BountyOverflow's profile picture. BBH ( ͡° ͜ʖ ͡°) 💰 @Bugcrowd Top 50 \o/ ✌️ MVP✌️
I am here to learn/share application security stuff ✌️
I enjoy finding auth bypass bugs 🐞

I¯\_(ツ)_/¯I \ (•◡•) /

@BountyOverflow

BBH ( ͡° ͜ʖ ͡°) 💰 @Bugcrowd Top 50 \o/ ✌️ MVP✌️ I am here to learn/share application security stuff ✌️ I enjoy finding auth bypass bugs 🐞

Закреплено

What a great month it was July 2022! I have ranked #2 world wide on @Bugcrowd bugcrowd.com/leaderboard

BountyOverflow's tweet image. What a great month it was July 2022!

I have ranked #2 world wide on @Bugcrowd  

bugcrowd.com/leaderboard

I¯\_(ツ)_/¯I \ (•◡•) / сделал(а) репост

Why to use a simple #XSS vector like this 🤔 <img src=x onerror=alert(1)> when you can use a much better one? 🤩 1'//"</Script><Img/Src%0AOnError=alert(1)// The vector above pops in HTML and JS scenarios for single and double quotes! 🤯 Try it here: x55.is/brutelogic/xss…


I¯\_(ツ)_/¯I \ (•◡•) / сделал(а) репост

New Rhino Blog Post: CVE-2025-0693: AWS IAM User Enumeration bit.ly/3QcEpnx


I¯\_(ツ)_/¯I \ (•◡•) / сделал(а) репост

blog.cloudflare.com/resolving-a-mu… I don’t work there anymore but it’s truly so sick seeing this level of weird bug being patched so fast Hell yeah


I¯\_(ツ)_/¯I \ (•◡•) / сделал(а) репост

Thanks to the recent @PortSwigger top 10, I finally found the motivation to finish writing the 2nd article about DOMPurify security! 😁 Before releasing it, I would like to share a small challenge 🚩 Challenge link 👇 challenges.mizu.re/xss_04.html 1/2

kevin_mizu's tweet image. Thanks to the recent @PortSwigger top 10, I finally found the motivation to finish writing the 2nd article about DOMPurify security! 😁

Before releasing it, I would like to share a small challenge 🚩

Challenge link 👇
challenges.mizu.re/xss_04.html

1/2

I¯\_(ツ)_/¯I \ (•◡•) / сделал(а) репост

Seems rennie deleted his twitter so original post is gone :/ but someone made a post about it here with the code: execure.medium.com/unleashing-the…


I¯\_(ツ)_/¯I \ (•◡•) / сделал(а) репост

Got a CSRF attack being blocked by Content-Type validation? You might be able to bypass it with this quality technique. x.com/lukejahnke/sta…

🧵Can you work out how to bypass this vulnerable CSRF protection? Read all about this gotcha in my latest blog post

lukejahnke's tweet image. 🧵Can you work out how to bypass this vulnerable CSRF protection? Read all about this gotcha in my latest blog post


After a 4-month break, I’m backon @Bugcrowd ! Life kept me busy with something truly special—welcoming my adorable daughter into the world. 🍼💕 Feeling so blessed! 🥰

BountyOverflow's tweet image. After a 4-month break, I’m backon @Bugcrowd ! Life kept me busy with something truly special—welcoming my adorable daughter into the world. 🍼💕 Feeling so blessed! 🥰

There is a public website with the following folder path: txyz.com/wp-content/upl…<filename> Does anyone know of any tricks for WordPress websites that would allow me to list all files and folders in the 'uploads' directory? #thanks-in-adv


I¯\_(ツ)_/¯I \ (•◡•) / сделал(а) репост

I was facing a very strict WAF while trying to exploit a XSS : no gt/lt signs, no parentheses, no double quotes, no backticks. I was injecting inside an html tag. Turns out the solution was very simple (and not well documented): <img src=x onerror=alert&#40document.domain&#41>

plmaltais's tweet image. I was facing a very strict WAF while trying to exploit a XSS : no gt/lt signs, no parentheses, no double quotes, no backticks. I was injecting inside an html tag. Turns out the solution was very simple (and not well documented): 

&amp;lt;img src=x onerror=alert&amp;amp;#40document.domain&amp;amp;#41&amp;gt;

I¯\_(ツ)_/¯I \ (•◡•) / сделал(а) репост

🚨Alert🚨CVE-2024-30103: Microsoft Outlook Remote Code Execution Vulnerability ⚠This Microsoft Outlook vulnerability can be circulated from user to user and doesn’t require a click to execute. Rather, execution initiates when an affected email is opened.This is notably dangerous…

HunterMapping's tweet image. 🚨Alert🚨CVE-2024-30103: Microsoft Outlook Remote Code Execution Vulnerability
⚠This Microsoft Outlook vulnerability can be circulated from user to user and doesn’t require a click to execute. Rather, execution initiates when an affected email is opened.This is notably dangerous…

I¯\_(ツ)_/¯I \ (•◡•) / сделал(а) репост

INTRODUCING: Agentic Security - LLM Security Scanner! 🔍 🛠️ Customizable Rule Sets: Tackle agent-based attacks with precision! 🧪 Comprehensive Fuzzing: Dive deep into any LLM's vulnerabilities! 🔄 LLM API Integration & Stress Testing: Ensure robust performance!


Indeed, for me aswell ! Thanks @Bugcrowd from my bottom of the heart ❤️!

I <3 @Bugcrowd and everyone that worked to make it so good. Definitely improved my life overall.



I¯\_(ツ)_/¯I \ (•◡•) / сделал(а) репост

When it comes to GraphQL recon, JavaScript is the next best thing to introspection. I made a tool (in go) which finds all graphql queries in js files (or folders) and uses ChatGPT to build the queries for you! github.com/xssdoctor/grap…


I¯\_(ツ)_/¯I \ (•◡•) / сделал(а) репост

.@insiderPhD's 4 must have Burp Suite extensions:

Bugcrowd's tweet image. .@insiderPhD&apos;s 4 must have Burp Suite extensions:

I¯\_(ツ)_/¯I \ (•◡•) / сделал(а) репост

A Day in the Life of an Unemployed Bug Hunter


What is the difference between invites and engagements on @Bugcrowd platform?


Loading...

Something went wrong.


Something went wrong.