0xhelloworld_'s profile picture. for the love of hacking | oswe

helloworld

@0xhelloworld_

for the love of hacking | oswe

helloworld reposted

Unfortunately, your AI is wrong here: "It requires a separate vulnerability that allows an attacker to poison the page cache" Here's my blog describing how to exploit it: rcesecurity.com/2025/11/exploi…


helloworld reposted

The blog.mantrainfosec.com/blog/18/prepar… post by @xoreipeip shows how prepared statements can be exploited in NodeJS using mysql and mysql2 packages leading to SQLi! 🪄 So use of prepared statement might not be the ultimate solution here 🥵 as a side note, @xoreipeip later found this…


helloworld reposted

When doing recon, if you have a file with a bunch of URLs, you can use @xnl_h4ck3r's urless tool to declutter and reduce the amount of noise in the results. Check it out here 👇 github.com/xnl-h4ck3r/url…


helloworld reposted

Sharing the report from a 3-week solo audit: • 16 High • 6 Medium • 4 Low • 16 Info Large codebase using the Diamond Proxy pattern and integrating with Uniswap. Report 👇 github.com/gkrastenov/aud…

gkrastenov's tweet image. Sharing the report from a 3-week solo audit:

• 16 High
• 6 Medium
• 4 Low
• 16 Info

Large codebase using the Diamond Proxy pattern and integrating with Uniswap.

Report 👇
github.com/gkrastenov/aud…

helloworld reposted

I have created and uploaded the videos for the Prototype Pollution labs. There are also write-ups. Check out the links. @PortSwigger @WebSecAcademy Write-Ups: sommercode.gitbook.io/web-security-a… Playlist: youtube.com/playlist?list=…


helloworld reposted

I'm reading this article from @zhero___ quite late looking at the release date, but it's a goldmine if you want to start or understand bug hunting zhero-web-sec.github.io/thoughts/bugbo…


helloworld reposted

Things you must read to slowly step up your client-side game AuxClickjacking by @rafabyte_: blog.bugport.net/auxclickjacking


helloworld reposted

H2H video with @ThisIsDK999 live here in 17 hours > Made $100K+ in bug bounties before 25 > Started hacking in cyber cafes, no formal training > Focused on Adobe Experience Manager, rich niche > Collaboration prevents burnout > Recon + automation = efficiency > Bug bounties…

AseemShrey's tweet card. How This 22 Year Old Made $100,000 Hacking Companies ! | Hacker...

youtube.com

YouTube

How This 22 Year Old Made $100,000 Hacking Companies ! | Hacker...


helloworld reposted

It's impossible not to add all @ctbbpodcast research to bb.vitorfalcao.com. I may automate it to automatically add them using RSS (if they have it)

busf4ctor's tweet image. It's impossible not to add all @ctbbpodcast research to bb.vitorfalcao.com. I may automate it to automatically add them using RSS (if they have it)

helloworld reposted

I'm creating an AI Red Team course based on the few AI Security jobs openings descriptions I've seen. I'm also writing X Articles that may be of interest. github.com/Vect0rdecay/ai…


helloworld reposted

AI pentest scoping playbook devansh.bearblog.dev/ai-pentest-sco…


helloworld reposted

Static analysis for Android apps based on the OWASP MASVS framework 🌟 - github.com/Cyber-Buddy/AP… #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. Static analysis for Android apps based on the OWASP MASVS framework 🌟

- github.com/Cyber-Buddy/AP…

#infosec #cybersec #bugbountytips

helloworld reposted

In short - bug bounties are a fast track to entrepreneurship :)

Seem like one common path In bounties are. Realize bounties exist, do bounties, find bugs, share wins n writeups, level up, do talks, do lhe’s, burn out, build solution, if good enough, get acquired, have job, do bounties for fun and profit.



helloworld reposted

Todays thinking moment: Imagine you rely on automation. You ask automation (tool) for subdomains. It gives you 2000 subdomains. You start working. You run into a buddy who has 6000 subdomains for same target. You are confused. Buddy tells you "oh, your automation (tool) will…


helloworld reposted

If you find some time take a look at this article, this helped me a lot. steipete.me/posts/just-tal…


helloworld reposted

AND IVE BEEN DOING THIS MANUALLY AND THERE WAS A TOOOL FML

When testing GraphQL APIs make sure to run graphw00f (github.com/dolevf/graphw0…) to fingerprint the specific GraphQL implementation the application is running. Then you can review the Threat Matrix to get likely attack vectors.



Loading...

Something went wrong.


Something went wrong.