
๐๐๐ฎ๐ซ๐ซ๐๐ฏ ๐๐ฎ๐ญ๐ก๐ซ๐ ๐ฎ๐ณ
@crypt0grapherr
Followers
661
Following
845
Media
33
Statuses
171
Be Kind, Be Happy, Be Generous
INDIA
Joined August 2024
Hope you like it ๐ฅ๐ฅ #BugBountytips.I just published $1,000 Bounty for Bypassing Restrictions via Modified HTTP Request
gaurrav.medium.com
Hello,
0
20
104
Bounty amount was rewarded on old submission with new bounty table. I raised this issue 5 minutes ago and @Hacker0x01 responded and resolved within 5 minutes. Thank you @Hacker0x01 @jobertabma for quick solution #bugbounty
1
2
81
I was awarded $2,000 Bounty for another 3 Reports.#BugBounty ๐ค๐ค๐ค
#BugBounty.Reported only 90 CVE-2025-0133.2 - Pending Program Review.1 - Triaged .2 - rewarded $700(+$100$ retest) + $100.85 - Duplicates
5
6
200
#BugBounty.Reported only 90 CVE-2025-0133.2 - Pending Program Review.1 - Triaged .2 - rewarded $700(+$100$ retest) + $100.85 - Duplicates
8
6
228
#BugBountyTip .Found Swagger endpoint ?.test.yaml โ not working.test.json โ not working.test.pdf โ
WORKED ๐ธ๐ธ
5
25
302
Third bypass of my fixed XSS report.#BugBountyTip .First - basic img payload.Second - double encoded xss payload.Third - triple encoded img xss payload .#HackerOne
5
5
176
BLIND XSS #BugBountyTip :-.asset in scope wwwdotTARGET1dotcom - 403.wwwdotTARGET2dotcom - 403.wwwdotTARGET3dotcom - 403 with below error."reach to xyz@target3dotcom".1. opened gmail and added img BXSS payload in subject.2. email sent to xyz email. 3. few days later got this ๐
1
12
94
๐ฆ Proud to share my 2024 #HackerOne journey! 129 vulnerabilities reported, 68 high/critical severity findings, and a passion for web security that never sleeps! Thanks @Hacker0x01 ๐ก๏ธ #BugBounty #CyberSecurity #HackWithPurpose
0
1
34
I am not Pro , I am not Full time BBH but i improoved myself in six years ๐
.2018 - 48 rep points & -2.39 signal points .2024 - 3735 rep points & +2.14 signal points.Thank you @akita_zen (a great Man๐ซก) for this tweet ๐ป.#BugBounty.
11
2
117
#BugBountyTip $1,000 Tip ๐๐.Target/robots.txt mentioned /devuser/ is present.Target/devuser/ -> 404 .Target/devuser/FUZZ -> all 403,404.found original IP at censys .IP/devuser/ -> 403 .IP/devuser/index.php:DATA -> 200 OK.๐๐๐๐๐
10
63
491
#BugBountyTip .How i got access to Internal docx on 403 domain Which ends up on $$$$ ? ๐๐ค๐ค.Target had Asset inscope was *(.)TARGET(.)com.workdevd(.)TARGET(.)com looks interesting to me but wheni opened the domain i got error ๐ค
3
15
191