The Bug Bounty Hunter
@tbbhunter
Followers
47K
Following
53
Media
578
Statuses
4K
Promotions or business ✉️[email protected]
Joined March 2020
Hacking a Smart Home hub for $40,000: a long and interesting hardware security journey to Pwn2Own. 🧠🏠👨🏻💻☠️‼️ https://t.co/ThRMPANvYN
#bugbounty
1
2
15
From DUPES to making a living from bug bounties -- Full episode: https://t.co/fosfn35LO7
https://t.co/DimjCm3ZoY
#bugbounty
0
1
15
GitHub Actions: A Cloudy Day for Security - Part 2 https://t.co/XHarlYbAfK
#bugbounty
binarysecurity.no
Binary Security spend a lot of time testing and securing CI/CD setups, especially GitHub Actions. In this two-part series we cover some of the many security considerations when using GitHub Actions,...
0
6
22
Usermode ELF injection on the PlayStation 5 https://t.co/P1SfGCLvDe
#bugbounty
reversing.codes
ELF injection is crucial for developing complex homebrew applications, helping with debugging and instrumentation during security research, and specially for extending application capabilities, such...
0
1
9
How Sonar Helps Achieve a Strong SOC 2 Type II Report https://t.co/UmIPDf5EL7
@SonarSource
#bugbounty
sonarsource.com
An SOC 2 Type II report is a critical attestation for service organizations, demonstrating their commitment to securely managing customer data over time. Learn how SonarQube can streamline your SOC 2...
0
0
2
Cache Deception + CSPT: Turning Non Impactful Findings into Account Takeover https://t.co/6dVPMm3StY
#bugbounty
zere.es
Recently, while auditing the main application of a private bug bounty program, I discovered a Client-Side Path Traversal (CSPT) and a Cache Deception vulnerability. Individually, these issues were...
0
11
75
DEFCON 33 Bug Bounty Village CTF Writeup – First Place https://t.co/h5CtbMUpKV
#bugbounty
shubhamchaskar.com
Won first place at DEFCON 33 Bug Bounty Village CTF on CTF.ae. Read my full writeup of all 14 web flags, with step-by-step methods and results.
2
2
14
How this seasoned bug bounty hunter combines Burp Suite and HackerOne to uncover high-impact vulnerabilities https://t.co/SntYYgPrIz
@PortSwigger
#bugbounty
portswigger.net
Arman S. (Tess), a full-time independent security researcher and bug bounty hunter, talked us through how he uses Burp Suite Professional and HackerOne in tandem to find and report high-value security
1
7
45
You Already Have Our Personal Data, Take Our Phone Calls Too (FreePBX CVE-2025-57819) https://t.co/e6ALCdlPy0
@watchtowrcyber
#bugbounty
labs.watchtowr.com
We’re back - it’s a day, in a month, in a year - and once again, something has happened. In this week’s episode of “the Internet is made of string and there is literally no evidence to suggest...
0
0
5
1
0
6
Every Hacker Needs These Linux Commands // Bug Bounty Edition https://t.co/XksXzrXYM9
#bugbounty
0
0
8
How should I scope third-party assets in my bug bounty program? https://t.co/KmNlH6kMTg
@intigriti
#bugbounty
intigriti.com
You asked, and we answered. At Intigriti, we’ve been paying close attention to the questions most frequently asked by those with a bug bounty program in place. That’s why we’ve launched this blog...
0
1
15
How Pixel and Android are bringing a new level of trust to your images with C2PA Content Credentials https://t.co/xJQx14HCxt
@google
#bugbounty
security.googleblog.com
Posted by Eric Lynch, Senior Product Manager, Android Security, and Sherif Hanna, Group Product Manager, Google C2PA Core At Made by Goo...
0
2
10
How I Found a Critical Password Reset Bug in the BB program(and Got $4,000) https://t.co/NHqp9flxFu
#bugbounty
s41n1k.medium.com
As a bug bounty hunter, I often test mobile apps by routing traffic through Burp Suite to see how the backend APIs behave. One of my recent…
2
36
231
Protecting your AI code: How SonarQube defends against the "Rules File Backdoor" https://t.co/VtAHwIWJHV
@SonarSource
#bugbounty
sonarsource.com
This case highlights an issue where configuration files were manipulated through hidden Unicode characters, which is a vector now commonly referred to as the "Rules File Backdoor".
0
0
2
GitHub Actions: A Cloudy Day for Security - Part 1 https://t.co/KFTyTAjeId
#bugbounty
binarysecurity.no
Binary Security spend a lot of time testing and securing CI/CD setups, especially GitHub Actions. In this two-part series we cover some of the many security considerations when using GitHub Actions,...
0
3
8
Command Injection in Vertex AI https://t.co/U9247UKgkW
#bugbounty
0
0
3