payloadartist Profile Banner
payloadartist Profile
payloadartist

@payloadartist

Followers
42K
Following
14K
Media
895
Statuses
6K

Yapping about AI, AppSec, Hacking, & Cybersecurity • Helped secure organizations like Google • Opinions are my cat's • Part-time shitposter

$HOME
Joined August 2018
Don't wanna be here? Send us removal request.
@payloadartist
payloadartist
5 years
If you are tired of googling for #BugBounty writeups, I made a little tool that lets you search writeups easily. You can also pull the search data in JSON format if you need it. #cybersecurity #bugbountytips #infosec #100DaysOfCode
65
1K
2K
@payloadartist
payloadartist
22 hours
There seems to be an open source competitor to "Xbow" called "Cybersecurity AI (CAI)" (h/t @luijait_) which is solving web CTFs with ease and, claims to be a #bugbounty ready AI framework.
Tweet media one
3
34
162
@grok
Grok
4 days
Join millions who have switched to Grok.
176
357
3K
@payloadartist
payloadartist
2 days
Guys what is happening with the curl #bugbounty program?
Tweet media one
6
1
40
@payloadartist
payloadartist
3 days
2 weeks in. Now I'm at 640. My pace of testing on this target is a bit slow. Repeater tabs now look horrible, because I'm messy with naming them. But there ya go.
Tweet media one
@payloadartist
payloadartist
20 days
How many repeater tabs are you working with currently?. I've 64, just started. #BugBounty
Tweet media one
0
0
4
@payloadartist
payloadartist
4 days
Does that mean one vulnerability/misconfig in either of these Oauth implementations could potentially drain your wallet?.
@Cointelegraph
Cointelegraph
5 days
🔥 NEW: MetaMask introduces Social login, enabling sign-in with Google and Apple. No seed phrases required.
Tweet media one
1
0
9
@payloadartist
payloadartist
4 days
RT @intigriti: by @payloadartist is a search engine to find new bug bounty write-ups, reports, and other web hackin….
0
73
0
@payloadartist
payloadartist
5 days
Is the risk-reward worth it?.
0
0
0
@payloadartist
payloadartist
5 days
Imagine someone exploiting a prompt injection in this extension through a website you're visiting. Based on a quick look, this extension should need a lot of permissions. That's a deep attack surface.
@AnthropicAI
Anthropic
5 days
We’ve developed Claude for Chrome, where Claude works directly in your browser and takes actions on your behalf. We’re releasing it at first as a research preview to 1,000 users, so we can gather real-world insights on how it’s used.
2
1
6
@payloadartist
payloadartist
5 days
didn't get any bounty, but still asked to perform a retest 🤨. is it normal?
Tweet media one
6
1
65
@payloadartist
payloadartist
7 days
Pentester: "Your new AI chatbot leaked all the user data.". Devs: "That's weird, we vibecoded it with Claude. It shouldn't do that.". Auditor: "Is the AI GDPR compliant and has it completed its annual bias training?".
1
2
25
@payloadartist
payloadartist
8 days
Saw a guy vibe coding an exploit PoC today.Tab 1: ChatGPT.Tab 2: Gemini.Tab 3: Claude.Tab 4: Grok.Tab 5: DeepSeek. He fed each one the CVE details.Pasted the 5 resulting payloads into 5 separate shells.Launched them all against the target.Picked the one that popped root first.
12
22
302
@payloadartist
payloadartist
9 days
"Kudos don't pay bills". truer words were never spoken 👍. #bugbountytips.
@MrTuxracer
Julien | MrTuxracer 🇪🇺
2 months
@payloadartist I, personally, do it like this: I keep all my exploits and techniques private until I have monetized them in the best be way possible. Only then, I’ll publish them. Why? Because I’m not a charity org, and kudos don’t pay my bills 🤷‍♂️.
0
1
9
@payloadartist
payloadartist
10 days
RT @kuzushi: I was thinking more about the post about websec getting harder. I think there is a reality of seasonality to vulnerabilities….
0
1
0
@payloadartist
payloadartist
11 days
RT @BugBountyDEFCON: Giveaway brought to you by @hackinghub_io:.5x Blind XSS vouchers.5x Web Exploitation vouchers. How to enter:.1⃣ Follow….
0
171
0
@payloadartist
payloadartist
11 days
My pentester friends out there, do you feel the same?
Tweet media one
60
37
949
@payloadartist
payloadartist
12 days
"Localhost tracking" - How Meta bypassed Android sandboxing to track users browsing other websites with Meta's embedded pixel. Fun fact: 22% of the most visited websites across the world embed Meta's pixel.
Tweet media one
0
8
19
@payloadartist
payloadartist
14 days
Reverse Engineering Vercel's BotID| by @blastbots . #infosec #cybersecurity
1
4
20
@payloadartist
payloadartist
15 days
By @IceSolst.
0
1
7
@payloadartist
payloadartist
15 days
did you know there is a public, searchable database of every SSN?. let's speed-run the chaos and just get it over with.
7
19
100
@payloadartist
payloadartist
17 days
Courtesy of @nickvangilder.
1
0
4
@payloadartist
payloadartist
17 days
CISSP ❌. CRTP ❌. the actual hands-on red teaming course with 1.337% pass rate 👇✅. bonus, it is taught on real systems
Tweet media one
3
5
28