Intigriti
@intigriti
Followers
199K
Following
17K
Media
4K
Statuses
13K
Bug bounty & VDP platform trusted by the worldโs largest organisations! ๐
Joined May 2016
A full week into #BugQuest2025! ๐ฅ Yesterday, we shared a quick (and simple) tip to uncover hidden directories. Today, we're taking content discovery a step further by fuzzing with multiple HTTP methods! ๐ค Many endpoints and API routes are configured to respond only to
1
3
31
Learn more about CSRF exploitation! ๐ https://t.co/LbKopsOASr
intigriti.com
Learn how to identify and hunt for advanced Cross-Site Request Forgery (CSRF) vulnerabilities using several different testing methods. Read the article now!
0
0
10
APOL1 Genetic Testing at No Cost to Patients! Are you incorporating APOL1 genetic testing into your workflow? Discover No-Cost APOL1 Genotyping Program for eligible patients sponsored by Vertex Pharmaceuticals. Learn more today!
17
35
200
We're now 6 days into #BugQuest2025, and we're still maintaining our focus on assets that most hunters skip! ๐ค Yesterday, we shared a method to identify hidden assets related to your target. Today, we're tackling a common mistake: ignoring subdomains that redirect! ๐ Just
0
6
34
Need a simple scanner to test for React2Shell at scale? ๐ค React2shell-scanner by @assetnote is a Python-based command-line tool that detects CVE-2025-55182 and CVE-2025-66478 in Next.js applications. It even includes support for bypassing WAF filters! ๐ ๐
4
59
401
Today marks day 5 of #BugQuest2025, and we're still trying to uncover assets in the most unexpected places! ๐ Yesterday, we shared a simple method to find forgotten hosts. Today, we're using something even more hidden in plain sight: copyright notices! ๐ค Most developers
0
3
28
@Krevetk0Valeriy @hoyahaxa @LaxmanMuthiyah That was it! We hope you've learned something new (and enjoyed) this thread! If you have enjoyed this thread: 1. Follow us @INTIGRITI for more of these threads! ๐ 2. Retweet the first Tweet to share it with your friends ๐
1
1
6
@Krevetk0Valeriy @hoyahaxa 5๏ธโฃ How I Found A Vulnerability To Hack iCloud Accounts @laxmanmuthiyah details discovering an account takeover vulnerability in Apple's forgot password endpoint that bypassed multiple security measures, earning an $18,000 bounty! https://t.co/vO7DhXYhkC
1
0
4
@Krevetk0Valeriy @hoyahaxa 4๏ธโฃ Password Reset to Admin Access This security researcher documents how a temporary password reset token granted full admin authorization in API calls, allowing complete access to all data and functions in the environment! https://t.co/FxKAXpTwBI
medium.com
While testing a web application that used a web GUI over the top of an API, I noted the calls to the API where authorized with a JWT tokenโฆ
1
0
3
@Krevetk0Valeriy @hoyahaxa 3๏ธโฃ Gaining Access to Protected Components This security researcher shares how exported Android activities can be exploited to access protected components and content providers, exposing sensitive data stored within apps! https://t.co/j5zCwg4t9W
blog.mzfr.me
In the previous post I talked about what activities are and how we can exploit exported activities. In this post, Iโll show you how an attacker might be able to access the components which are...
1
0
3
@Krevetk0Valeriy 2๏ธโฃ SSRF in ColdFusion/CFML Tags and Functions @HoyaHaxa documents dozens of unexpected ColdFusion tags and functions that can process URLs, leading to SSRF vulnerabilities when handling user input! https://t.co/g67REEdXSk
hoyahaxa.com
1
1
4
1๏ธโฃ SSRF Vulnerability due to Sentry Misconfiguration @Krevetk0Valeriy shares how misconfigured Sentry instances with source code scraping enabled can lead to blind SSRF vulnerabilities, allowing attackers to make requests to internal services! https://t.co/XRrfd5HeW3
krevetk0.medium.com
That story happened when I saw that disclosed report.
1
0
5
We just dove into our shelf of archived bug bounty write-ups from the most notable hackers! ๐ค In this issue, we selected 5 compelling articles (that are still relevant today) to share with you, from which you can learn something new! ๐ ๐งต ๐
1
12
90
We're 4 days into #BugQuest2025, and are still attempting to expand our attack surface... ๐ค Yesterday, we explored a unique method to find hidden, related assets. Today, we're diving into a goldmine that many bug bounty hunters often overlook: hosts with certificate issues! ๐
0
6
61
Want to find more vulnerabilities with Google search? Make sure to also have look at our blog! ๐ https://t.co/8L0jp4OWVH
intigriti.com
Google dorking is another way to leverage search engines to discover hidden assets and endpoints to increase your chances of finding vulnerabilities.
0
1
8
Google dorking is an effective recon method for discovering new hosts, paths & parameters! ๐ค Google Dorks for Bug Bounty is a list of the most common Google search queries to perform content discovery. It also comes with a tool to pre-fill your queries based on your target! ๐
3
46
331
Day 3 of #BugQuest2025 is live now! Yesterday, we shared an interesting method for discovering assets that have never been tested before. ๐ Today's tip further expands on identifying hidden assets with favicon hashes! ๐ค These seamless images that appear in your tab are much
2
8
75
Day 2 of #BugQuest2025 is live now! And we knew you would make it, that's why we made today extra special! ๐ The easiest way to find more bugs is to discover assets that have never been tested before ๐ค Virtual host fuzzing is one of the most underutilized methods for
3
12
130