v0sx9b's profile picture. .HACK.

Bull

@v0sx9b

.HACK.

Pinned

Stealing 10,000$ Yahoo Cookies! witcoat.blogspot.in/2017/12/steali…


Bull reposted

We've just published 'Smashing the state machine: the true potential of web race conditions' by @albinowax! Dive in to arm yourself with novel techniques & tooling, and help reshape this attack class: portswigger.net/research/smash…


Bull reposted

GitLab disclosed a bug submitted by @v0sx9b: hackerone.com/reports/1923672 - Bounty: $2,450 #hackerone #bugbounty

disclosedh1's tweet image. GitLab disclosed a bug submitted by @v0sx9b: hackerone.com/reports/1923672 - Bounty: $2,450 #hackerone #bugbounty

Account takeover on gitlab .com using signin with google: hackerone.com/reports/1923672


Nothing Feels Better than your First ever House. Exactly How we(& @_tabahi ) ever imagined it and Luxuries. 🎉 #Bugbounty

v0sx9b's tweet image. Nothing Feels Better than your First ever House. Exactly How we(& @_tabahi ) ever imagined it and Luxuries.  🎉 #Bugbounty
v0sx9b's tweet image. Nothing Feels Better than your First ever House. Exactly How we(& @_tabahi ) ever imagined it and Luxuries.  🎉 #Bugbounty

Bull reposted

📢 This Thursday (6 pm EEST), we are holding AMA session with @_tabahi, a famous hacker, bug bounty hunter, and cybersecurity expert. We will speak about bug bounties and web app hacking 🧑‍💻 Set a reminder and drop your questions below🙂


Excited to have joined Appsec@noon ! 🎉


Purrrrrr + 1

v0sx9b's tweet image. Purrrrrr + 1
v0sx9b's tweet image. Purrrrrr + 1
v0sx9b's tweet image. Purrrrrr + 1

Bull reposted

Have a read of my new blog post on escaping privileged Docker containers. This builds on the cgroups `release_agent` technique published by @_fel1x last year. It's been really fun learning more about this technique and applying it in different environments ajxchapman.github.io/containers/202…


Bull reposted

Published a new write-up Site Wide CSRF on @Glassdoor blog.witcoat.com/2020/12/03/sit…


Go go @_tabahi , #2! 😁 great job! #h12010

v0sx9b's tweet image. Go go @_tabahi , #2! 😁 great job! #h12010

Bull reposted

How I Hacked Facebook Again! Unauthenticated RCE on MobileIron MDM (slides inside) blog.orange.tw/2020/09/how-i-… #HITCON


Awesome! 👏 helpfull!

Slides for "Attacking Secondary Contexts in Web Applications" - docs.google.com/presentation/d…



Loading...

Something went wrong.


Something went wrong.