![🔍mrro0o0tt Profile](https://pbs.twimg.com/profile_images/1703812095878590464/K48ztE5v_x96.jpg)
🔍mrro0o0tt
@Joyerz5
Followers
1K
Following
814
Statuses
1K
Ranker by Day 🚀 | Hacker by Night 🕶️ #SEO #bugbounty
Somewhere in the WORLD
Joined March 2017
One thing I understand is that I should never STOP Hacking! If once I STOP, It is hard again to set up my mind to sit for hacking!!! Everyone should Follow the Consistency, It is MUST! #bugbounty #bugbountytips
0
0
5
What new technique or attack did you learn today? Myself: Account Takeover via Password Reset In the URL field upon intercepting the request Put the Collaborator Link & when the victim clicks your link you will get the valid token to reset password. #bugbounty #bugbountytips
0
1
13
RT @l1acker0x01: Bug: Reflected XSS Payload is reflected in: <script>window.pageType = 'test'-alert(document.cookie)-'';</script> #BugB…
0
13
0
Seems like @BigCommerce is a scam program on @Bugcrowd I will post in details with the story soon. #BugBounty #scammers
0
0
15
@0xb3ludan Right track! But Without knowing the whole approach it's hard to say whether it is okay or not! Sometimes a little trick can Shot the web! Maybe you have done 100 test cases but a little trick "Changing req Method" can be winner!
0
0
1
New Writeup - How I Found 4 bugs from one single feature! Privilege Escation + IDOR #bugbounty #bugbountytips #bugbountywriteups
0
0
1
New Writeup - How I Found 4 bugs from one single feature! Privilege Escation + IDOR #bugbounty #bugbountytips #bugbountywriteups
0
0
0
@0xb3ludan User A & B from the same org. User A Can do the things that user B can not—yes, changing cookie plays! User B has no view/access to this delete feature even not any access regarding the whole function Task!
2
0
1