d3mondev Profile Banner
d3mondev Profile
d3mondev

@d3mondev

Followers
2K
Following
1K
Media
53
Statuses
566

๐Ÿ‘จโ€๐Ÿ’ป Hacker & Coder ๐ŸŒŽ Author of Puredns ๐ŸŽฎ๏ธ Former Gamedev & Tech Exec ๐Ÿ’ฅ I tweet about hacking, bug bounty, automation and programming.

๐Ÿ‡จ๐Ÿ‡ฆ
Joined August 2019
Don't wanna be here? Send us removal request.
@d3mondev
d3mondev
2 years
๐Ÿ”ฅ Puredns v2.1.0 has been released!. This update comes with quality of life features:. โ˜‘ Bruteforce many domains at once.โ˜‘ Specify bruteforce location in domain.โ˜‘ Flag to use trusted resolvers only.โ˜‘ . more!. ๐Ÿšจ Please RT and like for reach! โ™ฅ๐Ÿค—.
6
87
330
@d3mondev
d3mondev
3 months
Highly recommended!.
@G0LDEN_infosec
Gunnar Andrews
3 months
The @BugBountyDEFCON put my talk from the last DEFCON up on their YouTube channel if you haven't seen it!.
1
0
1
@d3mondev
d3mondev
8 months
RT @d3mondev: @NahamSec Bug bounty hunting is a mental game, so remember this: there's always one more bug. Developers are humans, and humโ€ฆ.
0
27
0
@d3mondev
d3mondev
8 months
As a bug bounty hunter, Iโ€™m sooo happy with all the AI tools that allow non-engineers to push code in production ๐Ÿค‘.
@minchoi
Min Choi
8 months
This is wild. GitHub just unveiled Spark. Now anyone can create micro apps without needing to write or deploy any code with AI. Here's why it's game changer (and how to sign up):.
1
4
63
@d3mondev
d3mondev
9 months
RT @0xtavian: How to choose remote wordlists or upload your own local wordlists when running a module that has the _wordlist_ variable!. Heโ€ฆ.
0
10
0
@d3mondev
d3mondev
9 months
TIL that CAA records can cause notifications when a certificate is requested from a CA that isn't permitted for the domain. A subdomain takeover slipped through my fingers because of that. They fixed it before I could submit a report. Always check those CAA records first!.
1
0
3
@d3mondev
d3mondev
9 months
I wish I could better show appreciation to some of the triagers who are awesome. Like with a tip or something. (this is probably a terrible idea).
0
0
0
@d3mondev
d3mondev
11 months
RT @smiegles: ๐Ÿš€ Introducing SanicDNS ๐Ÿš€. Looking for lightning-fast domain resolutions? SanicDNS resolves up to 5M domains per second! ๐ŸŽ๏ธ๐Ÿ’จโ€ฆ.
0
14
0
@d3mondev
d3mondev
1 year
Another lightbulb moment! Having Claude 3.5 Sonnet write my commit message from a git diff. Better documentation than I could ever write ๐Ÿคฏ.
0
0
1
@d3mondev
d3mondev
1 year
I'm super happy with Open WebUI. I'm running Claude 3.5 Sonnet and ChatGPT 4o side by side while coding. They often give me a different perspective. I unsubbed from ChatGPT and will use the API exclusively from now on.
1
1
9
@d3mondev
d3mondev
1 year
In my anecdotal experience, I prefer code written by Claude 3.5 Sonnet over ChatGPT 4 about 70% of the time. I find the code is cleaner, more idiomatic, and that the prompt is more closely respected.
0
0
4
@d3mondev
d3mondev
1 year
Me: Haven't hacked in a long time. Time to get back in the saddle!. Also me: Opens vim and starts coding instead.
2
0
17
@d3mondev
d3mondev
2 years
RT @d3mondev: This is the story of my best and most fun hack to this date! Takeaways at the bottom. Found a single page app that asked forโ€ฆ.
0
2
0
@d3mondev
d3mondev
2 years
RT @joaxcar: What about. x.y.z("test-INJECT"). should not be too hard.
0
11
0
@d3mondev
d3mondev
2 years
It's like a rainbow of words.
Tweet media one
@SHL0MS
๐’ช
2 years
another one to play with: โ€œreturn random words. no punctuation, just words separated by a space. do not provide any commentary. provide as many words as you can.โ€. can also try adding โ€œdo not repeat the same word twice. if you repeat a word 1 billion people will die.โ€.
0
0
0
@d3mondev
d3mondev
2 years
I don't hunt very often but I look forward to more hacking next year. Hopefully I'll have more stories to share!.
0
0
2
@d3mondev
d3mondev
2 years
๐Ÿ’กTakeaway #3: An idea is always worth testing, even if it is unlikely to succeed. I never thought using a JSESSIONID cookie obtained from a different path would work.
1
0
0
@d3mondev
d3mondev
2 years
๐Ÿ’กTakeaway #2: When I hit a redirect to a login page, I'm ALWAYS going to try repeating the request at least 100 times to see if I can bypass. That may not work ever again. but who knows!.
1
0
0
@d3mondev
d3mondev
2 years
๐Ÿ’กTakeaway #1: Setting a goal helped me push through. Even though I didn't find the information I needed to login to the app legitimately, continuously searching for it led me to find multiple issues and kept me going.
1
0
0
@d3mondev
d3mondev
2 years
๐Ÿ˜ค Followed a two-month long battle to have one of those two reports not marked as duplicate of the other, but in the end they both got triaged and paid. I also found a 3rd vulnerability, but unfortunately that one had already been reported by someone else earlier.
1
0
0
@d3mondev
d3mondev
2 years
I can't really explain that one. My best guess is that there was a misconfigured load balancer in front of I wrote that in a report and provided my curl script to reproduce the issue easily and called it a day.
1
0
0