yeswehack Profile Banner
YesWeHack ⠵ Profile
YesWeHack ⠵

@yeswehack

Followers
38K
Following
8K
Media
2K
Statuses
8K

Global Bug Bounty & Vulnerability Management Platform 🎯 https://t.co/57gODBq2WZ 👾 https://t.co/ICc6RyhJTp 💡 https://t.co/KNYxhkKuzt

World
Joined July 2012
Don't wanna be here? Send us removal request.
@yeswehack
YesWeHack ⠵
2 days
Want to hack mobile applications? 📱. We’ve just published the ultimate guide to building an Android #BugBounty lab with emulators, real devices and proxies (featuring Genymotion, Android emulator, Magisk, Burp, Frida & Medusa) 👇. #BugBountyTips .
Tweet card summary image
yeswehack.com
Covering the pros and cons of emulators versus real devices, and how to configure Magisk, Burp, Frida, Medusa and other mobile hacking tools.
1
30
139
@yeswehack
YesWeHack ⠵
10 hours
Just 7 days until Berlin turns into a playground for hackers ⏳. At @nullcon, we're hosting an exclusive #LHE where:.🔍 A secret target will be revealed.💰 Valid vulns will turn into bounties.🏆 Hackers will battle for the top of the leaderboard. More 👉
Tweet media one
2
5
23
@grok
Grok
1 day
Join millions who have switched to Grok.
96
175
1K
@yeswehack
YesWeHack ⠵
1 day
📢 Caido users: a reminder that our new YesWeCaido plugin enables you to fetch all your YesWeHack programs from within @CaidoIO and to add targets to your scopes tab with a single mouse click 🔥.
Tweet card summary image
yeswehack.com
A new Caido plugin offers access to YesWeHack Bug Bounty Programs from inside the web proxy tool. Learn how to install YesWeCaido and how it works.
1
3
16
@yeswehack
YesWeHack ⠵
2 days
🇸🇬 Big thanks to @N0H4TS for inviting us to the #BugBounty community meetup on Monday evening!. With 130+ cybersec enthusiasts in the room, our Lead APAC Security Analyst, @alehresmann led a hands-on session demonstrating how to analyse a target, experiment with payloads and turn
Tweet media one
Tweet media two
0
1
29
@yeswehack
YesWeHack ⠵
3 days
Remember when @LouisVuitton welcomed hunters to its Paris headquarters for a groundbreaking live hacking event? 👜 Watch highlights from last year’s successful ‘Hack Me I’m Famous’ edition 👇.
0
4
33
@yeswehack
YesWeHack ⠵
6 days
A new Dojo challenge - Hardware monitor is released!. Seems like a LFI is presented in this Ruby application, but will you be able to exploit it to capture the flag? 🚩. Try it now: #YesWeRHackers #CTF #BugBounty
Tweet media one
0
1
15
@yeswehack
YesWeHack ⠵
7 days
Our latest hacker roundup stars nonce CSP bypasses from @J0R1AN, a ‘quiet’ request smuggling side channel, an Amazon Q self-destruct saga, a Gemini CLI hijack (CC @tracebit_com), & an IDOR that could leak 64m McDonald’s job applications (@iangcarroll) 👇.
Tweet card summary image
yeswehack.com
Featuring a Gemini CLI hijack, nonce-based CSP bypasses using the disk cache, and HTTP smuggling exploits based on trust (as opposed to complexity).
0
8
63
@yeswehack
YesWeHack ⠵
7 days
🏆 Dojo #43 – CCTV Manager is officially closed, and we have our winners!. This challenge revolved around a predictable token combined with insecure YAML deserialization - leading to RCE and. flag capture 🏁. Here's the write-up 👉 #CTF #BugBounty
Tweet media one
2
0
8
@BTCCexchange
BTCC
3 days
Bitcoin’s on fire at $112K! Time to flip the charts on BTCC!.Exploring Cryptocurrency with Jaren Jackson Jr.🏀.
0
1
2
@yeswehack
YesWeHack ⠵
8 days
RT @_CryptoCat: My writeup for the July Dojo challenge on @yeswehack - CCTV Manager 🎥. 1️⃣ Predict the correct token to access the CCTV man….
0
7
0
@yeswehack
YesWeHack ⠵
8 days
In the latest #TalkiePwnii, @pwnwithlove takes on a Dojo challenge about predictable tokens & YAML deserialization in Python 🐍. From predictable tokens to achieving RCE via unsafe YAML load - watch the full exploit 👇. #BugBountyTips #YesWeRHackers.
0
6
24
@yeswehack
YesWeHack ⠵
8 days
Path traversal opens doors to secrets, source code and even RCE when chained with other exploits 📂 Level up your #BugBounty hunting skills with our practical guide to path traversal and arbitrary file read attacks 👇.
Tweet card summary image
yeswehack.com
Know much about exploiting path traversal or arbitrary file read vulnerabilities? Learn some practical attacks for unearthing high impact, lucrative vulnerabilities.
1
10
59
@yeswehack
YesWeHack ⠵
9 days
👥 Heading to @rootconorg next month?. Drop by Booth G1 on 24–26 Sep to see how @yeswehack helps organisations uncover vulnerabilities faster and more efficiently. Whether you’re a security leader exploring #BugBounty or a hacker looking to level up, we’d love to meet you. 📍
Tweet media one
0
1
9
@yeswehack
YesWeHack ⠵
9 days
The evolution of ethical hacking was a big theme in our interview two years ago with @_godiego__ 🇪🇸 Read/watch the Q&A to hear what our all-time #12 hunter had to say about #BugBounty trends and his own career so far 👇.
Tweet card summary image
yeswehack.com
In this Q&A, GoDiego, one of YesWeHack’s most successful hunters, shares his backstory, most critical bug finds and thoughts on the future of Bug Bounty.
1
5
53
@yeswehack
YesWeHack ⠵
10 days
Why is Rabhi so dominant atop our #BugBounty leaderboard – month after month, year after year? 🏆 In case you missed it, read a Q&A with our all-time #1 hunter in our first-ever #BugBounty report 👇.
Tweet card summary image
choose.yeswehack.io
Explore 2024 Bug Bounty trends, stats, and expert advice in YesWeHack’s first annual report. Free to download with one click—no email required! Insights for CISOs, hunters, and security teams from a...
2
2
26
@yeswehack
YesWeHack ⠵
11 days
🔐 We’re halfway through Swiss Post's 2025 Public Intrusion Test!. 🕵️ Since the launch, Swiss Post received 15 reports from different hunters (examination for acceptance is on-going).🆕 For the first time, write-in fields are in scope – a great opportunity to explore new areas of
Tweet media one
1
2
23
@yeswehack
YesWeHack ⠵
15 days
Episode #1 of our collab with @soyel_mago has landed! 🎥. First published on his own channel, the video (in Spanish) sees the YouTuber explore #Dojo - our hands-on training platform for burnishing your #BugBounty skills! 🐞. Watch it now 👇.
0
4
13
@yeswehack
YesWeHack ⠵
16 days
SQL injection vulnerabilities remain widespread – and potentially lucrative for #BugBounty hunters 💉Our ‘Vulnerability Vectors’ series kicks off with techniques – such as blind SQLi, time-based attacks and OOB callbacks – for this classic CWE 👇.
Tweet card summary image
yeswehack.com
Our ‘Vulnerability Vectors’ series starts with techniques – such as blind SQLi, time-based attacks and OOB callbacks – for SQL injection, a still-common CWE.
2
19
78