Jasmin Landry Profile Banner
Jasmin Landry Profile
Jasmin Landry

@JR0ch17

Followers
8,375
Following
466
Media
109
Statuses
737

Senior Director, Information Security @ Nasdaq | Bug Bounty Hunter

Montréal, Québec
Joined June 2016
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@JR0ch17
Jasmin Landry
4 years
I just found this on a pentest, my password can run OS commands.... WTF 😬
Tweet media one
29
89
623
@JR0ch17
Jasmin Landry
4 years
I decided to try and hack an Electron app tonight for the first time in my life and after 2-3 hours of hacking away at it, I finally managed to pop an RCE 😃
Tweet media one
14
66
607
@JR0ch17
Jasmin Landry
5 years
Some companies are so awesome, they actually send you their /etc/passwd file by email 😂
Tweet media one
17
38
375
@JR0ch17
Jasmin Landry
4 years
Well that's an easy Account Takeover, password reset token in the response🤦‍♂️ #bugbounty
Tweet media one
16
44
352
@JR0ch17
Jasmin Landry
4 years
Some late night hacking has lead to another weird OS command injection bug. The '$QUERY_STRING' environment variable is getting passed to the 'echo' command 🥲
Tweet media one
4
57
284
@JR0ch17
Jasmin Landry
4 years
Since I already shared the PoC payload for this, I guess I can also share more details. The XSS is stored by sending a meeting invite. I could literally send the invite to as many users as I'd like and as soon as they'd view their calendar in the app, I'd get a reverse shell!
Tweet media one
@JR0ch17
Jasmin Landry
4 years
I decided to try and hack an Electron app tonight for the first time in my life and after 2-3 hours of hacking away at it, I finally managed to pop an RCE 😃
Tweet media one
14
66
607
16
71
275
@JR0ch17
Jasmin Landry
4 years
@hackrzvijay It’s actually quite simple. "><img src="x" onerror=require('child_process').exec('/System/Applications/Calculator.app/Contents/MacOS/Calculator',function(){})>
3
59
228
@JR0ch17
Jasmin Landry
4 years
I had been keeping all of my swag in a box or bags ever since I started doing #BugBounty a few years ago. I finally decided to put some of it somewhere close to my desk! Thanks to @Bugcrowd @Hacker0x01 @SynackRedTeam @msftsecresponse @TheParanoids @Atlassian
11
7
198
@JR0ch17
Jasmin Landry
5 years
Part 1 of of my #bugbounty goal for the year has been achieved, top 50 all time on @Bugcrowd ! Now I'll have to try and stay there 😄
Tweet media one
27
8
194
@JR0ch17
Jasmin Landry
4 years
After having taken a break of hacking for a few months, I decided it was time to start hacking again, happy to be back! Now hopefully, they're all valid 😅 #BugBounty
Tweet media one
13
7
187
@JR0ch17
Jasmin Landry
5 years
One of the most unexpected/weirdest bugs I've ever found ended up being a pretty big deal for the program as the total bounty will be more than 2x the maximum of what is displayed in their bounty table. Always nice when programs appreciate your reports. #ItTakesACrowd @Bugcrowd
Tweet media one
14
6
181
@JR0ch17
Jasmin Landry
7 years
My very first bug bounty write-up... about time!
14
91
177
@JR0ch17
Jasmin Landry
5 years
- @Jin33sh4k : Hey want to collab? I found something interesting. - Me: Sure, let's go for it! Then 5 minutes later... #BugBounty #collaboration #collabftw #TogetherWeHitHarder
Tweet media one
5
14
174
@JR0ch17
Jasmin Landry
6 years
Tweet media one
Tweet media two
13
5
150
@JR0ch17
Jasmin Landry
6 years
Here's a write-up about an account takeover I got not too long ago, have a read :D
8
78
143
@JR0ch17
Jasmin Landry
6 years
Here are my slides for my talk at LevelUp 0x03 today #ItTakesACrowd
@Bugcrowd
bugcrowd
6 years
Thank you @JR0ch17 ! If you want to get a copy of his slides from Level Up 0x03, keep an eye on his twitter channel for more. Here's the link to see our next set of presentations: #ItTakesACrowd
Tweet media one
1
2
22
2
54
141
@JR0ch17
Jasmin Landry
5 months
Always fun reporting crits on a Friday afternoon 😅
Tweet media one
2
2
146
@JR0ch17
Jasmin Landry
6 years
With the year coming to an end, here are some 2018 stats and accomplishments: - First bounty: $300 for an SSRF - Last bounty: $2k for a PII info disclosure - Smallest bounty: $75 for an out-of-scope XSS (oops) - Biggest bounty: $15k for an RCE - Average bounty: $658.86
6
5
141
@JR0ch17
Jasmin Landry
4 years
Found this exact same bug a few months ago, definitely something to try in file uploads. #BugBounty
Tweet media one
Tweet media two
@SynackRedTeam
Synack Red Team
4 years
Check out "From File Upload to RCE": A @SynackRedTeam member’s write-up on a finding during testing that demonstrates the importance of validating file extensions on uploaded file types. #infosec #cybersecurity #RCE #FileUpload
4
111
269
2
27
132
@JR0ch17
Jasmin Landry
4 years
I'm up to 870 requests in the same Repeater tab, let's see how many I get too until I find a bug 😅
Tweet media one
8
10
131
@JR0ch17
Jasmin Landry
4 years
After watching @Jhaddix 's TBHMv4 talk, I figured I'd try and create my own S-Tier fancy UI to help in automating my #bugbounty recon. Sidebar almost done 😃
Tweet media one
11
5
128
@JR0ch17
Jasmin Landry
4 years
I've created this small tool to extract subdomains from this API. I'm using Node.js since I'm using that for my recon framework so easier to add in my tool 😃
@NahamSec
Ben Sadeghipour
4 years
In case you missed it, we released an api with all of our data from our talk at @VillageRedTeam ! Check it out:
Tweet media one
6
106
339
0
32
123
@JR0ch17
Jasmin Landry
4 years
When you get this in response to your report 😂 #harrypotter #BugBounty
Tweet media one
5
5
123
@JR0ch17
Jasmin Landry
6 years
Got my 100th bug of 2018 on @Bugcrowd yesterday, hopefully a lot more to come in 2019 😀
Tweet media one
10
2
122
@JR0ch17
Jasmin Landry
5 years
Tweet media one
6
2
116
@JR0ch17
Jasmin Landry
5 years
Thank you @Bugcrowd for inviting me to the Buenos Aires 🇦🇷 #BCBugBash and @ekoparty . Even though the target was quite difficult, I still managed to win the most P1s award as well as the "most interesting/weird bug"! Collaboration was great and learned a ton 👊
Tweet media one
12
5
119
@JR0ch17
Jasmin Landry
4 years
Exploited an RCE today that was assigned a CVE back in 2014 but didn’t have any public PoC (or maybe my Googling sucks and I didn't find one)😁
Tweet media one
4
1
114
@JR0ch17
Jasmin Landry
7 months
☀️🌴Hacking with this view from my room 🤩 #h1305
Tweet media one
5
0
109
@JR0ch17
Jasmin Landry
4 years
Sunny day + #hacktivitycon2020 = Awesome day by the pool
Tweet media one
2
3
97
@JR0ch17
Jasmin Landry
6 months
I wonder if people were taking pictures thinking it was Messi on the Nasdaq billboard in Times Square 🤔(apparently I look like him)
Tweet media one
Tweet media two
12
0
98
@JR0ch17
Jasmin Landry
5 years
Yay, I was awarded a $750 bounty on @Hacker0x01 for being lucky! I did not find the bug, the bug found me, literally! 😂 One day I just started receiving emails containing PII. #TogetherWeHitHarder
1
1
88
@JR0ch17
Jasmin Landry
3 years
That feeling when you finally escalate a LFR to RCE after 5 days of poking around 😅 #BugBounty
Tweet media one
Tweet media two
5
1
88
@JR0ch17
Jasmin Landry
3 years
Twitter these days be like
Tweet media one
2
6
79
@JR0ch17
Jasmin Landry
4 years
Excited to be presenting my talk "Beyond the borders of scope" at the first ever @Hacker0x01 H @cktivitycon ! #hacktivitycon2020 #togetherwehitharder
Tweet media one
3
5
78
@JR0ch17
Jasmin Landry
5 years
To celebrate the new year, @alxbrsn and I decided to share part of our first bounty of the year for a bug we found on @Hacker0x01 . We are giving away a 1-year subscription of @PentesterLab to the first person to guess the vulnerability type of the bug. #TogetherWeHitHarder
76
8
78
@JR0ch17
Jasmin Landry
3 years
Found my very first bug using @CaidoIO today! I’m really loving the UI 😍 can’t wait to see more of it!
Tweet media one
1
9
74
@JR0ch17
Jasmin Landry
6 years
I don't really like posting about my own success but man, July has been by far my best month ever doing bug bounties 😅
Tweet media one
7
3
71
@JR0ch17
Jasmin Landry
4 years
I haven't been hacking much recently since I've been spending more time coding (or learning how to code 😅) and working on automating my recon. I'm happy to say I finally got one part of my automation working today 😃 #BugBounty
Tweet media one
3
0
71
@JR0ch17
Jasmin Landry
5 years
Thank you @Bugcrowd for the baby onesie swag 👶
Tweet media one
0
0
64
@JR0ch17
Jasmin Landry
5 years
Well @SebMorin1 and I were in first place at the @Bugcrowd #bcbugbashsf2020 for a few minutes 😀until @rhyselsmore took over with a few P1s.
Tweet media one
3
2
62
@JR0ch17
Jasmin Landry
5 years
That's some pretty awesome swag we got here at #h1213 Thanks for another great event @Hacker0x01 @TheParanoids
Tweet media one
0
1
57
@JR0ch17
Jasmin Landry
1 year
1/1 on OAuth bugs 😁
Tweet media one
@JR0ch17
Jasmin Landry
1 year
It took 5 years but I finally found my very first critical OAuth related bug last night 😁 I have found a bunch in the past in pentests engagements but never in a bug bounty program!
7
0
56
5
2
57
@JR0ch17
Jasmin Landry
4 years
I took 3 months but I finally configured my @elgato Stream Deck I got from @Hacker0x01 for H @cktivitycon . I’m not really a streamer so I figured I’d put all of the tools I use on a day-to-day basis 😀
Tweet media one
4
1
56
@JR0ch17
Jasmin Landry
5 years
Update: On top of the "Most P1s" trophy I was awarded back in Buenos Aires in September, I found out today that I also won the "Best Bug" award 😀 @Bugcrowd #ittakesacrowd
Tweet media one
@JR0ch17
Jasmin Landry
5 years
Thank you @Bugcrowd for inviting me to the Buenos Aires 🇦🇷 #BCBugBash and @ekoparty . Even though the target was quite difficult, I still managed to win the most P1s award as well as the "most interesting/weird bug"! Collaboration was great and learned a ton 👊
Tweet media one
12
5
119
2
1
56
@JR0ch17
Jasmin Landry
1 year
It took 5 years but I finally found my very first critical OAuth related bug last night 😁 I have found a bunch in the past in pentests engagements but never in a bug bounty program!
7
0
56
@JR0ch17
Jasmin Landry
4 years
How about another good story. 3 years ago I found several bugs in a CMS while bug hunting on @Bugcrowd . I reported everything to them and they worked with me to fix those bugs. 3 years later, the CVEs I had requested back then finally got published and they told me this 👌
Tweet media one
@dee__see
Dominic
4 years
There are many disclosure horror stories so how about a good one? I reported a small security issue by email to an open source project (150M+ downloads). They replied quickly and we had a pleasant interaction on how to fix the bug. New release out soon, 10/10 would report again.
0
2
27
1
2
51
@JR0ch17
Jasmin Landry
4 years
The best swag of the year so far has been this hand sanitizer from @TheParanoids 😅 #CVE2020COVID19
Tweet media one
1
1
48
@JR0ch17
Jasmin Landry
6 years
I will be giving my first talk EVER during next month's LevelUp 0x3 virtual hacking conference 😀 #ItTakesACrowd
Tweet media one
2
3
47
@JR0ch17
Jasmin Landry
4 years
In this report, I give out #bugbountytips to prepare your journey as a full time bug bounty hunter like me (sort of) as well as my 5 favorite tools #bugbounty
@Bugcrowd
bugcrowd
4 years
Bugcrowd’s “Inside the Mind of a Hacker” annual report demystifies hackers with new data about where they come from, what motivates them, which skills they have, and how they see themselves. Dive into the report to learn more. #TakeHacktion
Tweet media one
1
20
47
1
4
43
@JR0ch17
Jasmin Landry
1 year
I just spent 6 hours working on an XSS + CSRF chain resulting in a full ATO and another 2 hours working on the report. Problem is, I’ve been rate limited on the app for the past few hours and I can’t test my PoC anymore. Hopefully it’s not a false positive or a dupe 😅
6
1
44
@JR0ch17
Jasmin Landry
5 years
On my way to San Francisco for quite a busy hacking week. First up #h1415 with @Hacker0x01 followed by @Bugcrowd 's #bcbugbashsf2020 #togetherwehitharder #ittakesacrowd #bugbounty
Tweet media one
Tweet media two
2
1
42
@JR0ch17
Jasmin Landry
5 years
Because of these 4 great hackers, we won the best team award 😁 #togetherwehitharder #h1213
@rootxharsh
Harsh Jaiswal
5 years
We did great guys! @v0sx9b @tabahi_90 @ralamosm @JR0ch17 ... Congrats to @v0sx9b for a 25k bounty 🤘
Tweet media one
0
2
111
1
0
41
@JR0ch17
Jasmin Landry
6 years
This is my first publicly disclosed a bug on @Hacker0x01 , it was an interesting XSS, took me a bit of time to get a working payload!
@disclosedh1
publiclyDisclosed
6 years
Valve disclosed a bug submitted by jr0ch17: - Bounty: $350 #hackerone #bugbounty
Tweet media one
0
2
19
2
2
42
@JR0ch17
Jasmin Landry
7 years
Thank you @Hacker0x01 for the swag and thanks to @yaworsk and @jobertabma for that awesome training and CTF!
Tweet media one
3
3
38
@JR0ch17
Jasmin Landry
4 years
@joevbruno Yeah since I could see the password in the response I was able to see how the application reacted when putting in special characters. That resulted in an interesting error message which made me realize I could simply run OS commands with ` ` and $( ).
2
2
38
@JR0ch17
Jasmin Landry
4 years
To add to my previous tweet, I also finally put my @Hacker0x01 LHE posters on the wall 😀 #BugBounty
Tweet media one
@JR0ch17
Jasmin Landry
4 years
I had been keeping all of my swag in a box or bags ever since I started doing #BugBounty a few years ago. I finally decided to put some of it somewhere close to my desk! Thanks to @Bugcrowd @Hacker0x01 @SynackRedTeam @msftsecresponse @TheParanoids @Atlassian
11
7
198
2
1
37
@JR0ch17
Jasmin Landry
4 years
Hunting for bugs at the park 🐜
Tweet media one
1
0
36
@JR0ch17
Jasmin Landry
4 years
Not sure if this is actually useful but I can now launch my recon tool from Slack when I’m afk 😅
3
0
38
@JR0ch17
Jasmin Landry
5 years
After having to participate remotely in the last 2 live hacking events from @Hacker0x01 and @Bugcrowd (for personal reasons), I finally get to be on site for this one! See you all in Buenos Aires 🇦🇷 at @ekoparty and at #BCBugBash
@okta
Okta
5 years
We’ll be at @ekoparty on 9/27 + 9/28: ✅ Looking for new hires onsite ✅ Hosting a hack Okta event with @Bugcrowd Join us:
Tweet media one
0
9
16
2
1
37
@JR0ch17
Jasmin Landry
5 years
Shout out to @samwcyo who told me this a week before the @Bugcrowd @Atlassian #BCBugBash I guess you can't say you're shit at events anymore! Congrats on the podium finish man 🏅
Tweet media one
1
0
35
@JR0ch17
Jasmin Landry
7 months
Having your #bugbounty report upgraded to critical 😃 always fun waking up to emails like these!
Tweet media one
@ArchAngelDDay
douglasday.eth
7 months
Having your #bugbounty report downgraded to Low when it's your only report: 😢😭 Having your #bugbounty report downgraded to Low when you've already reported 3 more: 🤷‍♂️😎
2
0
23
7
0
36
@JR0ch17
Jasmin Landry
6 years
I had the privilege to participate in the first @Hacker0x01 live event in Canada this past weekend, so @0xc0ffee_ , @plmaltais , @SebMorin1 and I decided to create a funny t-shirt for the occasion 😅 #h1514
@ShopifyEng
Shopify Engineering
6 years
Canadian hackers represent! #ShopifyxH1514 #h1514
Tweet media one
Tweet media two
3
3
37
1
1
35
@JR0ch17
Jasmin Landry
1 year
@Rhynorater @TheMasters Did you find a hole-in-one of their assets?
4
0
33
@JR0ch17
Jasmin Landry
2 years
Day 1 of @Bugcrowd ’s #VegasBugBash2022 done ✅. Now time to relax and prepare for what will be a crazy Day 2 on Thursday!
0
0
31
@JR0ch17
Jasmin Landry
2 years
If any Google bug bounty hunter needs me to social engineer someone, please let me know 👀
Tweet media one
2
1
31
@JR0ch17
Jasmin Landry
2 years
Tweet media one
6
0
32
@JR0ch17
Jasmin Landry
1 year
I recently stumbled on an app that was hosted in Azure. The database server name was leaked somewhere, with the name being . I figured I’d try connecting to it to see if it was publicly accessible, turns out it was but the user and/or password were wrong.
2
0
31
@JR0ch17
Jasmin Landry
5 years
1
0
27
@JR0ch17
Jasmin Landry
4 years
@pedr4uz @forshish This pretty much sums up how I got there
Tweet media one
1
3
28
@JR0ch17
Jasmin Landry
5 years
The winner is @secfaults as this bug was a blind XSS! Congrats to you on that @PentesterLab 1-year subscription!
@JR0ch17
Jasmin Landry
5 years
To celebrate the new year, @alxbrsn and I decided to share part of our first bounty of the year for a bug we found on @Hacker0x01 . We are giving away a 1-year subscription of @PentesterLab to the first person to guess the vulnerability type of the bug. #TogetherWeHitHarder
76
8
78
1
1
28
@JR0ch17
Jasmin Landry
6 years
Thought I had a blind XSS until I saw this in the DOM... Thanks @Rhynorater 😆 #BugBounty
Tweet media one
1
0
29
@JR0ch17
Jasmin Landry
5 months
Just realized that, excluding LHEs where dupes are common, my last dupe was almost a year ago: on March 31st 2023!!
@Bugcrowd
bugcrowd
5 months
Automation isn't really his thing and he rarely dupes. His method to bug hunting is one of a kind. Learn how to find better bugs with @JR0ch17 👇
2
25
101
3
0
26
@JR0ch17
Jasmin Landry
6 years
@stokfredrik 1. Read 2. Practice (build and break) 3. Read some more
1
0
26
@JR0ch17
Jasmin Landry
3 years
Looking back at an old ScoutSuite report using keys I got with an SSRF, still can't believe I had this much access on a prod environment 😅
Tweet media one
3
0
26
@JR0ch17
Jasmin Landry
6 years
Top 5 bug types: 1. Reflected XSS: 31 2. SSRF: 21 3. SQLi: 18 4. Priv Esc: 17 5. Info Disclosure: 14
0
1
26
@JR0ch17
Jasmin Landry
1 year
I continue hacking on the app, a few hours go by and I end up looking at Terraform documentation for a different reason and stumble on this . I’m sure you know where I’m going with this… yes it worked 🤦🏻‍♂️ I had full access to the DB, no need to get a SQLi!
Tweet media one
2
0
26
@JR0ch17
Jasmin Landry
3 years
I decided to do the same and also compare 2019 vs 2020. #BugBounty
Tweet media one
@alxbrsn
Alex Birsan
3 years
In case anyone's interested in my breakdown by severity
Tweet media one
2
3
70
1
1
24
@JR0ch17
Jasmin Landry
6 years
- 10 RCEs including 3 with root privs and 2 more with Meterpreter shells - 29% of my reports were dupes - 3 live hacking events - Earned ~18x more than in 2017 #BugBounty #ItTakesACrowd #TogetherWeHitHarder
2
1
25
@JR0ch17
Jasmin Landry
6 years
Woke up to a snowstorm yesterday but woke to this awesome view of San Francisco this morning 🌞
Tweet media one
1
0
25
@JR0ch17
Jasmin Landry
7 years
October has been really nice to me so far on @Bugcrowd #BugBounty
Tweet media one
2
1
25
@JR0ch17
Jasmin Landry
6 years
Thank you @Bugcrowd for inviting me to this great event!
@samhouston
Sam Houston
6 years
*Huge* thanks to @JR0ch17 , @hateshaped , @ben_ra for coming in to talk to the @Bugcrowd team! Happy that we do this every year, bringing our community members closer to employees. Great way for us all to better understand the impact of what we do 🎉 #ItTakesACrowd
Tweet media one
1
1
10
1
1
23
@JR0ch17
Jasmin Landry
5 years
When you're in a meeting at work and the app owner tells you "Oh sh*t, that's really bad you son of a b****!", you know you found a good bug 😂
2
0
24
@JR0ch17
Jasmin Landry
5 years
Always fun attending Jeopardy at #nsec19 😁
Tweet media one
0
3
23
@JR0ch17
Jasmin Landry
6 years
Found this vulnerability while attending a Docker workshop at @defcon 😄 Not the most complex bug but wtv I'll take it!
@CVEnew
CVE
6 years
CVE-2018-16316 A stored Cross-site scripting (XSS) vulnerability in Portainer through 1.19.1 allows remote authenticated users to inject arbitrary JavaScript and/or HTML via the Team Name field.
0
1
4
0
6
23
@JR0ch17
Jasmin Landry
2 years
About to do a workshop for students from @polymtl on bug bounty! Thank you @Hacker0x01 for sponsoring this event 😁
Tweet media one
1
0
21
@JR0ch17
Jasmin Landry
7 years
Thanks for the swag @msftsecresponse except maybe next time a t-shirt for men and not for women 😁 #bugbounty
Tweet media one
1
0
22
@JR0ch17
Jasmin Landry
5 years
Yeahhhh congrats @SebMorin1 ❤️
@Hacker0x01
HackerOne
5 years
The day belongs to @SebMorin1 , the Most Valuable Hacker 🏆 at #h165 ! Congrats to all our awardees and thanks @Dropbox for being an amazing partner!
Tweet media one
6
18
212
1
2
21
@JR0ch17
Jasmin Landry
4 years
Send over your questions 😁
@sillydadddy
siLLyDaddy
4 years
📢 #infosec AMA #18 Our next guest is :- ⭐️ @JR0ch17 ⭐️ Bug bounty hunter, currently ranked 50th all-time on @Bugcrowd . Ask him anything related to #bugbounty and get those awesome #bugbountytips ! Date :- Nov 6
Tweet media one
20
29
69
2
0
19
@JR0ch17
Jasmin Landry
4 years
To add to the lightning talk I’ll be giving at #hacktivitycon2020 on Saturday, I'll also be participating in this webinar at @DomeHacKP which will be streamed on YouTube and Facebook!
@DomeHacKP
HacKP - by Kerala Police
4 years
𝐇𝐚𝐜'𝐊𝐏 𝐖𝐞𝐛𝐢𝐧𝐚𝐫 𝐒𝐞𝐫𝐢𝐞𝐬 - 𝐁𝐨𝐮𝐧𝐭𝐢𝐟𝐮𝐥 𝐁𝐮𝐠𝐬 𝐢𝐧 𝐂𝐲𝐛𝐞𝐫𝐬𝐩𝐚𝐜𝐞 by Jasmin Landry & Anand Prakash @JR0ch17 @sehacure @CyberdomeKerala @TheKeralaPolice #HacKP #Webinar #VirtualHackathon
Tweet media one
0
8
26
1
0
21
@JR0ch17
Jasmin Landry
6 years
Attending the Hacker Jeopardy at @NorthSec_io . This event is awesome! 😂
Tweet media one
0
1
20
@JR0ch17
Jasmin Landry
1 year
Bug bounty rant below 😅 I was listening to @ctbbpodcast and the topic of CVSS came up. CVSS was created to give a numerical score of a vulnerability’s severity. So in theory, it would make sense in bug bounty right? We report a bug, give it a CVSS score and the program pays
2
0
20
@JR0ch17
Jasmin Landry
4 years
@akita_zen @Wappalyzer @vincd8 Why not use an official Wappalyzer cli tool? It seems to be more accurate. As an example, for I'm getting a bit more results.
Tweet media one
3
1
19
@JR0ch17
Jasmin Landry
6 years
Good morning Buenos Aires #h15411 #hackerone
Tweet media one
0
0
20
@JR0ch17
Jasmin Landry
6 years
I know it's a bit early, but I just booked my first trip to @defcon ! 😀  #LasVegas
3
0
20
@JR0ch17
Jasmin Landry
7 years
Thanks @synack @SynackRedTeam for the Happy Holidays card, love the poem 😁 #BugBounty #HappyHolidays
Tweet media one
0
1
18
@JR0ch17
Jasmin Landry
3 years
@Agarri_FR @OwaspNagpur @zseano I just uploaded my slides from that talk as well as slides from other talks I did last year :)
1
3
18
@JR0ch17
Jasmin Landry
7 years
Yay, I was awarded a $750 bounty on @Hacker0x01 ! #TogetherWeHitHarder
0
0
17