brutexploiter's profile picture. Security Researcher | Bug Bounty Hunter | Mechanical Engineer

brutexploiter

@brutexploiter

Security Researcher | Bug Bounty Hunter | Mechanical Engineer

Pinned

Secured 9th place on the November P1-P2 leaderboard at @Bugcrowd! 🎯 A huge thanks to @_zwink, @zseano, @NahamSec, @Jhaddix, @ctbbpodcast and @GodfatherOrwa for sharing invaluable knowledge 🙏 #ittakesacrowd #BugBounty #bugcrowd #CyberSecurity

brutexploiter's tweet image. Secured 9th place on the November P1-P2 leaderboard at @Bugcrowd! 🎯

A huge thanks to @_zwink, @zseano, @NahamSec, @Jhaddix, @ctbbpodcast and @GodfatherOrwa  for sharing invaluable knowledge 🙏

#ittakesacrowd  #BugBounty  #bugcrowd  #CyberSecurity

I earned $900 for my submission on @bugcrowd It's truly motivating to receive such positive feedback from the customer team, and it gives motivation to work hard. #ItTakesACrowd #bugbounty #bugcrowd

brutexploiter's tweet image. I earned $900 for my submission on @bugcrowd 
It's truly motivating to receive such positive feedback from the customer team, and it gives motivation to work hard.
#ItTakesACrowd 
#bugbounty #bugcrowd

brutexploiter reposted

Ok, let’s discuss this 1- fuzz website 2- found this path /jk_status?cmd=dump = dump data 3- search more about this misconfigure 4- found /jk_status?opt=0 = read and write privilege #BugBounty #bugbountytips

0x_rood's tweet image. Ok, let’s discuss this

1- fuzz website
2- found this path /jk_status?cmd=dump = dump data
3- search more about this misconfigure
4- found /jk_status?opt=0 = read and write privilege

#BugBounty #bugbountytips

Today Finally received my first valid bug &Bounty on @Bugcrowd .Thank you to the community for giving knowledge and mentors who always guide throgh their knowledge @zseano @theXSSrat @_zwink @NahamSec @codingo_ @InsiderPhD @GodfatherOrwa #bugbounty #bugcrowd #ItTakesACrowd

brutexploiter's tweet image. Today Finally received my first valid bug &Bounty on @Bugcrowd .Thank you to the community for giving knowledge and mentors who always guide throgh their knowledge @zseano @theXSSrat @_zwink @NahamSec
 @codingo_ @InsiderPhD @GodfatherOrwa 
#bugbounty  
#bugcrowd 
 #ItTakesACrowd

brutexploiter reposted

I'm uncomfortable tweeting stuff like this out, but... I found a critical vulnerability in @opensea this weekend and reported it through @Hacker0x01. They fixed the issue within 3 hours of reporting and I just got this notification👏🫢

hacker_'s tweet image. I'm uncomfortable tweeting stuff like this out, but...

I found a critical vulnerability in @opensea this weekend and reported it through  @Hacker0x01. 

They fixed the issue within 3 hours of reporting and I just got this notification👏🫢

brutexploiter reposted

SSRF Story | Scan The Network 1. Found SSRF and get Cloud Metadata. 2. Common high risk with disclosed cloud metadata is about security credential, but not found at this point :( 3. Found the instance public IP in latest/meta-data/public-ipv4, access the IP and got 404 response

zetc0de's tweet image. SSRF Story | Scan The Network

1. Found SSRF and get Cloud Metadata.
2. Common high risk with disclosed cloud metadata is about security credential, but not found at this point :(
3. Found the instance public IP in latest/meta-data/public-ipv4, access the IP and got 404 response
zetc0de's tweet image. SSRF Story | Scan The Network

1. Found SSRF and get Cloud Metadata.
2. Common high risk with disclosed cloud metadata is about security credential, but not found at this point :(
3. Found the instance public IP in latest/meta-data/public-ipv4, access the IP and got 404 response
zetc0de's tweet image. SSRF Story | Scan The Network

1. Found SSRF and get Cloud Metadata.
2. Common high risk with disclosed cloud metadata is about security credential, but not found at this point :(
3. Found the instance public IP in latest/meta-data/public-ipv4, access the IP and got 404 response

brutexploiter reposted

It's been a little over 3 weeks since Google randomly sent me $249,999 and I still haven't heard anything on the support ticket. Is there any way we could get in touch @Google? (it's OK if you don't want it back...)

samwcyo's tweet image. It's been a little over 3 weeks since Google randomly sent me $249,999 and I still haven't heard anything on the support ticket. Is there any way we could get in touch @Google?

(it's OK if you don't want it back...)

brutexploiter reposted

Thread about hunting on the main application 🧵 1. Check the login process - Do they allow signup with email or Google etc - Do they allow you to signup with the @company email - what is the content-type of the signup/login page - when you enter valid cred, on which page you


brutexploiter reposted

Search for all leaked keys/secrets using one regex! regex: gist.github.com/h4x0r-dz/be69c… #BugBounty #bugbountytip

h4x0r_dz's tweet image. Search for all leaked keys/secrets using one regex! 

regex: gist.github.com/h4x0r-dz/be69c…

#BugBounty #bugbountytip

brutexploiter reposted

TIL whenever you see an SSL certificate error and the browser doesn't let you continue - even on your own risk, you can just type 'thisisunsafe' to bypass the protection cybercafe.dev/thisisunsafe-b…

cyb3rops's tweet image. TIL whenever you see an SSL certificate error and the browser doesn't let you continue - even on your own risk, you can just type 'thisisunsafe' to bypass the protection

cybercafe.dev/thisisunsafe-b…
cyb3rops's tweet image. TIL whenever you see an SSL certificate error and the browser doesn't let you continue - even on your own risk, you can just type 'thisisunsafe' to bypass the protection

cybercafe.dev/thisisunsafe-b…

brutexploiter reposted

I drew this bird with mathematical equations.

naderi_yeganeh's tweet image. I drew this bird with mathematical equations.

brutexploiter reposted

I earned $5,500 for my bug on @bugcrowd This was one of the most unique "Web Cache Deception" I found on one of the oldest public program which led me to a "Mass Account Takeover with ZERO user interaction" scenario. READ the thread.. 1/7 #cybersecurity #infosec #bugbountytips

AnkitCuriosity's tweet image. I earned $5,500 for my bug on @bugcrowd

This was one of the most unique "Web Cache Deception" I found on one of the oldest public program which led me to a "Mass Account Takeover with ZERO user interaction" scenario. READ the thread..

1/7

#cybersecurity #infosec #bugbountytips

brutexploiter reposted

Today I'm launching #HijackLibs, an open-source, community-driven project tracking DLL Hijacking opportunities in in Windows 🌍 LIVE on hijacklibs.net 👈 🆕 Currently comprising over 350 unique DLLs that can be targeted 🤝 Contribute via github.com/wietze/hijackl…

Wietze's tweet image. Today I'm launching #HijackLibs, an open-source, community-driven project tracking DLL Hijacking opportunities in in Windows

🌍 LIVE on hijacklibs.net 👈
🆕 Currently comprising over 350 unique DLLs that can be targeted
🤝 Contribute via github.com/wietze/hijackl…

brutexploiter reposted
SalahHasoneh1's tweet image. 🛡️ Dorks for CVE-2020-3452 🛡️

#cybersecurity #infosec #ethicalhacking #bugbounty #bugbountytips #bugbountytip #hackerone

brutexploiter reposted

WordPress Never Fails to Surprise !!🤩🤩 A Low hanging Bug with High Impact. You can access the whole disk on the Browser and see sensitive files. Dorks : "inurl: /sym404/root/" or "inurl: /sym404/" @GodfatherOrwa @theXSSrat #WordPress #hacking #cybersecurity #bugbounty

mayank_pandey01's tweet image. WordPress Never Fails to Surprise !!🤩🤩

A Low hanging Bug with High Impact. You can access the whole disk on the Browser and see sensitive files.

Dorks : "inurl: /sym404/root/" or "inurl: /sym404/"

@GodfatherOrwa @theXSSrat 
#WordPress #hacking #cybersecurity #bugbounty

brutexploiter reposted

Based on my last comment with @GodfatherOrwa and @eslam3kll , This is the template of SQLi Detection github.com/0xElkot/My-Nuc… Steps: 1- Catch all requests of parameters. 2- Grep reflected parameters with gf and Kxss 3- Fire this template #happy_hacking #bugbounty


brutexploiter reposted

Great day with an old bug! 👀#bugbounty

jkana101's tweet image. Great day with an old bug! 👀#bugbounty

brutexploiter reposted

~Django Admin Panel Pwn

hunter0x7's tweet image. ~Django Admin Panel Pwn

Loading...

Something went wrong.


Something went wrong.