Santiago T
@Sant1Taboada
Professional Hacker | OSCP | CRTO | Bug Bounty Hunter
After some weeks of “vibe coding” with cursor AI, I wanted to learn how to do HTTP Request Smuggling. I developed my first ever CTF lab with AI to practice. If interested you can close the repo: github.com/MrR0b0t23/Requ…
Well first HTTP Request smuggling vulnerability submitted and it turns out it was a duplicate 😢
Ok… so I may or may not have found my first ever HTTP Request Smuggling vulnerability… hoping that it’s a valid bug but we will see. #hacking #bugbounty
God I love @CaidoIO!! The fact that I can use automate to fuzz without having to pay for a premium license continues to make it my favorite tool.
Yesterday I found my first ever Critical bug on a VDP hosted by @Hacker0x01! Excited to have found a critical bug but I feel so much better knowing I made the cyber world a little safer. #BugBounty
#wehackhealth lifting club shirts - retweet if you want one 👀👀 #hackersummercamp
Let’s go!! 2 more bugs got approved through @Bugcrowd starting off on a good note this week. Patience is key and do not quit. If you want to start finding things then do VDP to build practice and get reputation so you can get private invites. #BugBounty
Well found another bug but got my first duplicate. Oh well! I guess that’s part of being a researcher. Time to get back to hacking. #hacking
I just submitted my first ever report to @Hacker0x01 I think the bug it’s low, but I rather submit it to be safe. Thank you @NahamSec for making content about recon it really helped me find interesting endpoints!!
Officially started my OSWA journey today. Thanks @offsectraining for creating the best learning materials out there. After I passed my OSCP and took some time off the certification bug has hit again and excited to start learning again. #hacking #foreverlearning
If anyone wonders why I don't recommend iNE Certifications, it's because I cannot get behind their marketing tactics. This one is a new low, they took the OSCP/OSED name, created pages for them on their website, and then link to their own subscription. ine.com/learning/certi…
Officially getting back on the horse and learning how to discover web application bugs on HackerOne. If anyone has advice or tips I would love to hear them 😃
Local priv-esc vulnerability in Zoom (for macOS) speakerdeck.com/patrickwardle/…
United States الاتجاهات
- 1. Virginia Tech 5,964 posts
- 2. James Franklin 5,652 posts
- 3. Sonic 3 10K posts
- 4. GOTY 21.9K posts
- 5. Moana 31.6K posts
- 6. Expedition 33 33.7K posts
- 7. Grok 4.1 9,831 posts
- 8. Zelda 59.1K posts
- 9. #TheGameAwards 39.1K posts
- 10. Comey 31.9K posts
- 11. Blacksburg N/A
- 12. Ted Cruz 17.5K posts
- 13. Va Tech N/A
- 14. Baton Rouge 2,415 posts
- 15. Hokies 1,182 posts
- 16. FEMA 7,654 posts
- 17. Marr Chase 15.1K posts
- 18. Until Dawn 3,221 posts
- 19. Clair Obscur 21.6K posts
- 20. #RestoreTheSnyderVerse 42.9K posts
Something went wrong.
Something went wrong.