
YesWeHack ⠵
@yeswehack
Followers
38K
Following
8K
Media
2K
Statuses
8K
Global Bug Bounty & Vulnerability Management Platform 🎯 https://t.co/57gODBq2WZ 👾 https://t.co/ICc6RyhJTp 💡 https://t.co/KNYxhkKuzt
World
Joined July 2012
Want to hack mobile applications? 📱. We’ve just published the ultimate guide to building an Android #BugBounty lab with emulators, real devices and proxies (featuring Genymotion, Android emulator, Magisk, Burp, Frida & Medusa) 👇. #BugBountyTips .
yeswehack.com
Covering the pros and cons of emulators versus real devices, and how to configure Magisk, Burp, Frida, Medusa and other mobile hacking tools.
1
30
139
📢 Caido users: a reminder that our new YesWeCaido plugin enables you to fetch all your YesWeHack programs from within @CaidoIO and to add targets to your scopes tab with a single mouse click 🔥.
yeswehack.com
A new Caido plugin offers access to YesWeHack Bug Bounty Programs from inside the web proxy tool. Learn how to install YesWeCaido and how it works.
1
3
16
🇸🇬 Big thanks to @N0H4TS for inviting us to the #BugBounty community meetup on Monday evening!. With 130+ cybersec enthusiasts in the room, our Lead APAC Security Analyst, @alehresmann led a hands-on session demonstrating how to analyse a target, experiment with payloads and turn
0
1
29
Remember when @LouisVuitton welcomed hunters to its Paris headquarters for a groundbreaking live hacking event? 👜 Watch highlights from last year’s successful ‘Hack Me I’m Famous’ edition 👇.
0
4
33
A new Dojo challenge - Hardware monitor is released!. Seems like a LFI is presented in this Ruby application, but will you be able to exploit it to capture the flag? 🚩. Try it now: #YesWeRHackers #CTF #BugBounty
0
1
15
Our latest hacker roundup stars nonce CSP bypasses from @J0R1AN, a ‘quiet’ request smuggling side channel, an Amazon Q self-destruct saga, a Gemini CLI hijack (CC @tracebit_com), & an IDOR that could leak 64m McDonald’s job applications (@iangcarroll) 👇.
yeswehack.com
Featuring a Gemini CLI hijack, nonce-based CSP bypasses using the disk cache, and HTTP smuggling exploits based on trust (as opposed to complexity).
0
8
63
🏆 Dojo #43 – CCTV Manager is officially closed, and we have our winners!. This challenge revolved around a predictable token combined with insecure YAML deserialization - leading to RCE and. flag capture 🏁. Here's the write-up 👉 #CTF #BugBounty
2
0
8
RT @_CryptoCat: My writeup for the July Dojo challenge on @yeswehack - CCTV Manager 🎥. 1️⃣ Predict the correct token to access the CCTV man….
0
7
0
In the latest #TalkiePwnii, @pwnwithlove takes on a Dojo challenge about predictable tokens & YAML deserialization in Python 🐍. From predictable tokens to achieving RCE via unsafe YAML load - watch the full exploit 👇. #BugBountyTips #YesWeRHackers.
0
6
24
Path traversal opens doors to secrets, source code and even RCE when chained with other exploits 📂 Level up your #BugBounty hunting skills with our practical guide to path traversal and arbitrary file read attacks 👇.
yeswehack.com
Know much about exploiting path traversal or arbitrary file read vulnerabilities? Learn some practical attacks for unearthing high impact, lucrative vulnerabilities.
1
10
59
👥 Heading to @rootconorg next month?. Drop by Booth G1 on 24–26 Sep to see how @yeswehack helps organisations uncover vulnerabilities faster and more efficiently. Whether you’re a security leader exploring #BugBounty or a hacker looking to level up, we’d love to meet you. 📍
0
1
9
The evolution of ethical hacking was a big theme in our interview two years ago with @_godiego__ 🇪🇸 Read/watch the Q&A to hear what our all-time #12 hunter had to say about #BugBounty trends and his own career so far 👇.
yeswehack.com
In this Q&A, GoDiego, one of YesWeHack’s most successful hunters, shares his backstory, most critical bug finds and thoughts on the future of Bug Bounty.
1
5
53
Why is Rabhi so dominant atop our #BugBounty leaderboard – month after month, year after year? 🏆 In case you missed it, read a Q&A with our all-time #1 hunter in our first-ever #BugBounty report 👇.
choose.yeswehack.io
Explore 2024 Bug Bounty trends, stats, and expert advice in YesWeHack’s first annual report. Free to download with one click—no email required! Insights for CISOs, hunters, and security teams from a...
2
2
26
Episode #1 of our collab with @soyel_mago has landed! 🎥. First published on his own channel, the video (in Spanish) sees the YouTuber explore #Dojo - our hands-on training platform for burnishing your #BugBounty skills! 🐞. Watch it now 👇.
0
4
13
SQL injection vulnerabilities remain widespread – and potentially lucrative for #BugBounty hunters 💉Our ‘Vulnerability Vectors’ series kicks off with techniques – such as blind SQLi, time-based attacks and OOB callbacks – for this classic CWE 👇.
yeswehack.com
Our ‘Vulnerability Vectors’ series starts with techniques – such as blind SQLi, time-based attacks and OOB callbacks – for SQL injection, a still-common CWE.
2
19
78