
Ibrahim Abdurrahman
@ibrahim_haxor
Followers
774
Following
87
Media
8
Statuses
560
Android Software & Hardware Engineer | Ethical Hacker & Penetration Tester | Bug Bounty Hunter | Passionate About Securing Mobile Tech
Nigeria
Joined March 2012
Hey @grok, based on your analysis of the last 365 days, list in sequence 10 accounts that frequently visit my profile. Do not mention the person, only @.username and the rate of visits to the profile per month.
1
0
0
RT @H4ckmanac: šØChrome Zero-day Alert: PATCH NOWā¼ļø. Google released an emergency security update for Chrome to patch CVE-2025-6558, a high-ā¦.
0
48
0
RT @xyz_remedy: the million-dollar hackerās guide to web3 security:. bug bounties, private audits, contests & more:.
0
21
0
RT @whoareme33: I developed a free open-source new cross-platform tool for security researchers & bug bounty hunters! Upload a reproducingā¦.
0
1
0
RT @intigriti: 3 Easy-to-exploit vulnerabilities that often receive HUGE bounties! š¤ . A thread! š§µš
0
56
0
RT @kassem_S94: Just got paid $2500 on Immunefi for a CL.0 HTTP Request Smuggling bug! . š Always test api.* subdomains ā request smugglingā¦.
0
22
0
RT @0xTimofey: "You learn and you do nothing except learning". Don't ask me how I reached this wisdom, sacred knowledge that I found on a mā¦.
0
3
0
RT @coffinxp7: here we go! hope this helps every beginner trying to master the full recon to exploitation process. iāve covered every stepā¦.
infosecwriteups.com
Proven Step-by-Step Recon Techniques to Uncover Your First Vulnerabilities in Bug Bounty Programs
0
75
0
RT @gegul_: I built a real-time monitoring tool (free-tier: 1GB RAM, 1 core) to track newly deployed smart contractsābased on a recurring pā¦.
0
12
0
RT @aituglo: I wrote an article on @Bugcrowd talking about my current methodology to approach a hardened target . And Iām pretty happy withā¦.
bugcrowd.com
By staying patient and chaining small gadgets together, you can eventually uncover critical, high-impact bugs.
0
40
0
RT @BRuteLogic: A DOM-Based #XSS Polyglot. 1;/*'"><Img/Src/OnError=/**/confirm(1)//>. If your input happens to end up in the DOM via innerHā¦.
0
35
0
RT @FaIyaZz007: Ever wondered if a simple ZIP file could overwrite someone else's data on the server?. This is Zip Slip, explained with a hā¦.
0
31
0
RT @0xNForcer: Day 85 of 1001 ā Building my security portfolio in public. Placed #38 in the @jigsawdefi contest on @cantinaxyz. This is myā¦.
0
2
0
RT @08Tc3wBB: Ever wondered how easy it is to sideload apps on iOS without a computer? Using @Flekst0re with no cable, no jailbreak, I instā¦.
0
17
0
RT @ynsmroztas: I've created a simple GUI to inspect your .js.map files locally. š§© Perfect for recon, debugging, and source discovery. š I'ā¦.
0
45
0
RT @intigriti: 3ļøā£ Blind XSS. Some applications reflect and store your raw data (from HTTP requests for example) without any validation, anā¦.
0
1
0
RT @intigriti: 4ļøā£ Find hidden parameters/input fields. Hidden parameters can be vulnerable to SQLi, XSS, SSRF, etc. These parameters shoulā¦.
0
1
0
RT @intigriti: 1ļøā£ Find XXE vulnerabilities. XXE vulnerabilities are becoming quite rare to spot these days. But with this simple rule, weā¦.
0
19
0
RT @DarkWebInformer: HExHTTP: A tool designed to perform tests on HTTP headers and analyze the results to identify vulnerabilities and inteā¦.
0
165
0