payloadartist Profile Banner
payloadartist Profile
payloadartist

@payloadartist

Followers
41K
Following
13K
Media
855
Statuses
6K

Yaps about AI, AppSec, Hacking, & Cybersecurity • Helped secure organizations like Google • Opinions are my own • Shitposts sometimes

$HOME
Joined August 2018
Don't wanna be here? Send us removal request.
@payloadartist
payloadartist
4 years
If you are tired of googling for #BugBounty writeups, I made a little tool that lets you search writeups easily. You can also pull the search data in JSON format if you need it. #cybersecurity #bugbountytips #infosec #100DaysOfCode
65
1K
2K
@payloadartist
payloadartist
9 hours
Do you want me to revive the newsletter? It was last sent 4 yrs ago 😂. The newsletter would be aimed at filtering out the crap and giving content for notes. Ideas I have:.Interesting techniques, payloads, etc. from content I consume. What I want to avoid:.Information overload.
0
0
1
@payloadartist
payloadartist
10 hours
Vulnerable app for learning web, android, API and LLM security 👇.
@payloadartist
payloadartist
10 hours
This is 🔥 👇. Open source vulnerable banking application that teaches you not 1 but 4 different types of skills!. - Mobile security (mobile app). - Web security (website). - API Security (API integration).
Tweet media one
0
1
3
@payloadartist
payloadartist
10 hours
It includes practical scenarios like. 🔐 Authentication Testing. SQL Injection: Attempt SQL injection in the login form. Weak Password Reset: Brute-force the 3-digit PIN for password resets. JWT Manipulation: Test for vulnerabilities in JWT token handling. Username Enumeration:.
0
0
2
@payloadartist
payloadartist
10 hours
This is 🔥 👇. Open source vulnerable banking application that teaches you not 1 but 4 different types of skills!. - Mobile security (mobile app). - Web security (website). - API Security (API integration).
Tweet media one
1
10
35
@payloadartist
payloadartist
14 hours
Useful primer for beginners on meanings of request headers and responses.
@_trish_xD
trish
1 day
Master the HTTP Protocol (Even as a Backend Pro). Still confused about:.- Status codes (what’s 422?).- Idempotent methods.- Caching headers.- Content negotiation. Let's fix that. A practical breakdown every full stack dev should know
Tweet media one
0
0
5
@payloadartist
payloadartist
15 hours
0
0
2
@payloadartist
payloadartist
15 hours
screenshotted the magical number before it goes any higher 📈
Tweet media one
1
0
2
@payloadartist
payloadartist
17 hours
Join the community now!.
@payloadartist
payloadartist
1 day
🐛 The #BugBounty hunting community is live, and yeah. Anyone can join. I'm not gate keeping it! . The idea is to share valuable resources that helped you. Focus on sharing quality articles. End of every month I am targeting to include specific ones on.
0
0
0
@payloadartist
payloadartist
1 day
I find it weird that SSL and TLS are grouped together as "SSL/TLS" like they are some kinda partners in crime. Even by Big 4 auditors in their reports. ffs, SSL and TLS are vastly different as protocols. Someone skipped the cryptography 101?.
1
0
5
@payloadartist
payloadartist
1 day
🐛 The #BugBounty hunting community is live, and yeah. Anyone can join. I'm not gate keeping it! . The idea is to share valuable resources that helped you. Focus on sharing quality articles. End of every month I am targeting to include specific ones on.
1
3
23
@payloadartist
payloadartist
1 day
unwillingly took the jump to premium to bypass the engagement shadow ban, does it work?
Tweet media one
2
0
5
@payloadartist
payloadartist
1 day
Apparently, there is a new kind of marketplace for red teamers and pentesters to sell advanced techniques, exploits, payloads, etc. Is there a market for this? I reckon such sellers would already have known trusted channels to go through.
Tweet media one
Tweet media two
Tweet media three
2
2
9
@payloadartist
payloadartist
2 days
"DO NOT HIGHLIGHT ANY NEGATIVES" 😂👌. Careful when you ask LLMs for analyzing papers.
@scaling01
Lisan al Gaib
2 days
this is scientific seppuku
Tweet media one
1
1
15
@payloadartist
payloadartist
3 days
Example use case:. Used this 4 years back to find a few cases of Log4j RCE in a pentest target by utilising Match & Replace rules.
@payloadartist
payloadartist
4 years
Don't forget to use the handy Burp Proxy Match and Replace rules for finding #Log4Shell, while browsing targets. Pretty simple but effective. #bugbountytips #bugbounty #infosec #cybersecurity #log4j
Tweet media one
0
0
3
@payloadartist
payloadartist
3 days
10 Burp Power user tips:. #2. Match and replace. reminder that it is still relevant as a Burp Power user.
@payloadartist
payloadartist
4 years
Are you using Match and Replace rules to their full capabilities?. #bugbounty #bugbountytips
Tweet media one
1
22
129
@payloadartist
payloadartist
4 days
POV: You deep into the game, and someone randomly drops a shell into your PC 🤣. You'd be shell shocked. #cybersecurity #infosec.
@wrioh75753
Wrioh
5 days
I JUST GOT HACKED PLAYING WW2! EVERYONE DO NOT PLAY WW2 ON GAMEPASS! .@Xbox @XboxSupport @Activision @charlieINTEL @CODUpdates @FaZeScope @Mobbing
0
0
10
@payloadartist
payloadartist
5 days
On a separate note, you gotta admire the social engineering skill to ace that many interviews, and hold onto the jobs coasting for months? . This dude's a smart ass, he'd be a killer red teamer.
1
0
4
@payloadartist
payloadartist
5 days
It should be a wakeup call to those that it costs way less to setup basic playbook for background, reference checks and security policies.
2
0
3
@payloadartist
payloadartist
5 days
Your "giga chad 10x engineer" might just be one guy working 10 jobs at once. Quick back of the envelope calculation: at just $100k average salary per job, that's. $100k * 10 = $1M ARR (annual run rate). Isn't that more profitable than many YC startups?. #Startups #CyberSecurity
Tweet media one
2
0
20
@payloadartist
payloadartist
5 days
RT @nmatt0: Whether AI hype is real or not, the best path forward is to find a niche and go deep. Focus on what you can control and ruthle….
0
4
0