OX0DAYS Profile Banner
HUNTER Profile
HUNTER

@OX0DAYS

Followers
492
Following
9K
Media
19
Statuses
3K

/Future/Billionaire/Hacker/Web2/Web3/Trader/Crypto/Forex/NFT/Maker/SaaS/AI/IT/Services/Provider/

San Francisco, CA
Joined July 2020
Don't wanna be here? Send us removal request.
@yeswehack
YesWeHack β ΅
24 hours
Next stop: London for Black Hat Europe! πŸ‡¬πŸ‡§ Curious to meet the @yeswehack team, learn more about our Bug Bounty platform, and grab some cool swag? 😎 Come say hi on booth 621, December 10-11! πŸ“… πŸ‘‰ More info: https://t.co/AdMoMYofpF @BlackHatEvents #BHEU
Tweet card summary image
yeswehack.com
Connect with YesWeHack at Black Hat Europe 2025 on December 10-11 in London to discover our vulnerability management solutions and meet our experts.
0
3
25
@Burp_Suite
Burp Suite
2 days
Burp AI 🀝 Burp Intruder Generate and run Intruder attacks just by prompting Burp AI. It will make a quick list of payloads that you can run straight away or fine tune through Intruder.
1
24
145
@0xacb
AndrΓ© Baptista
2 days
If you found a package.json file in the wild, you might find some internal packages vulnerable to a dependency confusion attack πŸ‘€ Check for it quicker using this cool new tool by JSMon: https://t.co/zjdmSzRfqy πŸ‘‡
4
61
282
@akshay_pachaar
Akshay πŸš€
3 days
XBOW raised $117M to build AI hacking agents. Now someone just open-sourced it for FREE. Strix deploys autonomous AI agents that act like real hackers - they run your code dynamically, find vulnerabilities, and validate them through actual proof-of-concepts. Why it matters:
26
196
1K
@coffinxp7
Coffin
3 days
These three extensions will definitely help and save you time during your bug hunting process: Fake Filler, Code Formatter: js, css, json
6
46
308
@tryhackme
TryHackMe
3 days
πŸŽ‰We thought the best way to celebrate our revamped SOC L1 Learning Path… is with a GIVEAWAY for the community! Because if we level up… you should too. πŸš€ How to enter: 1️⃣ Like this post 2️⃣ Follow TryHackMe 3️⃣ Repost/share to your socials 4️⃣ Tag someone who needs to start
570
753
2K
@viehgroup
VIEH Group
6 days
Bypass WAF . . "><?/script>"><--<img+src= "><svg/onload?=alert(document.cookie)>> --!> . "-->""/>0xr3dhunt</script><deTailS open x=">" ontoggle=(co\u006efirm)``>" . "-->""/>0xr3dhunt</script><deTailS open x=">" ontoggle=(co\u006efirm(document.cookie))``>" #infosec #bugbountytips
4
60
427
@yeswehack
YesWeHack β ΅
4 days
Ever heard of Frida CodeShare? 🎯 It's a community repository featuring pre-built scripts for SSL pinning bypass, root detection, crypto hooks, and more - ready to load instantly. Learn more about Frida in our guide πŸ‘‡ #BugBounty #BugBountyTips https://t.co/w5HT81dboK
Tweet card summary image
yeswehack.com
Covering the pros and cons of emulators versus real devices, and how to configure Magisk, Burp, Frida, Medusa and other mobile hacking tools.
0
11
47
@DarkWebInformer
Dark Web Informer
5 days
Public APIs: A collective list of free APIs GitHub: https://t.co/0yInG9obgo Video: Boss AI Automations
4
94
541
@yeswehack
YesWeHack β ΅
5 days
Our Halloween contest has come to an end! ⏰ Thanks to everyone who joined the fun - and big congrats to @OX0DAYS, who just won a swag pack! Check your DMs πŸ‘» We're counting on you to wear your best @yeswehack outfit for Halloween next year!
@yeswehack
YesWeHack β ΅
8 days
Last-minute costume idea: hacker at @YesWeHack πŸ•·οΈπŸ’» Don't have what you need? Try your luck to win a swag pack! To enter: πŸ‘‰ Follow us πŸ‘‰ Comment your fav Halloween emojis Winners (one here, one on LinkedIn) will be announced Monday, 11AM CET. Good luck, spooky hackers! πŸ’€
2
3
25
@yeswehack
YesWeHack β ΅
8 days
Last-minute costume idea: hacker at @YesWeHack πŸ•·οΈπŸ’» Don't have what you need? Try your luck to win a swag pack! To enter: πŸ‘‰ Follow us πŸ‘‰ Comment your fav Halloween emojis Winners (one here, one on LinkedIn) will be announced Monday, 11AM CET. Good luck, spooky hackers! πŸ’€
256
25
282
@Bugcrowd
bugcrowd
16 days
Why IDORs are the perfect bug for beginners (with @insiderPhD)πŸ‘‡
2
6
94
@Burp_Suite
Burp Suite
17 days
Yeeeeah you could manually figure out a payload for DOM XSS... or you could just ask Burp AI to do it for you.
1
18
173
@0xacb
AndrΓ© Baptista
18 days
Found an XSS but got blocked by the CSP? https://t.co/0aA3GyIOVz has a compiled list of ways to bypass the Content-Security Policy. Check out the video below πŸ‘‡
3
209
1K
@coffinxp7
Coffin
20 days
Hi everyone! I just built a WaybackURLs extension that saves you a ton of time when gathering archive URLs. it supports main domains, wildcards, specific paths and sensitive file extensions. Give it a try and let me know your feedback! https://t.co/vezBMPFpgp
46
156
1K
@coffinxp7
Coffin
23 days
i just Updated my XSS article: added some cleaner, more effective one-liners and integrated DalFox one-liners that support extra options. Check it out. https://t.co/6rXHUfzSZY
Tweet card summary image
infosecwriteups.com
My simple yet powerful technique for spotting XSS vulnerabilities during bug hunting.
3
37
224
@Bugcrowd
bugcrowd
22 days
Perfect for IDOR hunts, messy APIs, and anyone buried in requests! πŸ”Ž Find more helpful tips here: https://t.co/CU9YqETz2P
0
1
30
@Bugcrowd
bugcrowd
22 days
IDORs in a nutshell with @insiderPhD πŸ‘‡
0
3
65
@coffinxp7
Coffin
23 days
tell me any better XSS methodology than this 😎 Explanation: This oneliner command starts by collecting all URLs from passive sources using gau tool, then filters them for potential XSS parameters using gf patterns. Next, httpx and grep are used to keep only URLs that return
16
114
734
@Burp_Suite
Burp Suite
24 days
Why spend time manually converting JSON to XML to test for XXE? Just ask Burp AI in Repeater: it handles the transformation and delivers the exploit. @NahamSec demonstrates this massive shortcut for finding complex, overlooked bugs. πŸ‘‡
0
52
329