenarios. @alicanact60 published a Chrome extension that restores the classic HackerOne UI. From .git disclosure to RCE. The author details a full bug bounty chain from initial .git leak to remote code execution, with techniques and tools. Leaking PII in Microsoft Guest Check-In. The author (Faav) shows how exposed PII and Burp Suite let them break into Microsoft buildings. HackerOne report by @MrMax4o4 documents how a banned user retained API access to a deleted account, exposing weak access controls. @deadoverflow_ explains a race condition in Reddit’s coin API inflating coins via parallel requests. @medusa_0xf highlights business logic vulnerabilities that led to real payouts. @NahamSec shows JWT mistakes that enabled account takeover and big bounties. @amrelsagaei interviews @NahamSec on mindset, overcoming plateaus, and building a personal brand. BePractical demonstrates exploiting zip slip on file uploads to overwrite paths. @Magn4_ shares the story of earning his first bounty with a $100 open redirect. @ctbbpodcast Ep.131 features live SSRF and IDOR hacks, leaked secrets, Google’s defense strategy, and community insights. @cyb3r_dan shares an SQLi detection guide covering manual and automated techniques with practice labs. @Bugcrowd explains how to find bugs on hardened targets by chaining smaller flaws. @coffinxp7 publishes an advanced bug bounty recon checklist. @intigriti introduces GitHub dorking with search patterns to uncover vulnerabilities. @clintgibler highlights Check Point’s discovery of malware using prompt injection. @40sp3l reminds hunters not to skip targets just because they have many reports — good bugs still remain. @0xacb points out that Chrome’s upcoming features could open up new bypass techniques. @njcve_ shares success at SteelCon where an authentication bypass bug was found. @intigriti explains 3 exploitable and highly rewarded vulnerabilities in detail. @Bugcrowd offers 5 actionable tips for beginners breaking into cybersecurity. Full links, tools, write-ups & more → getdisclosed.com The bug bounty world, curated.
English
1
9
37
2.3K
Tom
Tom@tomcrawshaw01·
F*ck it, I'm leaking my ENTIRE AI automation vault... You get access to everything that generated over $8M for my clients: - 15 n8n workflows (one generated $600K in 90 days) - $7.1M marketing playbook collection - 8 MCP servers that turn Claude into a marketing beast - AI prompts that eliminate expensive teams - Viral content templates (analyzed 100M+ views) - 6600-word n8n mastery guide Basically everything you need to automate your business and replace expensive software. Comment "LEAK" and I'll DM over the notion doc (must be following) This is absolutely insane to give for FREE, that's why I'm nuking it in 24hrs.
English
998
76
636
114.5K
Khan Janny
Khan Janny@reboot_ex·
@trfjz No, this specific one was for reflected xss. There is some limitations but better than mass Fuzzing.
English
0
0
0
16
Khan Janny
Khan Janny@reboot_ex·
Context Over Fuzzing 🤘#xss
Khan Janny tweet media
English
0
0
33
1.1K
Khan Janny
Khan Janny@reboot_ex·
Excited to present at UAP Cyber Siege 2025 (University of Asia Pacific) on "Exploiting Context Over Mass Fuzzing, Contextual XSS Advantage." Anticipating a great discussion.
Khan Janny tweet media
English
0
0
3
225
Khan Janny
Khan Janny@reboot_ex·
🎯 Challenge Completed! 🎯 I just solved the "Challenge of the Day" on the Infinity Platform by @cyberwarfarelab It was an amazing opportunity to test and sharpen my skills in the Red Team labs. Looking forward to more challenges.
Khan Janny tweet media
English
1
0
6
325
Dorki
Dorki@attaxapty·
We’re thrilled to announce our partnership with @intigriti! To celebrate, we're giving away a Pro Tier license to 10 lucky winners. 🎉 Here’s how you can enter the competition: 1⃣ Follow @dorkipty and @intigriti 2⃣ Comment your hacking buddy 🤓 Get ready to #HackWithIntigriti and boost your bug bounty skills with this amazing opportunity! Don’t miss out! Happy Hacking! 🕵️‍♂️💻 #bugbounty #cybersecurity #dorkipty #intigriti
Intigriti@intigriti

🏆 The tool for hackers by hackers @dorkipty is partnering with us, and they are giving away a Pro Tier license to 10 lucky winners. In order to enter the competition, u need to: 1⃣ Follow @dorkipty and @intigriti 2⃣ Comment your hacking buddy 🤓 #HackWithIntigriti #bugbounty

English
48
34
66
8.3K
Khan Janny retweetledi
Penough
Penough@penoughcyber·
Discover how SIEM is the backbone of an effective Security Operations Center (SOC)! Read our latest blog: "The Essential Role of SIEM in the Security Operations Center (SOC)" on Medium now! Read now: @penoughcyber/the-essential-role-of-siem-in-the-security-operation-center-soc-part-0x03-4d9d189b4bab" target="_blank" rel="nofollow noopener">medium.com/@penoughcyber/… #SOC #SIEM #PenoughCyber #Penough #DigitalDefense
English
0
2
6
367
Khan Janny retweetledi
Rasel Mir
Rasel Mir@araselmir·
Just got a reward for a vulnerability submitted on @yeswehack -- Cross-site Scripting (XSS) - Reflected (CWE-79). #YesWeRHackers Collab with @reboot_ex vai 🔥
Rasel Mir tweet media
English
0
1
23
1.4K
Khan Janny retweetledi
Rasel Mir
Rasel Mir@araselmir·
Just got a reward for a vulnerability submitted on @yeswehack -- Cross-site Scripting (XSS) - Reflected (CWE-79). #YesWeRHackers Collab with @reboot_ex vai 🔥
Rasel Mir tweet media
English
2
1
40
2.1K