Tuan Anh Nguyen⚡️ 🇻🇳
@haxor31337
Followers
15K
Following
18K
Media
221
Statuses
3K
29 y/o Bug Bounty Hunter and Red Teamer at Viettel Cyber Security. Brand Ambassador @Hacker0x01 - Researcher Spotlight @Bugcrowd
Hà Nội, Việt Nam
Joined December 2012
I'm happy to share my story on bug bounty journey. Thanks bugcrowd for choosing me to make inspire everyone in the community 🙏 Be patient, focus and keep ethical success will come to you 💯💪🔥
Researcher Spotlight 🔦 Security Engineer, Redteam, and #bugbounty #hacker! 🚨 @haxor31337 💬 https://t.co/8e9xzPuEvS
11
8
134
Now in private beta: Aardvark, an agent that finds and fixes security bugs using GPT-5. https://t.co/xwtJhfDM3X
296
719
5K
Love this creative chain exploit. So amazing 💯 Great reproduce PoC 🔥
The watchTowr Labs team is back, providing our full analysis of the Oracle E-Business Suite Pre-Auth RCE exploit chain (CVE-2025-61882). Enjoy with us (or cry, your choice..) https://t.co/ffDKb723N6
0
1
8
We just posted our AttackerKB @rapid7 Analysis for the recent Cisco ASA 0day chain; CVE-2025-20362 and CVE-2025-20333. The auth bypass appears to be a patch bypass of an older 2018 vuln. The buffer overflow is in a Lua endpoint, but unsafe native code operations allow a buffer to
attackerkb.com
On September 25, 2025, Cisco published advisories for two new vulnerabilities, CVE-2025-20362, and CVE-2025-20333, which are known to be exploited in-the-wild …
4
70
205
Interested in Spring Boot Actuators in the context of bug bounty hunting? I wrote something - nothing new - just some insights ;) Article: https://t.co/aki2AaEZER Retweet appreciated! Dont expect 0days or some fancy magic.
dsecured.com
Practical guide to Java/Spring Boot pentests: Discovering Actuator, header and path bypasses, heap dump analysis, and countermeasures.
5
75
254
“I've taken that same anointing upon Ronald, speaking of Ronald Reagan, and I've put it upon my Donald .” @TheElijahList @ElijahStreamsTV
0
28
173
We triggered WhatsApp 0-click on iOS/macOS/iPadOS. CVE-2025-55177 arises from missing validation that the [Redacted] message originates from a linked device, enabling specially crafted DNG parsing that triggers CVE-2025-43300. Analysis of Samsung CVE-2025-21043 is also ongoing.
35
268
1K
Ever stumbled on an AEM box and thought “ok… now what?” 😏 We dropped hopgoblin — new research + tool XXE, SSRF, XSS & more (CVE-2025-54251, -54249, -54252, -54250/47/48/46). 👀 time for some crits eh? 👉 https://t.co/mt7Hy0L8DN
3
38
227
We will have a small game show with attractive gifts at the booth. Visit and share about hacking with my team @ViettelCyberSec 🔥🔥🔥
0
0
0
Today and every day, Anduril honors our heroes. Veterans are core to our mission. They make up over 13% of our employee base. That’s more than twice the share in the US Labor Force. We asked our employees to nominate their Veteran teammates to recognize their impact. Here's
22
77
981
I am in Manila for a private workshop and will be at #RootCon this year. If you are in Manila we can meet at Viettel Cyber Security Booth @japzdivino
4
2
62
Scattered Spider methods to gain access, publicly available legitimate tools and malware. source: https://t.co/MUeNdFdpoy
The craziest thing about the entire Scattered Spider trilogy is how simple they operated and how effective it was They didn't utilize 0day exploits. They didn't utilize novel and "undetectable" malware. They didn't exploit N-days or try to find vulnerable external facing
5
60
367
Tran Trung Kien (M4n0w4r) @kienbigmummy with his topic: APT35: The Silent Adversary Under the Radar 👀🔥 🌟 Agenda: https://t.co/iszlixaSfN
0
1
5
The information security arena at #SecurityBootcamp2025 is very hot 🔥🔥🔥 Where all information security professionals demonstrate their attack-defense skills to exploit vulnerabilities and defend their information systems 💪
4
1
57
My favourite finding from @SLCyberSec's Security Research team in 2025 so far is a secondary context path traversal in Omnissa Workspace One UEM (CVE-2025-25231). Really interesting bug, and fun kill chain to RCE.
slcyber.io
Secondary Context Path Traversal vulnerability in Omnissa Workspace One UEM (CVE-2025-25231) that leads to pre-auth API access as a super admin.
4
50
200
Thanks to the awesome work by our team we can finally announce our official urlscan cli tool: https://t.co/CpiL9jUdDv - Submit scans, run searches, find domains, get creative. Feel free to share your use-cases with us on X! Download on Github or homebrew.
6
103
350
Short writeup about bug which helped me to win Meta BountyCon 2024 hacking event
15
72
273
This week, Disclosed. #BugBounty Spotlight on Android labs, LLM “sleeper” agents, big bounties for NGINX & GPT‑5, Zoomtopia & IoT hackathons, write‑ups on SSRF, UUID takeover & RXSS escalation, plus upgraded tools and hunting tips. Full issue →
getdisclosed.com
The bug bounty world, curated.
5
11
50
This week, Disclosed. #BugBounty Spotlight on CodeRabbit Exploit, NahamSec’s DEF CON vlog, Swiss Post’s €230K challenge, new tools for hunters, and more. Full issue → https://t.co/Affe2Yws7J Highlights below 👇 @KudelskiSec details how vulnerabilities in CodeRabbit’s AI
getdisclosed.com
The bug bounty world, curated.
5
17
61
I've been in crypto for over 10 years and I’ve Never been hacked. Perfect OpSec record. Yesterday, my wallet was drained by a malicious @cursor_ai extension for the first time. If it can happen to me, it can happen to you. Here’s a full breakdown. 🧵👇
543
1K
9K