ch.0

1.3K posts

ch.0 banner
ch.0

ch.0

@chundefined

Software Engineer | 🥷🏼🏴‍☠️ | Cybersecurity Analyst

Tercer-mundo 加入时间 Ağustos 2016
284 关注256 粉丝
ch.0 已转推
Héctor de León (El loco de los perros) ⛧
Tengo la corazonada de que cuando Anthropic saquen Mythos al público va a terminar siendo del nivel de Opus y a Opus lo van a nerfear.
Español
22
13
417
16.8K
ch.0 已转推
RedWolf🐺
RedWolf🐺@RedWolfMMA·
He's cringey af but can't lie Josh Hokit getting the first ever TKO via middle finger was pretty badass 🖕😭🤣
English
42
164
7.8K
581.4K
ch.0 已转推
Cap. Ace McCloud
Cap. Ace McCloud@allinargy·
Cuando te quieren robar pero venis -90% abajo en un trade apalancado
Español
16
152
3.3K
116K
ch.0 已转推
obscaries
obscaries@obscaries·
Fu-JS 🔎 — a powerful recon tool that crawls JavaScript across subdomains, uncovers hidden endpoints, extracts secrets, builds target-specific wordlists, and recursively expands attack surface from JS files. Perfect for bug bounty hunters focused on client-side recon & endpoint discovery. Source: github.com/th3hack3rwiz/F… #BugBounty #Recon #AppSec #WebSecurity #JavaScript
obscaries tweet media
English
1
34
155
6.5K
ch.0 已转推
Akhilesh Mishra
Akhilesh Mishra@livingdevops·
Hype train don’t care about ROI
English
153
766
8.7K
866.8K
ch.0 已转推
Jenish Sojitra
Jenish Sojitra@_jensec·
I was in denial about AI in bug bounty. Then last week I watched someone point Opus 4.6 at a known open-source repo. 2 critical bugs. $16k payout. No fancy tooling. Just prompt engineering. The game is changing whether we like it or not.
English
34
46
1.1K
69.4K
ch.0 已转推
Siddhant☄️
Siddhant☄️@Siddcodes1·
full stack developer in 2026 be like
English
125
1.4K
12.5K
739.7K
ch.0
ch.0@chundefined·
Me propuse meterle al BB y reportar al menos 5 Vulnerabilidades este año. Me pueden pagar 5$ y se sigue sintiendo bien 💯😌 1/5 #bugbountytips #Motivation
ch.0 tweet media
Español
0
0
0
37
ch.0 已转推
Censys
Censys@censysio·
The Censys research team sat down and reviewed the host history and related infrastructure surrounding the Notepad++ hacks — and boy, do they have a tale to tell. Shared infrastructure. Cobalt Strike. ARL. Suspicious open directories. 👉 Our latest research blog sketches out a small timeline of the assets involved in this attack based on the IOCs provided by Rapid7: hubs.ly/Q041TNzT0
Censys tweet media
English
4
64
270
38.3K
ch.0 已转推
CG
CG@cgtwts·
2022: Student 2023: Can I code with ChatGPT? 2024: Prompt Engineer 2025: Vibe coder 2026: Can I code without ChatGPT? 2027: Unemployed
English
44
195
9.6K
529.4K
ch.0 已转推
lyn
lyn@lyn49556·
ZXX
258
20.7K
111.4K
1.5M
ch.0 已转推
NullSecurityX
NullSecurityX@NullSecurityX·
File upload vulnerability — Content-Disposition: filename is processed without validation, allowing RCE. #BugBounty #RCE #CyberSecurity
NullSecurityX tweet media
English
5
36
346
28.2K
ch.0 已转推
Darkry
Darkry@Darkry741·
Now 2026 started Tip: For hidden API endpoints use BurpJSLinkFinder extension for Burp Suite.
Darkry tweet media
English
4
15
234
7.7K
ch.0 已转推
Chocapikk
Chocapikk@Chocapikk_·
CVE-2026-21858 + CVE-2025-68613: n8n Ni8mare - Full Chain Exploit Unauthenticated to Root RCE: - LFI via Content-Type confusion - Read /proc/self/environ to find HOME - Steal encryption key + database - Forge admin JWT token - Expression injection sandbox bypass - RCE as root CVSS 10.0 github.com/Chocapikk/CVE-…
Chocapikk tweet media
English
11
206
828
67.8K
ch.0 已转推
Jenish Sojitra
Jenish Sojitra@_jensec·
Sharing my Burp Extension that earned me $200k in 2025 while API testing heavy JS-rich targets. github.com/jenish-sojitra… The tool helps find endpoints, files, internal emails, and some secrets from minified JS. Its goal is to achieve maximum efficiency with reduced noise in results. Contributions and feedbacks are welcome.
Jenish Sojitra tweet media
English
39
408
2.3K
125.6K