error404sec Profile Banner
error4o4 Profile
error4o4

@error404sec

Followers
3K
Following
9K
Media
256
Statuses
11K

Offensive Security | Bug Bounty Hunting and Web Application Security.

Madrid
Joined February 2010
Don't wanna be here? Send us removal request.
@error404sec
error4o4
5 years
1. Never stop learning. 2. See failure as a beginning. 3. Teach others what you know. 4. Assume nothing, question everything. 5. Analyze objectively. 6. Practice humility. 7. Respect constructive criticism. 8. Love what you do. 9. Give credit where it's due. 10. Take initiative.
5
65
224
@error404sec
error4o4
2 months
It’s really amazing to be able to ask AI and get the right answer without having to google 3 different things , but at the same time I kind of feel that it’s also making me more ignorant than before. Is there any prompt that you use to avoid this? Like… don’t show me, teach me?.
0
0
0
@grok
Grok
3 days
Join millions who have switched to Grok.
141
175
1K
@error404sec
error4o4
2 months
I would love to see someone streaming when they do their content discovery. Do you know someone that shows thar part of the recon? #bugbounty.
0
0
0
@error404sec
error4o4
2 months
I feel like BB game is definitely about being consistent and about falling and getting up again till you start finding bugs!.
0
0
4
@error404sec
error4o4
3 months
Wtf.
@disclosedh1
publiclyDisclosed
3 months
HackerOne disclosed a bug submitted by @0xw2w: - Bounty: $1,200 #hackerone #bugbounty
Tweet media one
0
0
0
@error404sec
error4o4
3 months
RT @disclosedh1: HackerOne disclosed a bug submitted by @0xw2w: - Bounty: $1,200 #hackerone #bugbounty https://t.co….
0
10
0
@error404sec
error4o4
3 months
Hands up for @S1r1u5_ and @rootxharsh for this amazing talk! I was looking for this kind of orientation! Thanks guys!.
0
1
0
@error404sec
error4o4
3 months
A reminder to myself… don’t just bookmark researches , actually make some time to read it in the week 😅.
0
0
4
@error404sec
error4o4
3 months
Im on this moment of my life where it feels real good to see other people doing bugbounty/hacking/CTF stuff (youtube), but I start to feel really anxious when I try to do stuff! Does that happen to you also?.
0
0
1
@error404sec
error4o4
3 months
Is it just me that read js files in the dev tools? I love it but I’m not sure if it’s the best way.
0
0
0
@error404sec
error4o4
3 months
When I grow up(I’m almost 40) I want to be like @Rhynorater , @rez0__ , @0xLupin and @monkehack ! What an amazing, humble and good people with great talent! I just watched @ctbbpodcast last podcast and I really loved it! You guys make a great team! 👊👏.
2
2
43
@error404sec
error4o4
4 months
Wow, nice! Google Cloud's recent acquisition and Rhynorater in the same podcast? I can't miss this one!.
@Rhynorater
Justin Gardner
4 months
Alright y'all, bonus podcast episode for y'all this week!. I had the awesome opportunity to join @AmitaiCo & Eden on @wiz_io's Crying Out Cloud podcast! It was a great chat. It was fun being on the interviewee side of a podcast for a change.
0
0
1
@error404sec
error4o4
5 months
I kinda feel this AI thing is getting out of control.
0
0
1
@error404sec
error4o4
5 months
This looks like a result of a recent commit since I checked this endpoint several times in the past and wasn’t disclosing anything of this.
@disclosedh1
publiclyDisclosed
5 months
HackerOne disclosed a bug submitted by @itsavinash_: - Bounty: $25,000 #hackerone #bugbounty
Tweet media one
0
0
0
@error404sec
error4o4
6 months
Hi @PortSwigger , does this lab written solution match the Lab? because Im having issues getting the unknown field, in the third(3) key is returning "email" field, not a reset token or something like that
Tweet media one
0
0
0
@error404sec
error4o4
6 months
Although its a different header, its funny how nobody thought before about the amazing Frans Rosen research about X-Correlation headers when there is a Lab in @PortSwigger Academy where we need to exploit a Blind SSRF abusing the way the User-Agent header is used on the server.
0
0
0
@error404sec
error4o4
6 months
Im addicted to this kind of lecture! Amazing people doing amazing things! ❤️.
@RenwaX23
‌Renwa
6 months
For this year I plan to publish a bug bounty report or an interesting topic each month. Here is a cool XSS finding which we use a 2 reflections inside a JS script context to bypass Server-Side Sanitizer, Double quote escaper and a Strict WAF.
0
0
0
@error404sec
error4o4
6 months
Looks like programming something like a wireshark/tcpdump but a simplier version would be a good exercise to improve in hacking and bug bounty!.
1
0
1
@error404sec
error4o4
7 months
Actually it’s not painful , it’s very fun! 😅.
@error404sec
error4o4
7 months
pain! 😅💪
Tweet media one
0
0
0
@error404sec
error4o4
7 months
This is what I like in the community! Its made of people who are really smart,kind and mainly they share similar good values. 💪.
@InsiderPhD
Katie Paxton-Fear
7 months
New Video!.I sit down and chat with @_godiego__, @sw33tLie and @bsysop about their recent event success and get their thoughts on collaborating with other hackers, how they all contribute to the success of their team, and get their advice for would be live hacking event teams
Tweet media one
0
0
0