Joyerz5 Profile Banner
🔍mrro0o0tt Profile
🔍mrro0o0tt

@Joyerz5

Followers
1K
Following
814
Statuses
1K

Ranker by Day 🚀 | Hacker by Night 🕶️ #SEO #bugbounty

Somewhere in the WORLD
Joined March 2017
Don't wanna be here? Send us removal request.
@Joyerz5
🔍mrro0o0tt
16 hours
One thing I understand is that I should never STOP Hacking! If once I STOP, It is hard again to set up my mind to sit for hacking!!! Everyone should Follow the Consistency, It is MUST! #bugbounty #bugbountytips
0
0
5
@Joyerz5
🔍mrro0o0tt
21 hours
What new technique or attack did you learn today? Myself: Account Takeover via Password Reset In the URL field upon intercepting the request Put the Collaborator Link & when the victim clicks your link you will get the valid token to reset password. #bugbounty #bugbountytips
0
1
13
@Joyerz5
🔍mrro0o0tt
7 days
@0x0SojalSec Handy one!! Still Rock!!
0
0
1
@Joyerz5
🔍mrro0o0tt
7 days
RT @l1acker0x01: Bug: Reflected XSS Payload is reflected in: <script>window.pageType = 'test'-alert(document.cookie)-'';</script> #BugB
0
13
0
@Joyerz5
🔍mrro0o0tt
9 days
Seems like @BigCommerce is a scam program on @Bugcrowd I will post in details with the story soon. #BugBounty #scammers
0
0
15
@Joyerz5
🔍mrro0o0tt
9 days
@Bugcrowd Too much patience, Indeed.
1
0
5
@Joyerz5
🔍mrro0o0tt
13 days
@0xb3ludan Sounds interesting (400 functionalities)!
0
0
0
@Joyerz5
🔍mrro0o0tt
13 days
@0xb3ludan Right track! But Without knowing the whole approach it's hard to say whether it is okay or not! Sometimes a little trick can Shot the web! Maybe you have done 100 test cases but a little trick "Changing req Method" can be winner!
0
0
1
@Joyerz5
🔍mrro0o0tt
13 days
@0xb3ludan Thanks man..❤️‍🔥😎🙏
0
0
0
@Joyerz5
🔍mrro0o0tt
14 days
@wase_em_akram Welcome dude!!😉
0
0
0
@Joyerz5
🔍mrro0o0tt
14 days
@Joyerz5
🔍mrro0o0tt
14 days
New Writeup - How I Found 4 bugs from one single feature! Privilege Escation + IDOR #bugbounty #bugbountytips #bugbountywriteups
0
0
1
@Joyerz5
🔍mrro0o0tt
14 days
@Joyerz5
🔍mrro0o0tt
14 days
New Writeup - How I Found 4 bugs from one single feature! Privilege Escation + IDOR #bugbounty #bugbountytips #bugbountywriteups
0
0
0
@Joyerz5
🔍mrro0o0tt
14 days
@0xb3ludan User A & B from the same org. User A Can do the things that user B can not—yes, changing cookie plays! User B has no view/access to this delete feature even not any access regarding the whole function Task!
2
0
1
@Joyerz5
🔍mrro0o0tt
14 days
Oh SHIT! User B has no rights to upload files as well on any task. But it happens from User B!! --> Normal file uploaded! More test cases --> Upload Shell? Malicious Files? write-ups in detail about all these 3 bugs??
Tweet media one
2
0
6
@Joyerz5
🔍mrro0o0tt
18 days
@nav1n0x YOu guys are true gems for our Community! 🙏🙏
0
0
2
@Joyerz5
🔍mrro0o0tt
18 days
RT @nav1n0x: If your target uses Rails, look for Action View CVE-2019-5418 - File Content Disclosure vuln. Although this is an old bug, it…
0
2
0