Muntrive

47 posts

Muntrive banner
Muntrive

Muntrive

@Muntrive

Enjoy on web sexurity🕸️

شامل ہوئے Aralık 2023
219 فالونگ481 فالوورز
Muntrive ری ٹویٹ کیا
AmirMohammad Safari
AmirMohammad Safari@AmirMSafari·
Day 62. 1464 hours. A critical cPanel vulnerability dropped this week, just one of countless security advisories, news, decisions, and disasters Iranians have been cut off from. Nobody even knows what is unknown anymore. This isn’t a blackout. It’s a country being buried alive
NetBlocks@netblocks

🎓 The #Iran internet blackout has entered its 62nd consecutive day after 1464 hours, with the general public broadly cut off from the world. Beyond human rights and economic impacts, the measure severely hinders schooling and higher education by decimating access to knowledge.

English
0
4
17
755
soloboy
soloboy@alial1shan·
Yay, I was awarded a €2,500 bounty on @intigriti. I like bugs that have a severe real‑world impact.
soloboy tweet media
English
5
2
144
3.8K
Muntrive ری ٹویٹ کیا
YS
YS@YShahinzadeh·
this one is interesting, triage team initially closed it as OOS. I kept reasoning because it was a 0-click ATO, but they remained unchanged. However, surprisingly, the company team re-opened the report and the result is satisfying now. the point: peaceful communication always :)
YS tweet media
English
15
7
271
9.5K
AmirMohammad Safari
AmirMohammad Safari@AmirMSafari·
I recently discovered several vulnerabilities in MCP servers across different attack scenarios (DOM XSS, Stored XSS, SSRF, etc.) and decided to publish a blog post to share my knowledge. Hope you enjoy it! :D blog.voorivex.team/shaking-the-mc…
AmirMohammad Safari tweet media
English
10
38
233
14.6K
YS
YS@YShahinzadeh·
after a long discussion on a report, I managed to convince the program that the bug is High and they issued a bonus on top of the bounty. they'd mistakenly considered PR as High because the victim needed to be authenticated when opening my link, this actually affects AC not PR :)
YS tweet media
English
8
1
214
8K
Ho3ein
Ho3ein@0xHo3ein0xploit·
Forever grateful for GUTS Course 📿 @voorivex
Ho3ein tweet media
English
21
4
234
7.5K
Ho3ein
Ho3ein@0xHo3ein0xploit·
Still hunting, Still learning JS Just got a little more interesting today📿 @voorivex
Ho3ein tweet media
English
22
3
287
10.4K
YS
YS@YShahinzadeh·
This one was easy: searched JS files → revealing endpoints → JSON HTTP request → exposed PII. Tip: account for lazy-loading. many hunters miss endpoints. Method: click to trigger lazy-loaded JS, then search again for endpoints. Happy hunting :]
YS tweet media
English
22
58
801
46K
YS
YS@YShahinzadeh·
I haven’t fully returned to BB since my H1 acc was suddenly closed, but this week I tried to start working again. I spent some time on BC and found an XSS and an IDOR, the XSS was easy with a simple payload :]
YS tweet media
English
39
3
381
12.2K
AmirMohammad Safari
AmirMohammad Safari@AmirMSafari·
If a CSPT bug can't be exploited on the same origin, you can pivot it to another one. Cloudflare Image Transform can act as a cross‑origin gadget to reach more sensitive endpoints on different origins - you can read more about it here ;) blog.voorivex.team/cloudflare-ima…
English
26
43
288
19.9K
Muntrive
Muntrive@Muntrive·
@em0n555 @Hacker0x01 I’d really love to do that to keep others from working on it, but unfortunately it could get me into trouble. I hope you understand me.♥️
English
0
0
1
150
3m0n
3m0n@em0n555·
@Muntrive @Hacker0x01 can you please drop the program name so other hunters don’t get burned from those scammers
English
1
0
0
182