MorningStar Profile Banner
MorningStar Profile
MorningStar

@0xMstar

Followers
16,149
Following
1,051
Media
123
Statuses
3,159

bug bounty hunter :) bugcrowd top 10

localhost
Joined August 2013
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@0xMstar
MorningStar
3 years
I earned $10,000 for my submission on @bugcrowd My highest payout so far for single report from @Bugcrowd . Issue was all accounts takeover including super admin account, without user interaction. #ItTakesACrowd
53
30
516
@0xMstar
MorningStar
3 years
1000 points on single program on @Bugcrowd , also completed $50k on same program. Focusing on single application really helps. This program do not have large scope , just single application with lots of functionality to test. Awesome team & great response time & fast fix.
Tweet media one
34
24
475
@0xMstar
MorningStar
6 years
If you find jsp page with no parameters. You can actually add path parameters using semicolon Like this ;');alert(1)// & perform XSS. Apache tomcat support this. #Bugbountytip #BugBounty #XSS
9
192
431
@0xMstar
MorningStar
4 years
Found weird bug 1. While registering with username , got error username already taken, so I use another username. 2. Go to edit profile , change username to already registered username , success! 3. Existing users account with that username deleted. #bugbounty
15
81
368
@0xMstar
MorningStar
3 years
Tweet media one
4
41
366
@0xMstar
MorningStar
7 months
One of major bounty i got was for blind SQL injection , Its in prestashop CMS module. I always keep an eye on CMS & module based CVE release. Here is POC & exploit. @PrettyRecon database helps to find targets from my DB which using prestashop.
Tweet media one
Tweet media two
12
53
361
@0xMstar
MorningStar
3 years
Thanks @Bugcrowd , ❤️
Tweet media one
14
3
332
@0xMstar
MorningStar
3 years
Focused on XSS after long time , Its sometimes hard to prevent this type of bugs, read & understand JS code, use waybackmachine , gather as much endpoints as you can, grab parameters from JS files, use @PrettyRecon .
Tweet media one
Tweet media two
10
43
316
@0xMstar
MorningStar
3 years
10k points on @Bugcrowd . Can I get swag 🌚
Tweet media one
39
3
296
@0xMstar
MorningStar
3 years
Listed in all time top 10 @bugcrowd leaderboard
Tweet media one
23
3
259
@0xMstar
MorningStar
2 years
Which bug class/type you can teach to absolute beginner which do not have any knowledge about cybersecurity or computer science
65
19
257
@0xMstar
MorningStar
11 months
I earned little over 20k this month just by doing XSS , So for all newbie hunters, you can focus on single bug class & still make decent earning from it. Most of bugs are DOM based & mostly automated .
26
15
254
@0xMstar
MorningStar
2 years
January 2022, Top of @Bugcrowd leaderboard. Something to flex lol
Tweet media one
18
2
253
@0xMstar
MorningStar
3 years
🙌 @Bugcrowd September Leaderboard, Top of the leaderboard again .
Tweet media one
21
2
239
@0xMstar
MorningStar
5 years
if [] is block in jinja2 ssti , you can use pop() function. try below payload to read internal files. {{[].__class__.__base__.__subclasses__().pop(40)('/etc/passwd').read()}} #ssti #bugbounty #bugbountytips #jinja2
4
95
235
@0xMstar
MorningStar
2 years
How to start with @Bugcrowd ? Start with points only program , focus on one bug at a time like xss, bugcrowd have some easy public target like cisa gov programs & ubisoft find bugs their then you will get private invites . #bugbounty #
11
35
231
@0xMstar
MorningStar
4 years
Recon is much better with filters, actual visualization <3
Tweet media one
13
26
215
@0xMstar
MorningStar
2 years
I earned $7,500 for my submission on @bugcrowd Sensitive information disclosures. Got asset by searching footers in @PrettyRecon web mapper tool. Target specific directory bruteforce. Got unauthenticated endpoint disclosing sensitive info. #ItTakesACrowd
10
19
212
@0xMstar
MorningStar
3 years
7K points & in top 20 now🙌 @Bugcrowd ,
Tweet media one
21
1
218
@0xMstar
MorningStar
2 years
1337 :V
Tweet media one
20
3
219
@0xMstar
MorningStar
9 months
Here is blog for "Mass hunting vulnerabilities with subdomain database feature of @PrettyRecon " I also shared few vulnerable services & software which are vulnerable to open redirects & you can use them to chain it with other bugs to increase impacts.
1
64
209
@0xMstar
MorningStar
4 years
I earned $600 for my submission on @bugcrowd Privileged escalation, Easy find.. collect all requests in admin session & perform same with basic user session. #ItTakesACrowd
17
11
206
@0xMstar
MorningStar
3 years
No one in my RL friend circle knows I do hacking/bugbounty or I know shit about computer, I m still mechanical guy for them🙃
19
6
193
@0xMstar
MorningStar
2 years
F, bugbounty is so depressing 😢
26
8
185
@0xMstar
MorningStar
3 years
Completed 6k points @Bugcrowd , current all time rank - 25th 🙌
Tweet media one
23
3
194
@0xMstar
MorningStar
4 years
I earned $1,250 for my submission on @bugcrowd stored xss using bulk data upload feature, sometimes developer add filters on form but forgot to do same with data upload with CSV. #ItTakesACrowd
8
10
181
@0xMstar
MorningStar
3 years
Top of July leaderboard @Bugcrowd Thanks to @naglinagli for help & thanks to @Abhinav_one for shodan😅
Tweet media one
23
3
184
@0xMstar
MorningStar
4 years
Seems like good start for year
Tweet media one
10
4
177
@0xMstar
MorningStar
3 years
Completed 4K points @Bugcrowd
Tweet media one
20
1
172
@0xMstar
MorningStar
4 years
I earned $500 for my submission on @bugcrowd #ItTakesACrowd Sometimes registering with company domain email will gives you extra privileges. Eg. test @target .com Or change email to company email if no email verification is there.
6
18
165
@0xMstar
MorningStar
2 years
I am stuck, not learning anything new. Spending all free time doing bug hunting with already known things. 🙃
20
4
166
@0xMstar
MorningStar
2 years
🙃
Tweet media one
50
11
163
@0xMstar
MorningStar
4 years
Yay, I was awarded a $150 bounty on @Hacker0x01 ! XSS , use %00 at start of payload, sometimes its help to bypass waf. #TogetherWeHitHarder
8
15
163
@0xMstar
MorningStar
3 years
Nice to be top of leaderboard on consecutive months @Bugcrowd
Tweet media one
16
2
163
@0xMstar
MorningStar
3 years
Check js files on contact pages of target websites, sometimes they are embedded with SMTP keys & secrets. #bugbounty #bugbountytips
3
32
166
@0xMstar
MorningStar
3 years
Tried @Hacker0x01 after long time
Tweet media one
5
7
161
@0xMstar
MorningStar
3 years
5k points completed @Bugcrowd , also in top 40 now.
Tweet media one
21
4
158
@0xMstar
MorningStar
3 years
Bugbounty is not reliable income source, can't afford breaks lol, need something permanent like full time job. 🙃
22
6
157
@0xMstar
MorningStar
2 years
Got XSS on Jira with os_destination parameter , I checked hundreds of other jira targets(same version) for similar bug , no other targets are vulnerable., very strange.
Tweet media one
8
12
152
@0xMstar
MorningStar
2 years
P1 - P2 -P3
Tweet media one
4
0
153
@0xMstar
MorningStar
3 years
3.5k Points on @Bugcrowd 😍
Tweet media one
14
4
152
@0xMstar
MorningStar
3 years
I had great year, earned 3X more bounty compare to last year. Ranked 12th on all time leader board on @bugcrowd , Completed 11k points . I will more focus on other platforms too from next year . overall happy with progress <3 Wishing Happy & successful new year to everyone <3
Tweet media one
15
2
152
@0xMstar
MorningStar
1 year
Completed 15k points, Thanks @Bugcrowd for opportunity. :)
Tweet media one
24
3
145
@0xMstar
MorningStar
1 year
100 bugs completed on favorite program.
Tweet media one
17
3
144
@0xMstar
MorningStar
3 years
This is massive, ran on my subdomains db got almost 700+ vulnerable instances. 🙌
@pdnuclei
nuclei
3 years
Did you know that your Interactsh server may also be used to query cloud metadata services? Reference - #ssrf #apache #appsec #bugbounty #pentest
Tweet media one
2
71
228
4
22
138
@0xMstar
MorningStar
1 year
I wish BB platforms have option to block particular triager to acccess your reports lol. 😂
26
4
137
@0xMstar
MorningStar
4 years
#Bugbountytip Always , change parameters into array like username[]=, it's sometimes throw SQL errors.
@0xMstar
MorningStar
4 years
How to do SQL injection if it's in insert statement. Like Insert into test ('user','pass') values (?,pass$myinputs); I only have control over "myinputs" in query. #bugbounty
4
16
74
4
35
127
@0xMstar
MorningStar
3 years
Rank 9th on @Bugcrowd monthly leaderboard 🥳
Tweet media one
9
0
127
@0xMstar
MorningStar
1 year
Giving away 1 month subscription of @PrettyRecon , share your tips, tricks , articles anything interesting you found recently. Will choose random 5 users from comments. Do like , retweet & comment. #BugBounty
36
41
125
@0xMstar
MorningStar
4 years
Finally 3K points on @Bugcrowd . got 240 points today . <3
Tweet media one
10
2
119
@0xMstar
MorningStar
5 years
I like coding more than bug bounty , I doing bugbounty just because it's giving me more money that programming. Building application is cool than breaking it🤖🙌
9
4
117
@0xMstar
MorningStar
6 months
Twitter is only reason I m still doing bug bounties, I learn all stuffs from here , I get motivation to open laptop just because seeing some one getting bounties lol, otherwise I would never …
12
3
116
@0xMstar
MorningStar
5 years
March was good :) Thanks @Bugcrowd #bugbounty
Tweet media one
2
2
111
@0xMstar
MorningStar
10 months
Says every CTF player who fails to make money from bug bounty
@RenwaX23
‌Renwa
10 months
CTF Player vs Bug Bounty Hunter
Tweet media one
54
371
2K
8
5
109
@0xMstar
MorningStar
5 years
My this year bug bounty stat @Bugcrowd thanks to lots of XSS & BAC 😅
Tweet media one
13
2
109
@0xMstar
MorningStar
2 years
Company; P3 - 750$ XSS - 100$ 🌝
10
0
108
@0xMstar
MorningStar
3 years
XSS is everywhere, getting xss on 3-4 years old program is super cool :)
5
2
105
@0xMstar
MorningStar
3 years
New XSS section in @PrettyRecon is so fast, help to score some easy XSS in last month. You still need to exploit it & bypass WAF though .
Tweet media one
5
6
104
@0xMstar
MorningStar
3 years
2022 goals 1. To get proper sleep daily. 2. Improve health by acquiring healthy lifestyle. 3. I will look for some permanent job in infosec field (maybe). 4. Try to maintain same which I achieve in last year.
4
3
103
@0xMstar
MorningStar
2 years
Lol, why?
@0x3n0
Eno Leriand
2 years
Hi, this time i got SQL injection vulnerability to XSS My payloads : concat(0x3c7363726970743e70726f6d70742822,0x3078336e30,0x7c7c,user(),0x7c7c,database(),0x222c646f63756d656e742e636f6f6b6965293c2f7363726970743e) #bugbountytips #cybersecurity #infosec #bugbounty
Tweet media one
17
127
488
7
11
99
@0xMstar
MorningStar
2 years
Suggest some good resource to exploit mssql blind SQL injection . #bugbounty
10
16
100
@0xMstar
MorningStar
4 years
Some easy findings with @PrettyRecon . /actuator/env (Spring boot) #bugbounty
Tweet media one
1
14
98
@0xMstar
MorningStar
5 years
150 XSS submitted on @Bugcrowd :v ..lol
Tweet media one
5
0
98
@0xMstar
MorningStar
4 years
Suggest some best tools for subdomain finding . #bugbounty
21
23
95
@0xMstar
MorningStar
3 years
javascript:%0a%0dalert(1) Which are the characters we can use to perform xss, other than %0a & %0d ,here ?
9
16
92
@0xMstar
MorningStar
2 years
can I put security researcher/bug bounty hunter/pentester @Bugcrowd on my LinkedIn profile? or it just not professional. I recently seen lots of people doing it.
20
1
92
@0xMstar
MorningStar
4 years
Need motivation to hunt , have lots of private invites but no motivation to open laptop 😞
18
0
88
@0xMstar
MorningStar
2 years
This year , I got 25% less bounties compare to 2021 with 75% less reports. Reported more P1-P2 compare to last year. I spent average 20hrs a week on bug bounties, hopefully I will spend more time next year. Thanks @Bugcrowd for giving opportunity & sending good private invites :p
2
1
89
@0xMstar
MorningStar
3 years
🤯 lol...wtfff
Tweet media one
17
5
87
@0xMstar
MorningStar
4 years
XSS is out of scope but not open redirect 😭So I use javascript code redirect to another web. Why programs puts XSS is out of scope but not open redirect.
9
4
85
@0xMstar
MorningStar
4 years
Tweet media one
4
13
82
@0xMstar
MorningStar
3 years
I rarely got SQLi, or maybe I am not looking for it , as developer I see/use lots of web framework & ORM which prevents SQLi by default. So always think that there is no chance that I will get one. Have to look for this too. Nice work @GodfatherOrwa
3
11
82
@0xMstar
MorningStar
11 months
Got one endpoint /private/data/users Which potentially disclosing all users private information. But data is so huge as that webapp have millions of users causing server to time out. & not able to dump anything for POC
11
4
82
@0xMstar
MorningStar
2 months
Using prettyrecon, can easily search in my bug bounty targets database for CVE-2024-24919, no need to blindly run nuclei on all target subdomains. @PrettyRecon
Tweet media one
0
5
83