Djinn retweetledi
Djinn
5K posts

Djinn
@top_djinn
I hack for 🍕 | Red Teamer | Author | Speaker | Bug Bounty Hunter @YesWeHack | Whitehat @Immunefi | 😶 🇵🇰 🇵🇸
Planet Earth Katılım Aralık 2021
474 Takip Edilen106 Takipçiler
Djinn retweetledi
Djinn retweetledi
Djinn retweetledi

If the admin panel you targeted has a username enumeration , you can brute-force using a wordlist. This has worked many times for me in this case, the username was "admin"
My password wordlists:
Basic: raw.githubusercontent.com/danielmiessler…
Advance: raw.githubusercontent.com/mrtc0/honeylog…
Usernames wordlist:
raw.githubusercontent.com/jeanphorn/word…
#bugbountytips #bugbounty

English
Djinn retweetledi

Finding Critical Bugs in Adobe Experience Manager (AEM) muhammadwaseem29.tech/blog/aem
English
Djinn retweetledi

$500 bounty on @Hacker0x01. Found with Claude Code
Added a triage step in my prompt that spawns a new agent with no existing context to verify the finding. False positives have dropped a lot
got this idea from someone's tweet, can't remember who. If it was you, thanks

English
Djinn retweetledi

Two bounties on @intigriti. $3000 + $100
Both bypasses of previously resolved reports
1 year ago: ChatGPT + a lot of manual work to find one of these
Today: gave the old reports to Claude Code, it confirmed the fixes and found bypasses for both. Fully automated
Workflow has changed completely
Old writeup: medium.com/bugbountywrite…
Old tweet: x.com/arshadkazmi42/…


English
Djinn retweetledi

@damian_89_ I’ve built a script yesterday for running deepseek 4 pro on a full source code, to do code review
I can share the results today with you when it’s done 👍, so far working well
English
Djinn retweetledi

Found that just using a user ID could generate a valid session token, leading to account creation without proper authentication. Simple but high impact → triaged as P1.
Good reminder: auth & session logic needs deep testing 🔍
#BugBounty #CyberSecurity #AppSec #AuthBypass #P1

English
Djinn retweetledi

Second Write up:
Yeah I got my second bonus $$$ on a public bug bounty program. (EASY Tecnic).
Steps To Reproduce:
1/n
1.Identify multiple contact forms & Observe that all forms are protected by CAPTCHA.
2. The full endpoint /_vcp/test/_test/contactprocess/
a7madn1@a7mad__n1
Alhamdullah, I got my second bonus $$$ on a public bug bounty program at HackerOne. Happy to secure a new BBP. Soon I will share my second write up, and my last bugs on Hackerone in my channel t.me/a7madn1 Stay tuned. #bugbounty #hackerone #infosec #cybersecurity
English
Djinn retweetledi

I had published a new Writeup about my recent Critical Vulnerability Report on a Private Bug Bounty Program at Hackerone. Enjoy reading:-
wadgamaraldeen.medium.com/critical-zero-…
#CyberSecurtiy
#BugBountyTips
#AppSec
#AccountTakeover

English
Djinn retweetledi

الحمد و الشكر لله الذي بنعمته تتم الصالحات♥️
I got a ~$1,450 bounty for reporting a Critical JWT Authentication Design Flaw leading to potential Zero Click Account Takeover.
Writeup soon.
#BugBounty #AppSec #CyberSecurity #JWT #Standoff365 #SecurityResearch


Djinn retweetledi
Djinn retweetledi

HTTP Request Smuggling -> Auth Bypass
POC ->
1. Found mismatch in frontend & backend parsing
2. Crafted request with conflicting headers
3. Backend processed hidden request
4. Bypassed authentication controls\
#infosec #bugbounty #bugbountytips

English
Djinn retweetledi

Delete highlight cover IDOR bug in Instagram
$3000 Bug Bounty PoC
Write-up:
adragos.ro/idor-bug-insta…
English
Djinn retweetledi

Critical IDOR Vulnerability Leads to User Information Disclosure on Chat Box
@guptasameer756/critical-idor-vulnerability-leads-to-user-information-disclosure-on-chat-box-ffed210f3ddb?source=rss------bug_bounty-5" target="_blank" rel="nofollow noopener">medium.com/@guptasameer75…
#bugbounty #bugbountytips #bugbountytip
English
Djinn retweetledi

Super nice write ….
Damian Strobel@damian_89_
Small bug bounty writeup from one of my findings from the past - even back then having a carefully crafted list of non resolving starbucks hostnames was essential (shameless ad: argosdns.io). Writeup: argosdns.io/blog/how-i-got… Background of hackerone.com/reports/500468
English
Djinn retweetledi

For years, Google API keys (AIza...) had little to no real-world impact.
But recently, many of them unexpectedly gained access to Google Gemini.
curl "generativelanguage.googleapis.com/v1/models?key=…"
This appears to be a widespread misconfiguration that can be hunted in the wild.

English
Djinn retweetledi

I've been in the bug bounty scene for over a decade now. $2M in bounties later, I figured it was time to sit down and talk about everything I've learned! 👉🏼 youtube.com/watch?v=pbu7El…

YouTube

English
Djinn retweetledi

I just Posted My Current Methodology For Discovering Account Takeover via Password Rest Flows at LinkedIn :- linkedin.com/posts/wadgamar…
#bugbountytips #Cybersecurity #AccountTakeover

English





