codingo_'s profile picture. VP of Operations @bugcrowd, Hacking Content @ http://youtube.com/codingo tools @ http://github.com/codingo @SecTalks_GC & @BSidesGC co-organiser

Michael Skelton

@codingo_

VP of Operations @bugcrowd, Hacking Content @ http://youtube.com/codingo tools @ http://github.com/codingo @SecTalks_GC & @BSidesGC co-organiser

고정된 트윗

3 events, 3 days, over $3m paid and a new bug bash industry record. If you’re not hacking on @Bugcrowd you’re missing out on the best events the industry has to offer. Love our crowd. You are all so incredible.


Michael Skelton 님이 재게시함

How do you get into cyber? Need to bridge the gap from no experience to jr? Today we are releasing three modules for FREE from our course “Hacking Your Career”! These modules cover my favorite training resources across every domain: Blue, Purple, and Red additionally…


Michael Skelton 님이 재게시함

🚀New plugin in the Caido Store! Introducing "Bytecap" by Ads Dawson Set a threshold to monitor and manage your workspace file sizes in real time. Check out more details: github.com/GangGreenTempe…


Michael Skelton 님이 재게시함

Awesome idea for improvements to Replay from @ngalongc - shout out to the @CaidoIO dev team for implementing this so quickly. Excited to use it with the next Nightly release for subscribers. CC @joaxcar

Even it's hard, I'm still exctied to see small wins like "status code in repeater history"

ngalongc's tweet image. Even it's hard, I'm still exctied to see small wins like "status code in repeater history"


Michael Skelton 님이 재게시함

Didn't get a free voucher 😭 for the new Regex For Hackers course? You've got two choices: a) I'm going to give away another 5 vouchers but you need to follow me, @hackinghub_io and like and share and comment on this post with your best GIF! Winners announced in 48 hours. b)…


Michael Skelton 님이 재게시함

I just published a Repeater feature to make it easier to explore request smuggling. It repeats your request until the status code changes. It's called "Retry until success" and you can install it via the Extensibility helper bapp.

albinowax's tweet image. I just published a Repeater feature to make it easier to explore request smuggling. It repeats your request until the status code changes. It's called "Retry until success" and you can install it via the Extensibility helper bapp.

Michael Skelton 님이 재게시함

TOOL RELEASE🔥🚀 Clear reports and good communication with the teams can make the difference in the outcome of your report, including the final bounty/bonus. To assist you in the reporting and communication, here is CrowdAssist ✨. @Bugcrowd compatible. 🧵👇 #BugBounty #AI

bsysop's tweet image. TOOL RELEASE🔥🚀

Clear reports and good communication with the teams can make the difference in the outcome of your report, including the final bounty/bonus.

To assist you in the reporting and communication, here is CrowdAssist ✨.

@Bugcrowd compatible.

🧵👇

#BugBounty #AI
bsysop's tweet image. TOOL RELEASE🔥🚀

Clear reports and good communication with the teams can make the difference in the outcome of your report, including the final bounty/bonus.

To assist you in the reporting and communication, here is CrowdAssist ✨.

@Bugcrowd compatible.

🧵👇

#BugBounty #AI
bsysop's tweet image. TOOL RELEASE🔥🚀

Clear reports and good communication with the teams can make the difference in the outcome of your report, including the final bounty/bonus.

To assist you in the reporting and communication, here is CrowdAssist ✨.

@Bugcrowd compatible.

🧵👇

#BugBounty #AI

Michael Skelton 님이 재게시함

We are working on the questions for this panel… it’s gonna be a MUST attend for anyone near AI hacking!

LAST MINUTE ADDITION! Don't miss "Misaligned: AI Jailbreaking Panel" featuring BT6 members @elder_plinius, @TakSec, @phildursey, and others; moderated by @Jhaddix on Sunday, August 10 at 10:00 AM inside the Village. Read more at bugbountydefcon.com/agenda #BugBounty #DEFCON33



Michael Skelton 님이 재게시함

We’re excited to announce that Michael Skelton (@codingo_) will be speaking at the Bug Bounty Village at DEF CON 33! Stay tuned for more details on their talk, you won’t want to miss it. #BugBounty #DEFCON #BBV #BugBountyVillage


Michael Skelton 님이 재게시함

Looking to hire a full-time social media manager for @hacker_content. Needs to be well versed in both cybersecurity and excellent at creating social media content. If that sounds like you, fill out the application form in the comment below.


Michael Skelton 님이 재게시함

Launching today! Volerion transforms raw CVEs into structured and instant insights #CVE #CyberSecurity #infosec

VolerionSec's tweet image. Launching today!

Volerion transforms raw CVEs into structured and instant insights

#CVE #CyberSecurity #infosec

Timeline cleanser.


Michael Skelton 님이 재게시함

I mentioned this before but I have officially retired my old youtube channel and I am starting fresh with this one: youtube.com/@I_am_Jakoby 140 subs without a video yet, im appreciative I actually would be so incredibly grateful if you could comment down below with what you…

I_Am_Jakoby's tweet image. I mentioned this before but I have officially retired my old youtube channel and I am starting fresh with this one:

youtube.com/@I_am_Jakoby

140 subs without a video yet, im appreciative

I actually would be so incredibly grateful if you could comment down below with what you…

Michael Skelton 님이 재게시함

Really dope extension by the legend @fransrosen to track postMessage listeners in the current window and all subframes 🧩 It detects short-lived or interaction-triggered listeners, logs their function and source, and lets you replay messages.


Michael Skelton 님이 재게시함

It’s been a long journey—far from easy. But alongside some of the world’s finest researchers, I’ve been lucky to learn, break, and build. Huge thanks to @Bugcrowd for making it possible to see my bugmoji on the NASDAQ billboard in Times Square. The message says it best:…

herrmann1001's tweet image. It’s been a long journey—far from easy.  But alongside some of the world’s finest researchers, I’ve been lucky  to learn, break, and build.

Huge  thanks to @Bugcrowd for making it possible to see my bugmoji on the  NASDAQ billboard in Times Square. The message says it best:…

Michael Skelton 님이 재게시함

💸 From $20K to $100K for critical bugs! OpenAI just cranked up their bug bounty payouts through Bugcrowd. @codingo_ breaks it down in @DarkReading ⬇️ darkreading.com/application-se#Bugcrowd #BugBounty #AIsecurity #Infosec


Michael Skelton 님이 재게시함

Just added OTP login flow support to bbscope #bugbounty

We’re taking extra steps to help you as hackers keep your accounts secure! Starting today, if you don’t have multi-factor authentication (MFA) enabled, you’ll need to update your password and turn on MFA at your next login. Already have MFA? You’re good to go. Happy hunting! 🐞



Michael Skelton 님이 재게시함

Security is one of the top priorities for our customers and the partners they work with. Recently, we became aware of a breach database containing a significant number of hacker credentials from another bug bounty platform, potentially allowing attackers to access and download…

The requirement to enable MFA at login is a proactive security measure. This change to the platform was roadmapped for later on in the year, however, it was accelerated following threat intelligence that included credential leaks and compromised tools affecting other bug bounty…

Bugcrowd's tweet image. The requirement to enable MFA at login is a proactive security measure.

This change to the platform was roadmapped for later on in the year, however, it was accelerated following threat intelligence that included credential leaks and compromised tools affecting other bug bounty…


Michael Skelton 님이 재게시함

For context, some of y'all have been using cracked copies of software you shouldn't, and having your entire browsing sessions sent to third parties. So yes, password resets and MFA for everyone, so that everyone stays secure.

We’re taking extra steps to help you as hackers keep your accounts secure! Starting today, if you don’t have multi-factor authentication (MFA) enabled, you’ll need to update your password and turn on MFA at your next login. Already have MFA? You’re good to go. Happy hunting! 🐞



Michael Skelton 님이 재게시함

A couple of years ago I co-presented with @wbm312 how sensitive bug bounty hunter accounts can be, especially active hunters with years of file attachments and POC data. Today bugcrowd is mandating 2fa on all accounts: bugcrowd.com/blog/bugcrowd-… Definitely a positive change.


Michael Skelton 님이 재게시함

W🤯🤯🤯🤯aaahhhhhhh!!!! Hackers are in the spotlight at Times Square. Now 𝙩𝙝𝙖𝙩’𝙨 something worth celebrating! The Crowd seriously deserves more love, and getting them up in lights? That’s the kind of moment we live for. To every hacker who protects, builds, and breaks…

Bugcrowd's tweet image. W🤯🤯🤯🤯aaahhhhhhh!!!!

Hackers are in the spotlight at Times Square. Now 𝙩𝙝𝙖𝙩’𝙨 something worth celebrating!

The Crowd seriously deserves more love, and getting them up in lights? That’s the kind of moment we live for. To every hacker who protects, builds, and breaks…
Bugcrowd's tweet image. W🤯🤯🤯🤯aaahhhhhhh!!!!

Hackers are in the spotlight at Times Square. Now 𝙩𝙝𝙖𝙩’𝙨 something worth celebrating!

The Crowd seriously deserves more love, and getting them up in lights? That’s the kind of moment we live for. To every hacker who protects, builds, and breaks…
Bugcrowd's tweet image. W🤯🤯🤯🤯aaahhhhhhh!!!!

Hackers are in the spotlight at Times Square. Now 𝙩𝙝𝙖𝙩’𝙨 something worth celebrating!

The Crowd seriously deserves more love, and getting them up in lights? That’s the kind of moment we live for. To every hacker who protects, builds, and breaks…

Loading...

Something went wrong.


Something went wrong.