gr3pme's profile picture. Cohost @ctbbpodcast || Bug Bounty Hunter || OSWE, OSCP

gr3pme

@gr3pme

Cohost @ctbbpodcast || Bug Bounty Hunter || OSWE, OSCP

When you get a message like this from @xssdoctor , you know it’s gonna be a banger

gr3pme's tweet image. When you get a message like this from @xssdoctor , you know it’s gonna be a banger

gr3pme reposted

This may be the perfect podcast episode. It has everything: hacking tips, crazy stories, amazing music and 3 buddies having a great time. Great job @ctbbpodcast @Rhynorater @gr3pme @rez0__ youtu.be/FdByZdhlSlU?si…

xssdoctor's tweet card. Hacker Horror Stories - Halloween Special (Ep. 146)

youtube.com

YouTube

Hacker Horror Stories - Halloween Special (Ep. 146)


First full squad episode = one of the most fun to date. Our Halloween special is live 👀🎃

Justin got FIRED?! - youtu.be/FdByZdhlSlU In ep. 146, the boys sit down to celebrate the spooky season by telling us their scariest hacking stories. Grab your flashlight, a blanket and come listen to what happens when hacking goes a little too far! 👻

ctbbpodcast's tweet card. Hacker Horror Stories - Halloween Special (Ep. 146)

youtube.com

YouTube

Hacker Horror Stories - Halloween Special (Ep. 146)



gr3pme reposted

When I say this is a crazy episode of CTBB...

Rhynorater's tweet image. When I say this is a crazy episode of CTBB...

gr3pme reposted

Been a while since I wrote a blog post, so here is a funny one about how I was able to leak more than 5M user PII data using a really simple trick :) Enjoy! hacktus.tech/how-a-fixed-id… #BugBounty


Super nice behaviour here - nice work @castilho101

I found out that you can use "ftp::" to convert a limited Dom Clobering situation into a full CSPT. Then, while talking about it with @LooseSecurity, he found that we can also use "https::" This can be used to prevent URL parsing of href, allowing us to hit other endpoints

castilho101's tweet image. I found out that you can use "ftp::" to convert a limited Dom Clobering situation into a full CSPT. Then, while talking about it with @LooseSecurity, he found that we can also use "https::"

This can be used to prevent URL parsing of href, allowing us to hit other endpoints


gr3pme reposted

The creator of HackerNotes @gr3pme showed us his note taking methodology this week. Really cool and useful insights on how he approaches his note taking and how it helps him! You can find the templates in episode 145's HackerNotes: blog.criticalthinkingpodcast.io/p/hackernotes-…


gr3pme reposted

HackerNotes TLDR for episode 145! — blog.criticalthinkingpodcast.io/p/hackernotes-… ►⠀Syntax Confusion: Two or more components in a system may interpret the same input differently due to ambiguous or inconsistent syntax rules. Learn more in @yeswehack's new blog: The Minefield Between Syntaxes:…


I’ve had a lot of questions since I’ve started hunting on how I threat model and note take for longer term success on a target. In this EP, I’ve shared how alongside the templates I use for targets. I hope y’all find it useful!

New Episode is Out! - youtu.be/rbDdiM1L2Bo In episode 145, @gr3pme lets us in on some of his notetaking tips, including his templates, threat modelling, and ways he uses notes to help with collaboration.

ctbbpodcast's tweet card. Gr3pme's Secret: Bug Bounty Note Taking Methodology (Ep. 145)

youtube.com

YouTube

Gr3pme's Secret: Bug Bounty Note Taking Methodology (Ep. 145)



gr3pme reposted

New Episode is Out! - youtu.be/rbDdiM1L2Bo In episode 145, @gr3pme lets us in on some of his notetaking tips, including his templates, threat modelling, and ways he uses notes to help with collaboration.

ctbbpodcast's tweet card. Gr3pme's Secret: Bug Bounty Note Taking Methodology (Ep. 145)

youtube.com

YouTube

Gr3pme's Secret: Bug Bounty Note Taking Methodology (Ep. 145)


gr3pme reposted

Just letting yall know that now we have a dedicated "writeups" tab on our research page! - lab.ctbb.show If you want to publish our first writeup, check the link right above "Latest Content".


Some really nice content dropped on @ctbbpodcast research. Much more to come.

3 new posts just dropped on our Research Page! - Hamid wrote about libmagic inconsistencies and how they lead to type confusion in file uploads - @J0R1AN dropped 2 new cool HTML-related tricks Check them out: lab.ctbb.show



gr3pme reposted

New Episode is Out! - youtu.be/l6O_ez2CTOo In episode 142: - @rez0__ and @gr3pme join forces to discuss Websocket research, Meta’s $111750 Bug, PROMISQROUTE, and the opportunities afforded by going full time in Bug Bounty.

ctbbpodcast's tweet card. Gr3pme's Full-Time Hunting Journey Update, Insane AI Research, And...

youtube.com

YouTube

Gr3pme's Full-Time Hunting Journey Update, Insane AI Research, And...


gr3pme reposted

Super excited to announce @gr3pme as the hacker on stage w. @Bugcrowd at @awscloud Hacker show in London next month (spots available: lnkd.in/eKsXncyE) You can catch half min of Brandyn on ITV's GMB show👇. And watch this space for the customer announcement in due course!


gr3pme reposted

After trying for 4 years, I was _finally_ awarded the H1-Elite award by @Hacker0x01 ! Thank you to all the hackers I've worked with along the way!!!

ArchAngelDDay's tweet image. After trying for 4 years, I was _finally_ awarded the H1-Elite award by @Hacker0x01 !

Thank you to all the hackers I've worked with along the way!!!

Loading...

Something went wrong.


Something went wrong.