saur1n's profile picture. learning, breaking🔁 |
bug bounty hunter in my free time at @intigriti

manuel valdez⛩️

@saur1n

learning, breaking🔁 | bug bounty hunter in my free time at @intigriti

Pinned

I'm going to explain how I found two OS command injection vulnerabilities a few days ago. The vulnerabilities were quite easy to exploit once the injection points were identified.


manuel valdez⛩️ reposted

Bug Bounty Tip: Don't compare your day-to-day with someone else's wins. Behind every $10K bug post are dozens of duplicates, N/As, and dead ends. Stay consistent; that's what really counts.


Privates VDPs is nasty work!!


manuel valdez⛩️ reposted

To new comers, Everything you need to learn about bug bounty is available online for free. Stay curious.


These ones caught me off guard😳. Really cool initiative for starters and also a lot of invites too @Hacker0x01

saur1n's tweet image. These ones caught me off guard😳. Really cool initiative for starters and also a lot of invites too
@Hacker0x01
saur1n's tweet image. These ones caught me off guard😳. Really cool initiative for starters and also a lot of invites too
@Hacker0x01

I just found my first SSRF on @Hacker0x01 The client had a pretty decent defenses against this kind of vulnerability but once again I was able to bypass it setting a redirect to their internal network. #bugbountytip #TogetherWeHitHarder

saur1n's tweet image. I just found my first SSRF on @Hacker0x01

The client had a pretty decent defenses against this kind of vulnerability but once again I was able to bypass it setting a redirect to their internal network.

#bugbountytip
#TogetherWeHitHarder

The pleasure was mine watching the master at SQLi at work :)

We earned a $15,000 bounty on @Hacker0x01 with @saur1n! His persistence on the target paid off, uncovering SQLi leads on a major social network. The exploit was straightforward once the query structure leaked due to verbose errors, revealing the injection point by commenting.…

mcipekci's tweet image. We earned a $15,000 bounty on @Hacker0x01 with @saur1n! His persistence on the target paid off, uncovering SQLi leads on a major social network.

The exploit was straightforward once the query structure leaked due to verbose errors, revealing the injection point by commenting.…


🤌🏻

We've added a drop-down menu to list all the requests sent inside each Replay session, inspired by @ngalongc 🙌 Click "History" and use the search bar inside to quickly find important requests. Part of Caido v0.52.0 → caido.io/blog/2025-09-2…



manuel valdez⛩️ reposted

Learning, learning, keep learning


I CALLED IT!

I know there's a sqli somewhere in here



I know there's a sqli somewhere in here


Gotta love bypasses!

saur1n's tweet image. Gotta love bypasses!

Just scored a reward @intigriti, check my profile: app.intigriti.com/profile/saurinn Bug: Another full read SSRF leading to exfil. of AWS EC2 temp. keys :) Sent the report yesterday, today was triaged and rewarded 🚀 #HackWithIntigriti



Just scored a reward @intigriti, check my profile: app.intigriti.com/profile/saurinn Bug: Another full read SSRF leading to exfil. of AWS EC2 temp. keys :) Sent the report yesterday, today was triaged and rewarded 🚀 #HackWithIntigriti


Asking basic nmap stuff back in 2018, if I only would've been consistent enough...

So no -T4 and mtu < 1500 the question is what would be an efficient value of mtu to bypass *most* of firewalls/IDS/* -without sacrificing so much time-



😳

Yeh the 8x on the iPhone 17 Pro is pretty sick.

UltraLinx's tweet image. Yeh the 8x on the iPhone 17 Pro is pretty sick.
UltraLinx's tweet image. Yeh the 8x on the iPhone 17 Pro is pretty sick.


Loading...

Something went wrong.


Something went wrong.