YesWeHack ⠵
@yeswehack
Followers
40K
Following
8K
Media
2K
Statuses
8K
Global Bug Bounty & Vulnerability Management Platform 🎯 https://t.co/57gODBq2WZ 👾 https://t.co/ICc6RyhJTp 💡 https://t.co/KNYxhkKuzt
World
Joined July 2012
In the latest episode of #TalkiePwnii, @pwnwithlove kicks off a brand-new Android hacking series! 📱 Learn how to set up Genymotion, Android Studio and the essential tools to start hunting on mobile. Ready? 👇 #BugBountyTips #YesWeRHackers
https://t.co/2iQTDnyY0p
0
4
39
Ever heard of Frida CodeShare? 🎯 It's a community repository featuring pre-built scripts for SSL pinning bypass, root detection, crypto hooks, and more - ready to load instantly. Learn more about Frida in our guide 👇 #BugBounty #BugBountyTips
https://t.co/w5HT81dboK
yeswehack.com
Covering the pros and cons of emulators versus real devices, and how to configure Magisk, Burp, Frida, Medusa and other mobile hacking tools.
0
11
47
Our Halloween contest has come to an end! ⏰ Thanks to everyone who joined the fun - and big congrats to @OX0DAYS, who just won a swag pack! Check your DMs 👻 We're counting on you to wear your best @yeswehack outfit for Halloween next year!
Last-minute costume idea: hacker at @YesWeHack 🕷️💻 Don't have what you need? Try your luck to win a swag pack! To enter: 👉 Follow us 👉 Comment your fav Halloween emojis Winners (one here, one on LinkedIn) will be announced Monday, 11AM CET. Good luck, spooky hackers! 💀
2
3
25
Last-minute costume idea: hacker at @YesWeHack 🕷️💻 Don't have what you need? Try your luck to win a swag pack! To enter: 👉 Follow us 👉 Comment your fav Halloween emojis Winners (one here, one on LinkedIn) will be announced Monday, 11AM CET. Good luck, spooky hackers! 💀
251
25
282
We’re dropping a beginner friendly Halloween CTF: Ghost Whisper! 👻 We built a spooky web challenge that hides an OS command injection, exploit the bug and whisper to the shell to capture the flag. Solve it and boost your @yeswehack profile 👇 https://t.co/Q9NV2HGfBL
1
7
45
We’re teaming up with #BZHunt and @AnDaolVras to organise a Live #BugBounty event dedicated to students, on Nov 7! Students from six schools will get 9 hours to find bugs on exclusive targets during @UYBHYS. May the best team win ⚡ More info:
unlockyourbrain.bzh
Le Bug Bounty le plus à l'Ouest !
0
2
18
HTTP request smuggling vulnerabilities have been evolving like crazy in recent years! 🚀 We’ve published a guide to this in-vogue area of research, comprising detection, exploitation and mitigation tips 👇 https://t.co/k2waincerJ
#BugBounty #BugBountyTips
yeswehack.com
A practical guide to a rejuvenated field of security research that starts with the basics and moves to advanced detection, exploitation and mitigation techniques.
0
22
123
The solution to our latest Dojo challenge, Chainfection, is out! See how an SQL injection and path traversal were chained to achieve remote code execution (RCE). 👀 Full write-up here 👇 https://t.co/qoOAi0iDh4
yeswehack.com
Winners & best write-up for Dojo – Chainfection: exploiting a CVE chain to achieve RCE
1
4
28
Noticed Android apps getting only 5 reports while the web gets 150? 📱 Far fewer hunters tackle mobile targets because setting up a mobile testing environment is a pain. Let's change that! Read our guide to build your Android lab once and for all 👇 https://t.co/A7EAPoKf3U
yeswehack.com
Covering the pros and cons of emulators versus real devices, and how to configure Magisk, Burp, Frida, Medusa and other mobile hacking tools.
1
23
107
“The program has delivered exactly what we hoped for: meaningful engagement with the security community, early detection of vulnerabilities and a stronger overall security posture” 💥 Don’t miss out on @TeamViewer’s customer story 👇
0
1
23
For people who want to operate at the highest levels and master confidence.
0
0
4
We have our monthly Dojo champions! 🏆 Massive congrats to Flavius, dev_urandom and vh for solving Chainfection - you’ve earned yourself a @yeswehack swag pack🎁 Keep an eye on your mailbox 📬 Didn’t win this time? Stay tuned: https://t.co/FFtBrOkn8W
#BugBounty #CTF
1
3
22
🛡 @mindefsg has launched its latest Bug Bounty Programme with @yeswehack! 🤝 MINDEF's collaboration with the global security community demonstrates their commitment in strengthening critical digital infrastructure and building cyber resilience. 🔗 Read more:
0
3
45
One small tweak – like changing an id from 1 to 2 – can be all it takes to exploit an IDOR 🙀 @amrelsagaei walks through IDOR hunting from first principles in his latest video. Curious how simple mistakes can cause high impact bugs? 👉 https://t.co/VME0lUn2nQ
#BugBounty
0
7
44
The best thing I've read in months. Outstanding research.
Find the full article here ⤵️ https://t.co/QhORQbKBIn
2
12
97
SSL pinning blocking your traffic? Medusa by @Ch0pin comes with ready Frida scripts for common bypasses, with many modules including ssl unpinning to test against pinned apps. Full setup guide 👉 https://t.co/A7EAPoKf3U
#BugBounty #BugBountyTips
yeswehack.com
Covering the pros and cons of emulators versus real devices, and how to configure Magisk, Burp, Frida, Medusa and other mobile hacking tools.
0
19
153
HackerNotes TLDR for episode 145! — https://t.co/JylAVzYpGa ►⠀Syntax Confusion: Two or more components in a system may interpret the same input differently due to ambiguous or inconsistent syntax rules. Learn more in @yeswehack's new blog: The Minefield Between Syntaxes:
blog.criticalthinkingpodcast.io
A 'by Hackers for Hackers' podcast focused on technical bug bounty content.
0
5
46
Last days to join the action! The Dojo challenge 'Chainfection' is open until Oct 26th ⏰ There’s still time to submit your solution and boost your chances of landing private bug bounty invites as a new hunter! 🕵️ Let's hack 👉 https://t.co/5Q9id4Jjc3
#CTF #BugBounty
0
1
13
Guess what? @Rhynorater called this article phenomenal 👏 When even he’s learning new tricks, you know it’s worth your time. Dive into “The minefield between syntaxes: exploiting syntax confusions in the wild” 👇 https://t.co/w77p9izQMM
2
12
113