kittoh_ Profile Banner
Kitto Hernandez Profile
Kitto Hernandez

@kittoh_

Followers
377
Following
38K
Media
221
Statuses
9K

will never stop pushing 🫷🏼

7,641 islands
Joined October 2017
Don't wanna be here? Send us removal request.
@RianSweetDoris
Rian Doris
21 hours
15
143
849
@nowaskyjr
Nowasky
2 days
Do you know why navigating to this still pops an alert even though it uses textContent (so HTML is escaped)? https://t.co/2MY3oaG0nK
3
3
52
@the_IDORminator
the_IDORminator
1 day
Simple SQLi I don't usually hunt SQL injection, but I will usually at least take the time to try some single quotes to see how the server responds because it only takes a few seconds. If I get a database statement or error back, or one quote errors and two single quotes does
4
27
378
@kittoh_
Kitto Hernandez
6 hours
if btc goes down to 69k, i'll go in with $100
0
0
0
@Jhaddix
JS0N Haddix
18 hours
5
16
104
@watchtowrcyber
watchTowr
2 days
🚨 The watchTowr team is rapidly reacting to CVE-2026-1281 & CVE-2026-1340 - unauth RCE vulnerabilities within Ivanti's Endpoint Manager Mobile (EPMM). Active watchTowr Platform clients have been made aware of their exposure - reach out via the watchTowr website for support.
3
22
78
@watchtowrcyber
watchTowr
21 hours
Someone knows Bash disgustingly well, and we love it. Here's our analysis of the Ivanti EPMM Pre-Auth RCE vulnerabilities - CVE-2026-1281 & CVE-2026-1340. This research fuels our technology, enabling our clients to accurately determine their exposure. https://t.co/BT9c78uuh5
Tweet card summary image
labs.watchtowr.com
When Ivanti removed the embargoes from CVE-2026-1281 and CVE-2026-1340 - pre-auth Remote Command Execution vulnerabilities in Ivanti’s Endpoint Manager Mobile (EPMM) solution - we sighed with relief....
4
53
181
@brittnaynay3
Nay.Tesseract
19 hours
🎉 $3,000 PC Giveaway 🎉 🖤 All Black MSI Stealth Build 🖤🔥 This is our last giveaway for the month, and concludes our 20k pc builds to celebrate the new year ❤️ How to Enter: 1️⃣ Like ❤️ and reshare 🔁 this post 2️⃣ Follow @brittnaynay3 @msiUSA 3️⃣ Drop a comment 💬 That’s it
19K
16K
18K
@SinSinology
SinSinology
1 day
-Drops a unsandboxed chrome RCE!!! -Gets Rewarded $250k!!!!!!!! -Asks for the report to be made public to help the community and vendors -Drives into horizon
@BugsAggregator
Security Bug Aggregator
3 days
[453094710][reward: $250000] Out-of-bound read in the jmp table of ActiveMediaSessionController leads to sandbox escape. https://t.co/ncXlTOVAOP
4
65
1K
@zseano
zseano
28 days
It’s time to lock in. If you’re struggling with bug bounties, spend the next few weeks finding a target you personally enjoy. Bigger the scope the better! Then focus on them everyday for the entire year. Aim to hack 2-3 hours minimum a day. You’ll learn lots and find bugs. GL!
37
100
735
@Schwarzenegger
Arnold Schwarzenegger
2 days
The number of pushups won’t matter until you change how you see yourself. If you see yourself as a lazy person, you’ll always quit. If you start to change who you are, and become someone who trains and doesn’t give up, that’s what matters. Identity change requires action. It’s
@gtagmemes
🧘🏾‍♂️🧘🏾
2 days
@Schwarzenegger How many pushups a day for a lazy person
423
4K
32K
@Doyensec
Doyensec
2 days
Set your #xss hunting 🎯 on easy mode! In the latest edition of our Eval Villain video series, @bemodtwz demonstrates the time-saving power of the "needles" feature. https://t.co/NqEls2TThm #appsec #doyensec #bugbountytips #security
@Doyensec
Doyensec
16 days
📢Just published - the third video in our series on Eval Villain. Our @bemodtwz walks through using it to find 🔎 a DOM XSS to demonstrate its functionality. Check it out today! https://t.co/jt9UZiHhHo #appsec #doyensec #security #evalvillain #xss
0
7
36
@garethheyes
Gareth Heyes \u2028
3 days
We've just hit a very important milestone - our XSS Cheat Sheet now has 1337 vectors!
2
11
100
@kittoh_
Kitto Hernandez
3 days
Thank you sir @Jhaddix for the giveaway! Will continue supporting @arcanuminfosec in the best way I can. Awesome as always! 💯
0
0
1
@kittoh_
Kitto Hernandez
4 days
𝕏
0
0
0
@castilho101
castilho
9 days
Stealing Salesforce OAuth Tokens via the WAF: A write-up on SFRA context and escalating XSS to Account Takeover using the WAF as a gadget. Hope you enjoy it https://t.co/vUNKbjUeWk
Tweet card summary image
castilho.sh
Recently I was conducting a pentest on a Salesforce instance when I stumbled upon an XSS vulnerability. This writeup details that vulnerability and how ...
10
96
451
@artwithka
Artwithka
5 days
It costs $0.00 to support a dark artist 🖤
@MissHartsArt
Amber Goodhart (Miss.Hart)
5 days
It costs $0.00 to support a fan artist 🦇
56
2K
17K
@infinitelogins
Harley Kimball
5 days
A new AI research safe harbor framework published by HackerOne and multiple new LLM-adjacent security workflows landing in the wild. On the technical side, OAuth token handling, WAF edge cases, and cloud identity misconfigurations kept showing up across write-ups . Full issue →
Tweet card summary image
getdisclosed.com
The bug bounty world, curated.
4
11
54
@NahamSec
Ben Sadeghipour
5 days
Instead of making a 3rd how to bug bounty and share resources and labs, I decided to reflect on my journey in the last 3 years and share some of things that helped me earn over $1,000,000+ in bounties in these 3 years . Here's what I have learned 👉🏼 https://t.co/TRoFnuxrqb
5
36
333