yeswehack Profile Banner
YesWeHack ⠵ Profile
YesWeHack ⠵

@yeswehack

Followers
40K
Following
8K
Media
2K
Statuses
8K

Global Bug Bounty & Vulnerability Management Platform 🎯 https://t.co/57gODBq2WZ 👾 https://t.co/ICc6RyhJTp 💡 https://t.co/KNYxhkKuzt

World
Joined July 2012
Don't wanna be here? Send us removal request.
@yeswehack
YesWeHack ⠵
2 days
In the latest episode of #TalkiePwnii, @pwnwithlove kicks off a brand-new Android hacking series! 📱 Learn how to set up Genymotion, Android Studio and the essential tools to start hunting on mobile. Ready? 👇 #BugBountyTips #YesWeRHackers https://t.co/2iQTDnyY0p
0
6
50
@yeswehack
YesWeHack ⠵
11 hours
Next stop: London for Black Hat Europe! 🇬🇧 Curious to meet the @yeswehack team, learn more about our Bug Bounty platform, and grab some cool swag? 😎 Come say hi on booth 621, December 10-11! 📅 👉 More info: https://t.co/AdMoMYofpF @BlackHatEvents #BHEU
Tweet card summary image
yeswehack.com
Connect with YesWeHack at Black Hat Europe 2025 on December 10-11 in London to discover our vulnerability management solutions and meet our experts.
0
2
20
@yeswehack
YesWeHack ⠵
3 days
Ever heard of Frida CodeShare? 🎯 It's a community repository featuring pre-built scripts for SSL pinning bypass, root detection, crypto hooks, and more - ready to load instantly. Learn more about Frida in our guide 👇 #BugBounty #BugBountyTips https://t.co/w5HT81dboK
Tweet card summary image
yeswehack.com
Covering the pros and cons of emulators versus real devices, and how to configure Magisk, Burp, Frida, Medusa and other mobile hacking tools.
0
11
47
@yeswehack
YesWeHack ⠵
5 days
Our Halloween contest has come to an end! ⏰ Thanks to everyone who joined the fun - and big congrats to @OX0DAYS, who just won a swag pack! Check your DMs 👻 We're counting on you to wear your best @yeswehack outfit for Halloween next year!
@yeswehack
YesWeHack ⠵
8 days
Last-minute costume idea: hacker at @YesWeHack 🕷️💻 Don't have what you need? Try your luck to win a swag pack! To enter: 👉 Follow us 👉 Comment your fav Halloween emojis Winners (one here, one on LinkedIn) will be announced Monday, 11AM CET. Good luck, spooky hackers! 💀
2
3
25
@Grayscale
Grayscale
11 hours
TODAY: Stop by Flatiron Public Plaza to learn about Grayscale CoinDesk Crypto 5 ETF (Ticker: $GDLC) and the underlying tokens. Bitcoin Ethereum $SOL $XRP $ADA We’ll be sharing how $GDLC streamlines crypto exposure and giving attendees a limited-edition Grayscale Speedcube to
42
96
608
@yeswehack
YesWeHack ⠵
8 days
Last-minute costume idea: hacker at @YesWeHack 🕷️💻 Don't have what you need? Try your luck to win a swag pack! To enter: 👉 Follow us 👉 Comment your fav Halloween emojis Winners (one here, one on LinkedIn) will be announced Monday, 11AM CET. Good luck, spooky hackers! 💀
251
25
281
@yeswehack
YesWeHack ⠵
8 days
We’re dropping a beginner friendly Halloween CTF: Ghost Whisper! 👻 We built a spooky web challenge that hides an OS command injection, exploit the bug and whisper to the shell to capture the flag. Solve it and boost your @yeswehack profile 👇 https://t.co/Q9NV2HGfBL
1
7
45
@yeswehack
YesWeHack ⠵
8 days
We’re teaming up with #BZHunt and @AnDaolVras to organise a Live #BugBounty event dedicated to students, on Nov 7! Students from six schools will get 9 hours to find bugs on exclusive targets during @UYBHYS. May the best team win ⚡ More info:
unlockyourbrain.bzh
Le Bug Bounty le plus à l'Ouest !
0
2
18
@yeswehack
YesWeHack ⠵
8 days
HTTP request smuggling vulnerabilities have been evolving like crazy in recent years! 🚀 We’ve published a guide to this in-vogue area of research, comprising detection, exploitation and mitigation tips 👇 https://t.co/k2waincerJ #BugBounty #BugBountyTips
Tweet card summary image
yeswehack.com
A practical guide to a rejuvenated field of security research that starts with the basics and moves to advanced detection, exploitation and mitigation techniques.
0
22
126
@yeswehack
YesWeHack ⠵
9 days
The solution to our latest Dojo challenge, Chainfection, is out! See how an SQL injection and path traversal were chained to achieve remote code execution (RCE). 👀 Full write-up here 👇 https://t.co/qoOAi0iDh4
Tweet card summary image
yeswehack.com
Winners & best write-up for Dojo – Chainfection: exploiting a CVE chain to achieve RCE
1
4
28
@yeswehack
YesWeHack ⠵
10 days
Noticed Android apps getting only 5 reports while the web gets 150? 📱 Far fewer hunters tackle mobile targets because setting up a mobile testing environment is a pain. Let's change that! Read our guide to build your Android lab once and for all 👇 https://t.co/A7EAPoKf3U
Tweet card summary image
yeswehack.com
Covering the pros and cons of emulators versus real devices, and how to configure Magisk, Burp, Frida, Medusa and other mobile hacking tools.
1
23
107
@yeswehack
YesWeHack ⠵
10 days
“The program has delivered exactly what we hoped for: meaningful engagement with the security community, early detection of vulnerabilities and a stronger overall security posture” 💥 Don’t miss out on @TeamViewer’s customer story 👇
0
1
23
@PepeTheGod_GD
PepeTheGod_GD
5 days
Trip or Treat got into the Spooky Gauntlet...nine months ago I didn't have any rates. I never thought I would achieve anything of this caliber, now I'm cemented in the GD Progression. THANK YOU EVERYONE, especially Kwoob, Silvow, LRH, and WKGoated for building with me!!! ^w^
16
15
221
@yeswehack
YesWeHack ⠵
11 days
We have our monthly Dojo champions! 🏆 Massive congrats to Flavius, dev_urandom and vh for solving Chainfection - you’ve earned yourself a @yeswehack swag pack🎁 Keep an eye on your mailbox 📬 Didn’t win this time? Stay tuned: https://t.co/FFtBrOkn8W #BugBounty #CTF
1
3
22
@yeswehack
YesWeHack ⠵
11 days
🛡 @mindefsg has launched its latest Bug Bounty Programme with @yeswehack! 🤝 MINDEF's collaboration with the global security community demonstrates their commitment in strengthening critical digital infrastructure and building cyber resilience. 🔗 Read more:
0
3
45
@yeswehack
YesWeHack ⠵
11 days
One small tweak – like changing an id from 1 to 2 – can be all it takes to exploit an IDOR 🙀 @amrelsagaei walks through IDOR hunting from first principles in his latest video. Curious how simple mistakes can cause high impact bugs? 👉 https://t.co/VME0lUn2nQ #BugBounty
0
7
44
@garethheyes
Gareth Heyes \u2028
15 days
The best thing I've read in months. Outstanding research.
@yeswehack
YesWeHack ⠵
15 days
Find the full article here ⤵️ https://t.co/QhORQbKBIn
2
12
97
@yeswehack
YesWeHack ⠵
14 days
SSL pinning blocking your traffic? Medusa by @Ch0pin comes with ready Frida scripts for common bypasses, with many modules including ssl unpinning to test against pinned apps. Full setup guide 👉 https://t.co/A7EAPoKf3U #BugBounty #BugBountyTips
Tweet card summary image
yeswehack.com
Covering the pros and cons of emulators versus real devices, and how to configure Magisk, Burp, Frida, Medusa and other mobile hacking tools.
0
19
154
@ctbbpodcast
Critical Thinking - Bug Bounty Podcast
15 days
HackerNotes TLDR for episode 145! — https://t.co/JylAVzYpGa ►⠀Syntax Confusion: Two or more components in a system may interpret the same input differently due to ambiguous or inconsistent syntax rules. Learn more in @yeswehack's new blog: The Minefield Between Syntaxes:
Tweet card summary image
blog.criticalthinkingpodcast.io
A 'by Hackers for Hackers' podcast focused on technical bug bounty content.
0
5
46
@yeswehack
YesWeHack ⠵
15 days
Last days to join the action! The Dojo challenge 'Chainfection' is open until Oct 26th ⏰ There’s still time to submit your solution and boost your chances of landing private bug bounty invites as a new hunter! 🕵️ Let's hack 👉 https://t.co/5Q9id4Jjc3 #CTF #BugBounty
0
1
13