_smile_hacker_'s profile picture. Founder @sudarshana_io | Ex- HackerOne |

Smilehacker

@_smile_hacker_

Founder @sudarshana_io | Ex- HackerOne |

Smilehacker podał dalej

Don’t Miss the New Video! 🔥 - How I Found a $500 Bug Bounty + AI Recon Tips! youtu.be/kmm1Y_QZqjY?si…

medusa_0xf's tweet image. Don’t Miss the New Video! 🔥 

- How I Found a $500 Bug Bounty + AI     Recon Tips! 

youtu.be/kmm1Y_QZqjY?si…

Is this a coincidence? First AWS Second Azure Third Cloudflare


Prove me wrong, Discord is better than Slack 🙂.


Smilehacker podał dalej

Decorations in Sydney, Australia 🔥


Clear concepts…..just do it!


Smilehacker podał dalej

❄️[New Video] - The Most Overlooked Bug in Web Apps: HTTP Request Smuggling (Deep Dive) (P.S. Only Real Wannabe Hackers can Watch it) youtu.be/6Zck1649AP0

medusa_0xf's tweet image. ❄️[New Video] - The Most Overlooked Bug in Web Apps: HTTP Request Smuggling (Deep Dive)

(P.S. Only Real Wannabe Hackers can Watch it)

youtu.be/6Zck1649AP0

Smilehacker podał dalej

We earned a $15,000 bounty on @Hacker0x01 with @saur1n! His persistence on the target paid off, uncovering SQLi leads on a major social network. The exploit was straightforward once the query structure leaked due to verbose errors, revealing the injection point by commenting.…

mcipekci's tweet image. We earned a $15,000 bounty on @Hacker0x01 with @saur1n! His persistence on the target paid off, uncovering SQLi leads on a major social network.

The exploit was straightforward once the query structure leaked due to verbose errors, revealing the injection point by commenting.…

Smilehacker podał dalej

Post a picture YOU took. Just a pic. No description.

earthcurated's tweet image. Post a picture YOU took. Just a pic. No description.

Crazy Devs! You are not authorized 👀

_smile_hacker_'s tweet image. Crazy Devs! You are not authorized 
👀
_smile_hacker_'s tweet image. Crazy Devs! You are not authorized 
👀

My kind of stargazing:

_smile_hacker_'s tweet image. My kind of stargazing:

Smilehacker podał dalej

i was looking at an app this morning with @xssdoctor and we figured out something really neat. if you have a CSRF you can't exploit due to sec-fetch-site, you can use desktop apps (like electron apps or iMessage, etc) b/c they set sec-fetch-site to none which can be a bypass


The worst UI update I have ever seen in @Apple ‘s new update!


How long can you stick to a program?


Loading...

Something went wrong.


Something went wrong.