YShahinzadeh's profile picture. Security enthusiastic, chess player

YS

@YShahinzadeh

Security enthusiastic, chess player

Pinned

How I reverse-engineered an Android app, bypassed custom encryption layer, achieved server-side RCE, and earned a $5000 bounty. read the full story here (TLDR; but worth reading) blog.voorivex.team/from-an-androi…

YShahinzadeh's tweet image. How I reverse-engineered an Android app, bypassed custom encryption layer, achieved server-side RCE, and earned a $5000 bounty. read the full story here (TLDR; but worth reading)

blog.voorivex.team/from-an-androi…

why are most SPA web apps vulnerable to DOM XSS? I've found MANY bugs in Oauth when custom implementation gets involved, many ATO and DOM XSS. never overlook custom OAuth setups, like what? storing DATA in state parameter, happy hunting :]

YShahinzadeh's tweet image. why are most SPA web apps vulnerable to DOM XSS? I've found MANY bugs in Oauth when custom implementation gets involved, many ATO and DOM XSS. never overlook custom OAuth setups, like what? storing DATA in state parameter, happy hunting :]

This one was easy: searched JS files → revealing endpoints → JSON HTTP request → exposed PII. Tip: account for lazy-loading. many hunters miss endpoints. Method: click to trigger lazy-loaded JS, then search again for endpoints. Happy hunting :]

YShahinzadeh's tweet image. This one was easy: searched JS files → revealing endpoints → JSON HTTP request → exposed PII. Tip: account for lazy-loading. many hunters miss endpoints. Method: click to trigger lazy-loaded JS, then search again for endpoints. Happy hunting :]

I haven’t fully returned to BB since my H1 acc was suddenly closed, but this week I tried to start working again. I spent some time on BC and found an XSS and an IDOR, the XSS was easy with a simple payload :]

YShahinzadeh's tweet image. I haven’t fully returned to BB since my H1 acc was suddenly closed, but this week I tried to start working again. I spent some time on BC and found an XSS and an IDOR, the XSS was easy with a simple payload :]

YS reposted

If a CSPT bug can't be exploited on the same origin, you can pivot it to another one. Cloudflare Image Transform can act as a cross‑origin gadget to reach more sensitive endpoints on different origins - you can read more about it here ;) blog.voorivex.team/cloudflare-ima…


20 days ago I found a uXSS and reported, it got triaged now, I'll publish a blog post after fix and vendor permission, it's my first bug that I'm not happy with due to recent H1 situation 🖤

YShahinzadeh's tweet image. 20 days ago I found a uXSS and reported, it got triaged now, I'll publish a blog post after fix and vendor permission, it's my first bug that I'm not happy with due to recent H1 situation 🖤

YS reposted

Due to the repeated screw-ups and zero transparency around bans by @Hacker0x01, I’ve chosen to leave with dignity. My account is now fully deactivated and to be removed. If you need my services, I’m still available at @Bugcrowd @intigriti @immunefi @HackenProof @StandoffBB

I’ve been hunting on H1 for almost 3 years, ranked #18 in 2025, have always tried to contribute positively to the hacker community. I’ve earned around $500k in bounties and was on the road to $1M. Yet I don’t even have HSM, and I feel I haven’t been recognized as I should 1/4

YShahinzadeh's tweet image. I’ve been hunting on H1 for almost 3 years, ranked #18 in 2025, have always tried to contribute positively to the hacker community. I’ve earned around $500k in bounties and was on the road to $1M. Yet I don’t even have HSM, and I feel I haven’t been recognized as I should 1/4


YS reposted

Really disappointed to see @Hacker0x01 do this. I also had a similar interaction with h1 about a month ago where they questioned my nationality and place of residence after 10+ on the platform.

This post is unavailable.

YS reposted

@Hacker0x01 is now banning people without explanation or providing how the terms and conditions were violated. While other platforms are advancing, H1 revolutionary new vision is to track hackers on social media, make assumptions and ban them without a real proof.


YS reposted

Bit late but this is a nice challenge, worth trying if you haven't already :D Otherwise, my solution is below, it's a really fun technique that makes me re-evaluate all the .source checks I've seen before...

this is the second challenge, and it’s a hard one, can you exploit it?

omidxrz's tweet image. this is the second challenge, and it’s a hard one, can you exploit it?


I love engaging with programs being professional and communicating in a well-mannered way, especially when assessing severity, worked on a private program recently and reported 3 High bugs that earned +12k, the bugs were found reading JavaScript codes

YShahinzadeh's tweet image. I love engaging with programs being professional and communicating in a well-mannered way, especially when assessing severity, worked on a private program recently and reported 3 High bugs that earned +12k, the bugs were found reading JavaScript codes

just crossed 10k on H1

YShahinzadeh's tweet image. just crossed 10k on H1

poking around with @AmirMSafari on a public program, no WAF bypass, no special payload 3x Dom XSS: javascript:alert(origin) CSPT + parameter pollution: critical CSRF HTMLi: leaking URL equipped with token Tip: read JS files curiously, do not rush for bug, enjoy the process :]

YShahinzadeh's tweet image. poking around with @AmirMSafari on a public program, no WAF bypass, no special payload

3x Dom XSS: javascript:alert(origin)
CSPT + parameter pollution: critical CSRF
HTMLi: leaking URL equipped with token

Tip: read JS files curiously, do not rush for bug, enjoy the process :]

YS reposted

after a long time, I decided to write a blog post about one of the old bugs I found in an Android app, which finally led me to achieve 0-Click Mass Account TakeOver it's now published, you can read it here : blog.voorivex.team/0-click-mass-a…


Today I’m happy even though I’m dying from a damn virus :[

YShahinzadeh's tweet image. Today I’m happy even though I’m dying from a damn virus :[

Loading...

Something went wrong.


Something went wrong.