intigriti Profile Banner
Intigriti Profile
Intigriti

@intigriti

Followers
191K
Following
16K
Media
3K
Statuses
12K

Bug bounty & VDP platform trusted by the world’s largest organisations! 🌍

Joined May 2016
Don't wanna be here? Send us removal request.
@intigriti
Intigriti
8 hours
How many issues can you spot? 🀠
Tweet media one
9
4
44
@intigriti
Intigriti
1 day
You just received a new private program invite. 🀠. What's the first vulnerability type you look for? 😎.
18
3
71
@intigriti
Intigriti
2 days
Already subscribed to Bug Bytes but you haven't received our email in your inbox?. Make sure you check your 'Updates' or 'Promotions' tab in Gmail and consider adding us to your contact lists so you never miss out on future Bug Bytes publications! πŸ›
Tweet media one
0
0
5
@intigriti
Intigriti
2 days
Latest Bug Bytes is live! πŸš€. This month's issue is as usual packed with bug bounty tips:.βœ… Evading WAFs like Cloudflare, Akamai & AWS Cloudfront.βœ… Creating your complete bug bounty automation system .βœ… A powerful, targeted backup file scanner .βœ… Bypassing CSP to achieve XSS
Tweet media one
3
14
73
@intigriti
Intigriti
2 days
@GodfatherOrwa @net_code @securitum_com @isec_pl That was it! We hope you've learned something new (and enjoyed) this thread!. If you have enjoyed this thread:.1. Follow us @INTIGRITI for more of these threads! πŸ›.2. Retweet the first Tweet to share it with your friends πŸ’™.
0
0
6
@intigriti
Intigriti
2 days
@GodfatherOrwa @net_code @securitum_com 5️⃣ Beyond SSTI. @isec_pl shares their methodology for finding and identifying a server-side template injection in Craft CMS (PHP).
Tweet card summary image
blog.isec.pl
From Server-side Template Injection to Remote Command Execution - a short story of the contact form analysis.
1
3
6
@intigriti
Intigriti
2 days
@GodfatherOrwa @net_code 3️⃣ We Hacked Apple for 3 Months: Here’s What We Found. A classic write-up by 5 talented researchers that briefly talked about their experience hacking Apple for 3 months!.
Tweet card summary image
samcurry.net
Between the period of July 6th to October 6th myself, Brett Buerhaus, Ben Sadeghipour, Samuel Erb, and Tanner Barnes worked together and hacked on the Apple bug bounty program.
1
2
9
@intigriti
Intigriti
2 days
@GodfatherOrwa 2️⃣ EJS, Server side template injection RCE. @net_code shares how he discovered a template injection in EJS, including payloads and an escalation technique to achieve RCE!.
Tweet card summary image
eslam.io
Note: The objective of this research or any similar researches is to improve the nodejs ecosystem security level. Recently i was working on a related project using one of the most popular Nodejs...
1
1
9
@intigriti
Intigriti
2 days
1️⃣ Your Full Map To Github Recon And Leaks Exposure. @GodfatherOrwa teaches how to perform advanced reconnaissance and spot vulnerabilities using GitHub search!.
Tweet card summary image
orwaatyat.medium.com
Hello My Name Orwa Atyat
1
1
14
@intigriti
Intigriti
2 days
Want to dive into forgotten bug bounty write-ups and blog posts from some of the most notable hackers in our community? 🧐. We promise that you will learn a thing or two about web security! 🀠. In this issue, we feature 5 compelling articles (that are still relevant today) from
Tweet media one
2
34
141
@intigriti
Intigriti
3 days
GitHub dork: /"sk-[a-zA-Z0-9]{20,50}"/ org:"<target>". Want a full list of GitHub dorks to try on your target? Make sure you check out our in-depth article on using GitHub search to find more vulnerabilities! πŸ‘‡.
Tweet media one
0
5
44
@intigriti
Intigriti
3 days
ChatGPT has been integrated into many companies in the past few months!. Here's a quick way to search for accidentally leaked OpenAI API keys on GitHub! πŸ‘‡
Tweet media one
4
31
201
@intigriti
Intigriti
4 days
DomLoggerpp by @kevin_mizu is a simple web extension that helps you identify JavaScript DOM sinks that could lead to DOM-based vulnerabilities (such as XSS)! 😎 . Check it out! πŸ‘‡ .πŸ”—
Tweet media one
1
54
264
@intigriti
Intigriti
5 days
Follow us @INTIGRITI for more articles like these!! πŸ’™ πŸ’™.
0
0
1
@intigriti
Intigriti
5 days
Firebase targets are often overlooked. Causing security misconfigurations to stay undiscovered for months 😬. Unlike AWS S3 buckets, Firebase uses custom security rules that are more complex to get right. In our latest article, we covered several ways to find security
Tweet media one
2
36
154
@intigriti
Intigriti
5 days
For more context, make sure you read our in-depth article on identifying the server's origin IP! πŸ‘‡.
Tweet media one
0
3
21
@intigriti
Intigriti
5 days
πŸ’‘ Quick tip!. Need to identify the origin server behind a WAF or CDN? Historical datasets are your friend! 🀠. Historical datasets of SSL/TLS certificates & DNS records can sometimes contain the IP of the origin server before it was in-front of a CDN. Example with
Tweet media one
1
21
117