haxor31337 Profile Banner
Tuan Anh Nguyen⚡️ 🇻🇳 Profile
Tuan Anh Nguyen⚡️ 🇻🇳

@haxor31337

Followers
15K
Following
18K
Media
221
Statuses
3K

29 y/o Bug Bounty Hunter and Red Teamer at Viettel Cyber Security. Brand Ambassador @Hacker0x01 - Researcher Spotlight @Bugcrowd

Hà Nội, Việt Nam
Joined December 2012
Don't wanna be here? Send us removal request.
@haxor31337
Tuan Anh Nguyen⚡️ 🇻🇳
3 years
I'm happy to share my story on bug bounty journey. Thanks bugcrowd for choosing me to make inspire everyone in the community 🙏 Be patient, focus and keep ethical success will come to you 💯💪🔥
@Bugcrowd
bugcrowd
3 years
Researcher Spotlight 🔦 Security Engineer, Redteam, and #bugbounty #hacker! 🚨 @haxor31337 💬 https://t.co/8e9xzPuEvS
11
8
134
@OpenAI
OpenAI
15 days
Now in private beta: Aardvark, an agent that finds and fixes security bugs using GPT-5. https://t.co/xwtJhfDM3X
296
719
5K
@haxor31337
Tuan Anh Nguyen⚡️ 🇻🇳
1 month
Love this creative chain exploit. So amazing 💯 Great reproduce PoC 🔥
@watchtowrcyber
watchTowr
1 month
The watchTowr Labs team is back, providing our full analysis of the Oracle E-Business Suite Pre-Auth RCE exploit chain (CVE-2025-61882). Enjoy with us (or cry, your choice..) https://t.co/ffDKb723N6
0
1
8
@stephenfewer
Stephen Fewer
1 month
We just posted our AttackerKB @rapid7 Analysis for the recent Cisco ASA 0day chain; CVE-2025-20362 and CVE-2025-20333. The auth bypass appears to be a patch bypass of an older 2018 vuln. The buffer overflow is in a Lua endpoint, but unsafe native code operations allow a buffer to
Tweet card summary image
attackerkb.com
On September 25, 2025, Cisco published advisories for two new vulnerabilities, CVE-2025-20362, and CVE-2025-20333, which are known to be exploited in-the-wild …
4
70
205
@damian_89_
Damian Strobel
1 month
Interested in Spring Boot Actuators in the context of bug bounty hunting? I wrote something - nothing new - just some insights ;) Article: https://t.co/aki2AaEZER Retweet appreciated! Dont expect 0days or some fancy magic.
dsecured.com
Practical guide to Java/Spring Boot pentests: Discovering Actuator, header and path bypasses, heap dump analysis, and countermeasures.
5
75
254
@elijahliststeve
Steve Shultz
5 days
“I've taken that same anointing upon Ronald, speaking of Ronald Reagan, and I've put it upon my Donald .” @TheElijahList @ElijahStreamsTV
0
28
173
@DarkNavyOrg
DARKNAVY
2 months
We triggered WhatsApp 0-click on iOS/macOS/iPadOS. CVE-2025-55177 arises from missing validation that the [Redacted] message originates from a linked device, enabling specially crafted DNG parsing that triggers CVE-2025-43300. Analysis of Samsung CVE-2025-21043 is also ongoing.
35
268
1K
@ITSecurityguard
Patrik Fehrenbach
2 months
Ever stumbled on an AEM box and thought “ok… now what?” 😏 We dropped hopgoblin — new research + tool XXE, SSRF, XSS & more (CVE-2025-54251, -54249, -54252, -54250/47/48/46). 👀 time for some crits eh? 👉 https://t.co/mt7Hy0L8DN
3
38
227
@haxor31337
Tuan Anh Nguyen⚡️ 🇻🇳
2 months
We will have a small game show with attractive gifts at the booth. Visit and share about hacking with my team @ViettelCyberSec 🔥🔥🔥
0
0
0
@haxor31337
Tuan Anh Nguyen⚡️ 🇻🇳
2 months
Checkin at #ROOTCON now Amazing conference and can't wait to see hacker guys here 🤩
1
1
6
@anduriltech
Anduril Industries
3 days
Today and every day, Anduril honors our heroes. Veterans are core to our mission. They make up over 13% of our employee base. That’s more than twice the share in the US Labor Force. We asked our employees to nominate their Veteran teammates to recognize their impact. Here's
22
77
981
@haxor31337
Tuan Anh Nguyen⚡️ 🇻🇳
2 months
@japzdivino @shipcod3 See you tomorrow 👋
1
0
2
@haxor31337
Tuan Anh Nguyen⚡️ 🇻🇳
2 months
I am in Manila for a private workshop and will be at #RootCon this year. If you are in Manila we can meet at Viettel Cyber ​​Security Booth @japzdivino
4
2
62
@sekurlsa_pw
🕳
2 months
Scattered Spider methods to gain access, publicly available legitimate tools and malware. source: https://t.co/MUeNdFdpoy
@vxunderground
vx-underground
2 months
The craziest thing about the entire Scattered Spider trilogy is how simple they operated and how effective it was They didn't utilize 0day exploits. They didn't utilize novel and "undetectable" malware. They didn't exploit N-days or try to find vulnerable external facing
5
60
367
@haxor31337
Tuan Anh Nguyen⚡️ 🇻🇳
2 months
Tran Trung Kien (M4n0w4r) @kienbigmummy with his topic: APT35: The Silent Adversary Under the Radar 👀🔥 🌟 Agenda: https://t.co/iszlixaSfN
0
1
5
@haxor31337
Tuan Anh Nguyen⚡️ 🇻🇳
2 months
0
0
1
@haxor31337
Tuan Anh Nguyen⚡️ 🇻🇳
2 months
The information security arena at #SecurityBootcamp2025 is very hot 🔥🔥🔥 Where all information security professionals demonstrate their attack-defense skills to exploit vulnerabilities and defend their information systems 💪
4
1
57
@infosec_au
shubs
2 months
My favourite finding from @SLCyberSec's Security Research team in 2025 so far is a secondary context path traversal in Omnissa Workspace One UEM (CVE-2025-25231). Really interesting bug, and fun kill chain to RCE.
Tweet card summary image
slcyber.io
Secondary Context Path Traversal vulnerability in Omnissa Workspace One UEM (CVE-2025-25231) that leads to pre-auth API access as a super admin.
4
50
200
@urlscanio
urlscan.io
2 months
Thanks to the awesome work by our team we can finally announce our official urlscan cli tool: https://t.co/CpiL9jUdDv - Submit scans, run searches, find domains, get creative. Feel free to share your use-cases with us on X! Download on Github or homebrew.
6
103
350
@vulnano
Dzmitry Lukyanenko
2 months
Short writeup about bug which helped me to win Meta BountyCon 2024 hacking event
15
72
273
@infinitelogins
Harley Kimball
2 months
This week, Disclosed. #BugBounty Spotlight on Android labs, LLM “sleeper” agents, big bounties for NGINX & GPT‑5, Zoomtopia & IoT hackathons, write‑ups on SSRF, UUID takeover & RXSS escalation, plus upgraded tools and hunting tips. Full issue →
Tweet card summary image
getdisclosed.com
The bug bounty world, curated.
5
11
50
@infinitelogins
Harley Kimball
3 months
This week, Disclosed. #BugBounty Spotlight on CodeRabbit Exploit, NahamSec’s DEF CON vlog, Swiss Post’s €230K challenge, new tools for hunters, and more. Full issue → https://t.co/Affe2Yws7J Highlights below 👇 @KudelskiSec details how vulnerabilities in CodeRabbit’s AI
Tweet card summary image
getdisclosed.com
The bug bounty world, curated.
5
17
61
@0xzak
zak.eth
3 months
I've been in crypto for over 10 years and I’ve Never been hacked. Perfect OpSec record. Yesterday, my wallet was drained by a malicious @cursor_ai extension for the first time. If it can happen to me, it can happen to you. Here’s a full breakdown. 🧵👇
543
1K
9K