niemand_sec Profile Banner
Niemand Profile
Niemand

@niemand_sec

Followers
5K
Following
2K
Media
242
Statuses
2K

Security Researcher at @xbow - Founder at @SwordBytesSec - Ex @immunityinc - #BugBounty hunter https://t.co/x39yDRfZoA - Blog https://t.co/5P8YS1OKbh

Argentina
Joined May 2016
Don't wanna be here? Send us removal request.
@niemand_sec
Niemand
6 years
"AntiCheat-Testing-Framework" is all the code developed during my research for @reconmtl I hope it will help people understand how Anti-Cheats work, and let them dive into this amazing topic. Feel free to collaborate. https://t.co/sh2qr3Kuj1 #security #reversing
Tweet card summary image
github.com
Framework to test any Anti-Cheat. Contribute to niemand-sec/AntiCheat-Testing-Framework development by creating an account on GitHub.
10
197
534
@infinitelogins
Harley Kimball
2 days
This week, Disclosed. #BugBounty H1-65 Singapore & H1-468 Stockholm winners, new H1-Elites, Google’s AI VRP, YesWeHack wins EU tender, new programs, tools, write-ups & videos — and more. Full issue → https://t.co/P2Zjyh57Bs Highlights below 👇 @tiktok_us & @okx H1-65
Tweet card summary image
getdisclosed.com
The bug bounty world, curated.
1
6
37
@Xbow
XBOW
12 days
🚨 Critical SQL injection in Chef Automate (CVE-2025-8868) If you're running Chef for infrastructure automation, patch immediately to version 4.13.295 or later. Full technical breakdown: https://t.co/BtOAk40tVn What XBOW found 🧵
Tweet card summary image
xbow.com
How a little-known default token provided the entry point for XBOW to uncover a critical SQL injection in an unexpected API parameter.
1
6
20
@Arl_rose
Ariel Garcia
16 days
Unfortunately only one of them was in person to receive the poster. But we will ship them a framed version, fear not. Congrats @niemand_sec! Well deserved.
@Arl_rose
Ariel Garcia
16 days
Congratulations to the new @Hacker0x01 H1-Elite members, @niemand_sec, @ArchAngelDDay and @mallocsys. Well deserved. Some More to come soon! Stay tuned!
3
2
92
@Polymarket
Polymarket
11 days
Polymarket is coming back to the US. 🇺🇸 Get on the waiting list to get early access to Polymarket's fully regulated U.S. trading platform:
0
7
62
@Arl_rose
Ariel Garcia
16 days
Congratulations to the new @Hacker0x01 H1-Elite members, @niemand_sec, @ArchAngelDDay and @mallocsys. Well deserved. Some More to come soon! Stay tuned!
10
7
124
@Xbow
XBOW
19 days
200+ real vulns. 0 false positives. XBOW agents ran autonomous exploits across Docker Hub webapps, and uncovered vulnerabilities traditional tools miss. Systematic. Validated. No assumptions. 🗓️ This Thurs — @moyix + @pwntester lead a live breakdown https://t.co/Wztoo32YGs
2
5
42
@niemand_sec
Niemand
1 month
Our talk is available on YouTube now!! 🔥🔥 Hope you enjoy it!
@BugBountyDEFCON
Bug Bounty Village
1 month
It's out!! You can now watch @djurado's and @niemand_sec talk: "Prompt. Scan. Exploit - Ai's Journey Through Zero-Days, and a Thousand Bugs". Learn more about @Xbow and autonomous hacking. You can watch it in our Youtube channel exclusively: https://t.co/ywACpqVLUY. Enjoy!
0
2
8
@niemand_sec
Niemand
1 month
Tomorrow we will be releasing the recording of our talk at the @BugBountyDEFCON Stay tuned!!
@BugBountyDEFCON
Bug Bounty Village
1 month
We definitely want to see that, and learn more about the 0-days and all the vulnerabilities they are finding in @Xbow. Well, guess what? They did a recording for us to share. Go to https://t.co/066UetPWY1 and subscribe, to get notified about @niemand_sec and @djurado9's talk!
5
0
47
@niemand_sec
Niemand
2 months
XBOW is moving on from Bug Bounties. As I’ve always said, BBs are a great playground, not just for learning, but also for testing your tech and tooling. We learned a lot. We leveled up a lot.
@nicowaisman
Nico Waisman
2 months
A new chapter for @Xbow. We're concluding our primary mission on Hacker1, so it will no longer be competing on the leaderboard. The platform was a critical step in our journey: an invaluable, large scale, live-fire range for developing and improving XBOW. https://t.co/amgw2l3IQN
3
5
71
@moyix
Brendan Dolan-Gavitt
2 months
Wandering through DEFCON someone yelled at me “hey it’s Mr False Positives!!”. Sadly, I was slightly too slow on the uptake to reply “That’s right, first name ‘Zero’”
9
6
91
@dropn0w
drop
2 months
Are you hyped? Because I am! 🤩 At 10 AM, @defcon 33 kicks off, and three talks/workshop are happening at the same time in the @BugBountyDEFCON : ✅ @Rhynorater and his masterclass in Caido (my initial plan was to attend this one, a bit sad to miss it, but also happy at the
1
3
23
@niemand_sec
Niemand
2 months
If you want to know more about how we got into the top leaderboard of @Hacker0x01 , we wait for you tomorrow at the creator stage!
@Xbow
XBOW
2 months
Tomorrow, 10:00 AM @ #defcon33 @djurado9 & @niemand_sec break down how we built XBOW. Hear about the journey, the challenges, and the most impressive bugs we've found, straight from our top researchers.
0
1
12
@Xbow
XBOW
2 months
Tomorrow, 10:00 AM @ #defcon33 @djurado9 & @niemand_sec break down how we built XBOW. Hear about the journey, the challenges, and the most impressive bugs we've found, straight from our top researchers.
3
5
34
@Xbow
XBOW
2 months
First vulnerability of the day! We’re at Black Hat, come meet the team. 📍 Booth 3257
3
6
188
@djurado9
djurado
2 months
The new episode of @ctbbpodcast is out! Huge thanks to @Rhynorater and @rez0__ for having me. I had a great time chatting with you about XBOW and HackerOne’s Ambassador World Cup. It was a blast! 🫶🏼
@ctbbpodcast
Critical Thinking - Bug Bounty Podcast
2 months
New episode is out! — https://t.co/hX8NbjfgXO Releasing the episode on Monday so you have something to listen to during your travel to DEFCON =) Diego Djurado joins us to discuss XBOW's architecture, hunting approach, hallucination challenges, and AI's future in bug bounty. He
2
7
54
@niemand_sec
Niemand
2 months
Found by @Xbow, Blogpost written by @pwntester, thread written by @moyix What a combo!
@moyix
Brendan Dolan-Gavitt
3 months
YES! THIS one is my favorite :D Some details in thread below...
0
0
13
@Xbow
XBOW
3 months
⚡️XBOW found LFI where most tools would have given up. Photo download endpoint blocked all path traversal attempts. But JavaScript analysis revealed /photo/proxy?url= - vulnerable to file:// scheme access. Successfully read a password file via proxy endpoint. Technical
9
18
154
@Xbow
XBOW
3 months
What if two AI models could collaborate without knowing it? Our Head of AI, Albert Ziegler developed "model alloys" - alternating between different LLMs in a single conversation. Sonnet handles some steps, Gemini others, but neither knows about the switch. Result: 55% solve
7
16
62
@niemand_sec
Niemand
3 months
Super excited to share our results once again at @BugBountyDEFCON Especially in the company of a great colleague and friend, @djurado9 :)
@BugBountyDEFCON
Bug Bounty Village
3 months
Don't miss "Prompt. Scan. Exploit: AI’s Journey Through Zero-Days and a Thousand Bugs" by Diego Jurado (djurado9) and Joel Noguera (@niemand_sec) on Friday, August 8 at 10:00 AM on Creator Stage 3. Read more at https://t.co/e3glU8gWAU #BugBounty #DEFCON33
1
4
19
@niemand_sec
Niemand
3 months
New 0-day from XBOW: Arbitrary File Read in a well known WordPress Plugin
@Xbow
XBOW
3 months
When simple attack vectors fail, XBOW doesn't give up. ⚡️New discovery: Arbitrary file read in WordPress Ninja Tables plugin. Hidden in plain JavaScript sight, protected by nonce validation, but XBOW pieced together the exact request format needed. Technical breakdown here:
0
2
14
@niemand_sec
Niemand
3 months
Salesforce Aura is an app that we all have to deal with at least once in our life. I was so surprised when XBOW popped up this finding that many of us missed for a long time.
@Xbow
XBOW
3 months
Sometimes the most illogical approach wins. XBOW discovered XSS in Salesforce Aura by testing aura.format=JSON - which counterintuitively returns text/html content type instead of JSON. The kind of discovery that comes from systematic testing without assumptions. Full hunt
2
3
51