shuwan

27 posts

shuwan banner
shuwan

shuwan

@sh0uwan

a bug is never just a mistake. it represents something bigger, an error of thinking that makes you who you are

console Katılım Aralık 2023
440 Takip Edilen469 Takipçiler
shuwan retweetledi
RyotaK
RyotaK@ryotkak·
Another vulnerability in React Server Components (CVE-2026-23864) that I reported was disclosed today. This is separate from the one disclosed in December, so you'll need to update again. vercel.com/changelog/summ…
English
76
232
1.8K
339.6K
shuwan retweetledi
adragos
adragos@adragos_·
I'm releasing fontleak: a new CSS injection technique to quickly exfiltrate text nodes (and yes, that includes inline scripts). Works on Chrome/Firefox and Safari*. You can use it to escalate the impact of your HTML injection payloads and to solve CTF challenges.
English
3
48
270
25.6K
𝙠𝙖𝙢𝙞𝙠𝙖𝙯𝙚
Last day I found an XSS that couldn’t be detected with Nuclei, Httpx, X8, ... cause of aggressive connection handling, even with all options, servers just didn’t respond. So I wrote a lightweight Go tool to reliably test GET/POST parameter reflections. github.com/xkmikze/kzxss/
English
12
28
201
11.6K
Amirhossein
Amirhossein@abdollahzadeh_g·
Many people think there’s a golden method or a predefined path that works for everyone when it comes to finding bugs. But it's not true. Imitating others might bring results early on, but in the end, it’s all about building your own signature. That’s the exact mindset I’ve picked up from @voorivex , @Sin4Yeganeh , and @zhero___ and worked to bring into my own methodology. Only those with a unique perspective will spot the bugs that everyone else overlooks.
Amirhossein tweet media
English
16
10
256
12.4K
shuwan retweetledi
Sky Desperados
Sky Desperados@jusxing·
CSP + WAF + Dom purify + char limit + Http only cookies Yesterday, 8 PM: Found a self-HTML injection. Today, 7 AM: Reported a stored XSS → full account takeover. Chained across two domains — injected on one, triggered on the other
English
25
9
375
40.8K
Mh~Jafar
Mh~Jafar@52_Hz_h1·
First RDP bug down. On to the next. 👾--> 3K Guts Hunters[@voorivex ]
Mh~Jafar tweet media
English
47
4
294
23.2K
shuwan retweetledi
Mads
Mads@europemaxxed·
Mads tweet media
ZXX
249
36K
182.9K
5M
Sky Desperados
Sky Desperados@jusxing·
Q2 summary on @Hacker0x01 1- ranked 80 in global leaderboard 2- ranked 52 in highest critical reputation 3- $41k ( Most of IDOR & XSS & Auth) 4- 31 submission ( 4 critical , 7 high, 10 medium, 4 low , 3 duplicates) some of still PPR
Sky Desperados tweet mediaSky Desperados tweet mediaSky Desperados tweet mediaSky Desperados tweet media
English
29
6
250
20.6K
shuwan retweetledi
Sky Desperados
Sky Desperados@jusxing·
My opinion about this drama:
We should treat each other with respect. One bad action doesn’t define a person, but it should be corrected. Spreading hate toward any group is unacceptable and only creates division. I’ve been working in the bug bounty community for 2 years and have made many friends from all around the world. Even though I haven’t met them in person, I truly value and respect them, regardless of their opinions, race, religion, or background. I always give respect and receive respect in return. I don’t like this drama because it takes the community away from being productive and only leads to more division.
English
2
1
65
4.1K
shuwan retweetledi
YS
YS@YShahinzadeh·
been using this techniques to bypass many WAFs, open the console in the vulnrable page, run this code to extract variables refering to window object: for(let x in window)if(window[x]===window)console.log(x); then leaverage it to execute JS functions, happy hunting :]
YS tweet media
English
15
144
887
52.3K
debu8er
debu8er@debu8er·
Let’s go, baby!
debu8er tweet media
English
32
8
350
12.9K
shuwan retweetledi
Meydi
Meydi@mehdiparandin·
There’s an Android-only open redirect technique using the intent:// scheme: intent://trusted.com/#Intent;scheme=https;package=non.existent.app;S.browser_fallback_url=https://attacker.com/test;end If checker function only validate the domain and the app isn’t installed, ….
English
1
18
177
10.2K
shuwan retweetledi
Meydi
Meydi@mehdiparandin·
Just found an interesting behavior in Firefox that can be used for XSS: If a response lacks the Content-Type header, Firefox renders it as text/plain. But if the URL ends with an extension like .html, Firefox treats it as that. #bugbounty #bugbountytips
Meydi tweet mediaMeydi tweet media
English
21
56
525
35.3K
shuwan retweetledi
xssdoctor
xssdoctor@xssdoctor·
Super excited to be speaking at Nahamcon this year. Thanks for having me @NahamSec!
xssdoctor tweet media
English
4
3
133
8.3K
shuwan retweetledi
Mohammad Zaheri
Mohammad Zaheri@mzaherii·
Thanks to @Hacker0x01 and my favorite program for this opportunity, hope to see bug bounty folks in Sydney.
Mohammad Zaheri tweet media
English
42
5
209
9.6K
shuwan retweetledi
AmirMohammad Safari
AmirMohammad Safari@AmirMSafari·
If you find a Stored Self-XSS + CSRF login/logout bug, you can steal private info from users. Here’s how it works 👇 /1
AmirMohammad Safari tweet media
YS@YShahinzadeh

[white box challenge] Can you convert the Self-XSS into a 1-click ATO? this challenge is based on a real world bug, a semi-novel way to exploit Self-XSS. challenge objective is to steal admin's API key, give it a shot: github.com/VoorivexTeam/w… online instance: canyoucatch [.] me

English
2
34
258
21.2K
shuwan retweetledi
YS
YS@YShahinzadeh·
finally reached the BBP 2025 Top 10, I’m not pushing for the leaderboard, but it’s somehow motivating. Just been spending my time more efficiently these past months (automation + manual)
YS tweet media
English
34
11
337
13.6K