gr3pme Profile Banner
gr3pme Profile
gr3pme

@gr3pme

Followers
2K
Following
3K
Media
14
Statuses
316

Cohost @ctbbpodcast || Bug Bounty Hunter || OSWE, OSCP

Joined January 2019
Don't wanna be here? Send us removal request.
@gr3pme
gr3pme
13 hours
First full squad episode = one of the most fun to date. Our Halloween special is live ๐Ÿ‘€๐ŸŽƒ
@ctbbpodcast
Critical Thinking - Bug Bounty Podcast
15 hours
Justin got FIRED?! - https://t.co/HiRpD5eG9z In ep. 146, the boys sit down to celebrate the spooky season by telling us their scariest hacking stories. Grab your flashlight, a blanket and come listen to what happens when hacking goes a little too far! ๐Ÿ‘ป
1
0
12
@Rhynorater
Justin Gardner
14 hours
When I say this is a crazy episode of CTBB...
4
9
105
@H4cktus
Hazem
2 days
Been a while since I wrote a blog post, so here is a funny one about how I was able to leak more than 5M user PII data using a really simple trick :) Enjoy! https://t.co/XktgYX2XwB #BugBounty
Tweet card summary image
hacktus.tech
When I start looking at a target in finance, medical, etc, I always go for the most valuable data. In this case, on a major application we'll call "Redacted Corp," that meant file uploads. Invoices,...
12
46
272
@gr3pme
gr3pme
4 days
@cametome006 @albinowax, following on from your CTB episode - perhaps frameworks like this could help you spin up labs in a fairly painless way?
0
0
3
@gr3pme
gr3pme
4 days
Havenโ€™t tested it yet, but love the idea: a frictionless way to spin up a lab from research you've read or your own notes. Even cooler - it grew out of a podcast episode. Nice work, @cametome006.
@cametome006
Fahad
5 days
Built LabGenie: a multi-agent framework that automatically converts security write-ups into hands-on labs. We're drowning in amazing vulnerability write-ups, but have no easy way to practice them in their original context. Blog:
2
0
7
@gr3pme
gr3pme
4 days
Super nice behaviour here - nice work @castilho101
@castilho101
castilho
4 days
I found out that you can use "ftp::" to convert a limited Dom Clobering situation into a full CSPT. Then, while talking about it with @LooseSecurity, he found that we can also use "https::" This can be used to prevent URL parsing of href, allowing us to hit other endpoints
0
0
24
@ctbbpodcast
Critical Thinking - Bug Bounty Podcast
5 days
The creator of HackerNotes @gr3pme showed us his note taking methodology this week. Really cool and useful insights on how he approaches his note taking and how it helps him! You can find the templates in episode 145's HackerNotes: https://t.co/JylAVzXRQC
0
32
187
@ctbbpodcast
Critical Thinking - Bug Bounty Podcast
7 days
HackerNotes TLDR for episode 145! โ€” https://t.co/JylAVzYpGa โ–บโ €Syntax Confusion: Two or more components in a system may interpret the same input differently due to ambiguous or inconsistent syntax rules. Learn more in @yeswehack's new blog: The Minefield Between Syntaxes:
Tweet card summary image
blog.criticalthinkingpodcast.io
A 'by Hackers for Hackers' podcast focused on technical bug bounty content.
0
5
46
@gr3pme
gr3pme
8 days
Iโ€™ve had a lot of questions since Iโ€™ve started hunting on how I threat model and note take for longer term success on a target. In this EP, Iโ€™ve shared how alongside the templates I use for targets. I hope yโ€™all find it useful!
@ctbbpodcast
Critical Thinking - Bug Bounty Podcast
8 days
New Episode is Out! - https://t.co/U89DFxkxIm In episode 145, @gr3pme lets us in on some of his notetaking tips, including his templates, threat modelling, and ways he uses notes to help with collaboration.
0
1
25
@ctbbpodcast
Critical Thinking - Bug Bounty Podcast
8 days
New Episode is Out! - https://t.co/U89DFxkxIm In episode 145, @gr3pme lets us in on some of his notetaking tips, including his templates, threat modelling, and ways he uses notes to help with collaboration.
0
11
78
@ctbbpodcast
Critical Thinking - Bug Bounty Podcast
10 days
Just letting yall know that now we have a dedicated "writeups" tab on our research page! - https://t.co/2xC3e5bVZC If you want to publish our first writeup, check the link right above "Latest Content".
lab.ctbb.show
A โ€˜by Hackers for Hackersโ€™ podcast focused on technical content ranging from bug bounty tips, to write-up explanations, to the latest exploitation techniques.
0
8
75
@gr3pme
gr3pme
21 days
Its official! Iโ€™m now a cohost on @ctbbpodcast. Super happy to be able to continue contributing to the pod and the community alongside my pals @Rhynorater and @rez0__ ! Thanks yaโ€™ll for the support!
14
2
122
@gr3pme
gr3pme
24 days
Some really nice content dropped on @ctbbpodcast research. Much more to come.
@ctbbpodcast
Critical Thinking - Bug Bounty Podcast
25 days
3 new posts just dropped on our Research Page! - Hamid wrote about libmagic inconsistencies and how they lead to type confusion in file uploads - @J0R1AN dropped 2 new cool HTML-related tricks Check them out:
0
0
6
@ctbbpodcast
Critical Thinking - Bug Bounty Podcast
29 days
New Episode is Out! - https://t.co/vr0bGZYA3H In episode 142: - @rez0__ and @gr3pme join forces to discuss Websocket research, Metaโ€™s $111750 Bug, PROMISQROUTE, and the opportunities afforded by going full time in Bug Bounty.
2
4
71
@marketingrckstr
๐–๐–†๐–˜๐–Ž๐–‘๐–Š๐–Ž๐–”๐–˜
1 month
Super excited to announce @gr3pme as the hacker on stage w. @Bugcrowd at @awscloud Hacker show in London next month (spots available: https://t.co/N1nkZ3eDEU) You can catch half min of Brandyn on ITV's GMB show๐Ÿ‘‡. And watch this space for the customer announcement in due course!
2
3
10
@ArchAngelDDay
Douglas Day
1 month
After trying for 4 years, I was _finally_ awarded the H1-Elite award by @Hacker0x01 ! Thank you to all the hackers I've worked with along the way!!!
30
5
214
@Rhynorater
Justin Gardner
2 months
Amazing episode with @PortSwiggerRes's @albinowax. Back when I started the pod in 2023, I envisioned episodes just like this. High signal, technical, depthful. If you're gonna catch any episode of CTBB, this would be a good one: https://t.co/3xcwRrw7Ha
2
21
138
@gr3pme
gr3pme
5 months
x has been fire this week for tips. Thank you @J0R1AN ๐Ÿ™
@J0R1AN
Jorian
5 months
Small tip for the JavaScript reverse engineers out there, Chrome has a `debug()` function which triggers a breakpoint whenever its first argument is called. It even works on built-in methods, no more wrapping stuff in proxies :D debug(DOMParser.prototype.parseFromString)
0
1
18