dirty0124

2.9K posts

dirty0124 banner
dirty0124

dirty0124

@dirtycoder0124

A positive, never give up person. Founder of https://t.co/2H0KjZ5riG Telegram group https://t.co/bjQUMjI9Lh

India شامل ہوئے Ekim 2015
422 فالونگ4.6K فالوورز
dirty0124
dirty0124@dirtycoder0124·
Celebrating 1 year with the client. Bugcrowd is doing good but client wants to celebrate 1 year relationship with the researcher. :). This is called long term relationship. hehe
dirty0124 tweet media
English
0
0
47
2.3K
dirty0124 ری ٹویٹ کیا
Gospel
Gospel@4osp3l·
0xJS is an AI-powered JS security tool; - it can identify API keys, and other medium to critical severity secrets with high accuracy. - also scans for potential security issues in JS i.e DOM-XSS, postMessage, URL redirect. e..t..c - e..t..c; 0xJS v4.0 ( github.com/4osp3l/0xJS )
English
5
26
157
10.4K
dirty0124 ری ٹویٹ کیا
Medusa
Medusa@medusa_0xf·
I just published a video demonstrating how a token scope misconfiguration can silently lead to privilege escalation, where a normal user login becomes an admin-capable session due to improper scope validation. youtu.be/Shv84wdyqlg?si…
YouTube video
YouTube
Medusa tweet media
English
8
31
253
27.7K
dirty0124 ری ٹویٹ کیا
Shakquraa | Cybersecurity
Shakquraa | Cybersecurity@shakquraa·
🐞If you hunt modern web apps, this guide is worth your time. A deep dive into Next.js security testing covering real attack surfaces — SSRF, XSS, CSTI/SSTI, cache issues, data leaks, and more — with a mindset tailored for bug hunters and pentesters. Frameworks evolve fast, and so do their flaws. Understanding how Next.js handles rendering, routing, APIs, and caching can open doors to impactful findings. Great work by @daoud_youssef — definitely adding this to my testing workflow. 🔥deepstrike.io/blog/nextjs-se… #BugBounty #AppSec #WebSecurity #Pentesting #NextJS #CyberSecurity #SecurityResearch
English
2
75
354
16.7K
dirty0124 ری ٹویٹ کیا
Kaostyl
Kaostyl@kaostyl·
Claude Code costs $17/month and runs out in 2-4 tasks. The $200/month plan? That's rent money. Here's how I vibe code for FREE with generous limits. Every method is legal and working right now: The thing most people don't understand Claude Code is just a terminal agent. The intelligence comes from the model behind it. And comparable models exist — for free. What you actually need: an open-source agent + a free hosted model. That's it. Method 1: Aider + Nvidia (the best one) Aider is an open-source terminal agent that does exactly what Claude Code does. 30K+ GitHub stars, 15B tokens/week processed, built by Paul Gauthier. This isn't some random weekend project. Setup in 3 steps: 1. Install UV: curl -LsSf astral.sh/uv/install.sh | sh 2. Install Aider: uv tool install aider-chat 3. Go to build.nvidia.com → pick a model (Kimi K2.5 or DeepSeek R1 recommended) → generate a free API key Export the key, run Aider with the Nvidia model, and you have a Claude Code clone. Free. 40 requests/minute, no monthly quota. It initializes Git repos, builds full apps, maps your entire codebase, auto-commits with sensible messages — everything. I've been using this daily for side projects. The quality gap with Claude? Smaller than you think. Method 2: Hackathon credits (up to $100K) Cerebral Valley hackathon gives up to 100,000 Claude Code credits. Not a typo. Anthropic runs these regularly. Sign up, participate, walk away with months of free usage. Even if you don't win, sponsors hand out API credits like candy. Method 3: Alternative platforms • OpenHands — fully open-source coding agent • OpenCode — solid Claude Code alternative • Cursor free tier — not terminal-based, but decent for assisted coding in VS Code • Copilot free tier — 2000 completions/month on GitHub Aider remains my go-to for the closest Claude Code experience. ⚠️ The security warning nobody gives you These models run on third-party servers. NEVER feed them: • SSH keys • API tokens • .env files • Production credentials For personal projects and learning? Perfect. For production with secrets? Stay on paid solutions. This isn't paranoia. A Firebase misconfiguration just leaked 300M conversations from an AI chat app this week. Free doesn't mean careless. My actual setup • Daily coding: Aider + free Nvidia models (95% of my work) • Critical production: Claude Code with Opus (when I need frontier reasoning) • The rule: if it touches real user data or credentials → paid. Everything else → free. Monthly savings: ~$180. The $0 vibe coding starter kit 1. Install UV + Aider (2 minutes) 2. Get free Nvidia API key (1 minute) 3. Clone a repo, run aider, start building 4. Graduate to paid only when you genuinely need it You have zero excuses not to code with AI in 2026. The tools are free. The models are good enough. The only cost is your time learning the workflow. Stop paying rent to Anthropic for side projects. #ClaudeCode #FreeCoding #VibeCoding #AI
English
32
120
1.3K
139.7K
dirty0124 ری ٹویٹ کیا
Rimsha Bhardwaj
Rimsha Bhardwaj@heyrimsha·
🚨BREAKING: You can now run Claude Code for FREE. No API costs. No rate limits. 100% local on your machine. Here's how to run Claude Code locally (100% free & fully private):
Rimsha Bhardwaj tweet media
English
61
184
1.4K
217.7K
dirty0124 ری ٹویٹ کیا
OffSec
OffSec@offsectraining·
🚨 CVE-2026-24061 - Critical Alert 🚨 A critical (CVSS 9.8) vulnerability in GNU InetUtils telnetd lets unauthenticated attackers bypass login and gain root access on affected systems. With an EPSS score ~92%, exploitation risk is extremely high. 📌 What to do: - Patch to the latest GNU InetUtils immediately - Disable Telnet where possible 👉 Full breakdown here: offsec.com/blog/cve-2026-…
English
5
111
443
31K
stexz
stexz@abrarStx·
world scariest moment rn
stexz tweet media
English
2
0
1
219
dirty0124 ری ٹویٹ کیا
Faiyaz Ahmad
Faiyaz Ahmad@thehacktivator·
Seven months ago, someone watched one of my free videos, tried the technique for the first time, and ended up earning an $800 bounty — and the best part? The vulnerability wasn’t even that tricky to exploit. This honestly made my day. The issue was an authorization flaw in a web application, discovered using a simple but often-overlooked approach that I explained step by step in the video. No complex tooling, no fancy bypasses — just clear thinking and understanding how access control should work versus how it actually works. What I love most about this is that the person was a beginner. No years of experience. No elite background. Just consistency, curiosity, and the willingness to apply what they learned. That’s exactly why I keep sharing these techniques for free. If one video can help someone gain confidence, learn a real-world skill, and even earn a bounty, it’s worth it. If you’re interested in learning this practical way to find authorization issues in web applications, feel free to check out the video here: youtube.com/watch?v=lGYCqW…
YouTube video
YouTube
Faiyaz Ahmad tweet media
English
1
26
188
9K
dirty0124 ری ٹویٹ کیا
A00N
A00N@ay0ub_n0uri·
Here is how chaining a self‑XSS with an HTML email injection resulted in account takeover blog.ayoubnouri.me/blog/when-self…
A00N tweet media
English
4
18
215
6.5K
dirty0124 ری ٹویٹ کیا
YS
YS@YShahinzadeh·
It's not difficult, as many of you may already know: javascript%0a:alert(origin) //403 javascript%0a:\u0061lert(origin) //XSS So the point is, do not skip XSS on React websites, just start digging JS files to find a hidden input, trace it down to the sink and fire your payload!
YS tweet media
English
1
38
259
8.5K
dirty0124 ری ٹویٹ کیا
X
X@TheMsterDoctor1·
🔥Recon is where most bounties are won. 👌Argus is a Python-powered toolkit built for serious hunters: • Faster intel • Cleaner signals • Better targets Stop guessing. Start seeing. 🦅 github.com/jasonxtn/argus
X tweet mediaX tweet mediaX tweet media
English
0
61
361
21.7K
Rodolfo Assis
Rodolfo Assis@RodoAssis·
I'm open to #BugBounty Collab! Especially if you have a tough time bypassing a WAF, ping me. I have been working with some very good and honest people over the years and if you are like that, we will have a profitable and long lasting relationship. Let me know! 😎
English
3
1
45
2.4K
dirty0124 ری ٹویٹ کیا
Het Mehta
Het Mehta@hetmehtaa·
XSSNow - The Ultimate XSS Payload Database xssnow.in
Het Mehta tweet media
English
9
183
1K
40.9K