_smile_hacker_'s profile picture. Full-time Bug Bounty hunter | Founder @sudarshana_io | Ex- HackerOne |

Smilehacker

@_smile_hacker_

Full-time Bug Bounty hunter | Founder @sudarshana_io | Ex- HackerOne |

Smilehacker 已轉發

We earned a $15,000 bounty on @Hacker0x01 with @saur1n! His persistence on the target paid off, uncovering SQLi leads on a major social network. The exploit was straightforward once the query structure leaked due to verbose errors, revealing the injection point by commenting.…

mcipekci's tweet image. We earned a $15,000 bounty on @Hacker0x01 with @saur1n! His persistence on the target paid off, uncovering SQLi leads on a major social network.

The exploit was straightforward once the query structure leaked due to verbose errors, revealing the injection point by commenting.…

Smilehacker 已轉發

Post a picture YOU took. Just a pic. No description.

earthcurated's tweet image. Post a picture YOU took. Just a pic. No description.

Crazy Devs! You are not authorized 👀

_smile_hacker_'s tweet image. Crazy Devs! You are not authorized 
👀
_smile_hacker_'s tweet image. Crazy Devs! You are not authorized 
👀

My kind of stargazing:

_smile_hacker_'s tweet image. My kind of stargazing:

Smilehacker 已轉發

i was looking at an app this morning with @xssdoctor and we figured out something really neat. if you have a CSRF you can't exploit due to sec-fetch-site, you can use desktop apps (like electron apps or iMessage, etc) b/c they set sec-fetch-site to none which can be a bypass


The worst UI update I have ever seen in @Apple ‘s new update!


How long can you stick to a program?


Crazyyy!

Xbow raised $117M to build AI hacker agents, in @AliasRobotics open-sourced it and made it completely free. Github: github.com/aliasrobotics/… Paper: arxiv.org/abs/2504.06017



She is a terrorist @medusa_0xf 💀

_smile_hacker_'s tweet image. She is a terrorist @medusa_0xf 💀

Smilehacker 已轉發

‼️ My New Video covers how you can find API keys for AWS, OpenAI, secret keys, etc., as well as how you can discover new subdomains and leaked credentials. Must Watch! youtu.be/xz_jeBxTJ58?si…

medusa_0xf's tweet card. Bug Bounty Tip: Advanced GitHub Dorking for Maximum Results!

youtube.com

YouTube

Bug Bounty Tip: Advanced GitHub Dorking for Maximum Results!


Smilehacker 已轉發

During a recent pentest, the target had an SQL injection vulnerability but was behind a WAF. Standard payloads using LIKE, =, IN, etc., were blocked, preventing exploitation. As the target used PostgreSQL, I bypassed this using the ~ operator, unique to PostgreSQL. The…


Smilehacker 已轉發

Now you can listen to my "Snake Bytes" Podcast on @Spotify ✨ Don't forget to follow 💚 #infosec #hacking open.spotify.com/episode/0zdcrD…

medusa_0xf's tweet image. Now you can listen to my "Snake Bytes" Podcast on @Spotify ✨

Don't forget to follow 💚

#infosec #hacking 
open.spotify.com/episode/0zdcrD…

Smilehacker 已轉發

Using @Sudarshana_io ASM, me and @VirenPawar_ got rewarded $20000 Bounty in July on @Hacker0x01 #hackerone #BugBounty💪

MrWise3099's tweet image. Using @Sudarshana_io ASM, me and @VirenPawar_ got rewarded $20000 Bounty in July on @Hacker0x01 #hackerone #BugBounty💪
MrWise3099's tweet image. Using @Sudarshana_io ASM, me and @VirenPawar_ got rewarded $20000 Bounty in July on @Hacker0x01 #hackerone #BugBounty💪

Loading...

Something went wrong.


Something went wrong.