![Hisxo Profile](https://pbs.twimg.com/profile_images/1708237707355271168/5g0Oiqf8_x96.jpg)
Hisxo
@adrien_jeanneau
Followers
9K
Following
17K
Statuses
68K
📍 @yeswehack (aka Hisxo) - I love to break things (and I'm paid for that) - Bug Hunter 🔗 Check my Github repository https://t.co/Sj3prhiZyu #BugBounty
Rennes, France
Joined November 2009
RT @bearstech: Hoppscotch : une alternative Open Source à Postman & Insomnia pour le développement d'API. ✅ Support les méthodes HTTP ✅ We…
0
11
0
RT @Chocapikk_: 900+ WordPress plugins just casually leak their presence. No bruteforce, no guessing, just a simple request. Wild. Haven't…
0
230
0
RT @janleike: After ~300,000 messages and an estimated ~3,700 collective hours, someone broke through all 8 levels. However, a universal j…
0
81
0
RT @FlipZzzzzzz: Introducing; Mii Creator! A website that allows you to make your Mii! It doesn't stop there! It also allows you to create…
0
6K
0
RT @topazlabs: 🚀Big news! We’re launching Project Starlight: the first-ever diffusion model for video restoration. Enhance old, low-quality…
0
1K
0
RT @AnthropicAI: Nobody has fully jailbroken our system yet, so we're upping the ante. We’re now offering $10K to the first person to pas…
0
416
0
RT @yeswehack: “Feeling so close to discovering a critical vulnerability is incredibly addictive” 🔥 A passion for the process – not just th…
0
5
0
RT @iProgramInCpp: My Discord client, Discord Messenger, now runs on Windows 98! (And also, 95, but you need extra stuff. Win98SE runs it r…
0
944
0
RT @zhero___: very pleased to announce the release of my new article based on my research that led to CVE-2024-46982 titled: Next.js, cach…
0
221
0
RT @yeswehack: 📢 Our all-time #1 hunter stars in our first-ever #BugBounty report – now out! A rabhi Q&A features alongside 2024’s biggest…
0
17
0
RT @GodfatherOrwa: One more example for bad behavior / Scam in paid subscription for bugbounty I was there for…
0
31
0
Autant sur le tweet initial concernant les "hacks" des Discord/Twitch des streamers, je suis assez d'accord pour dire qu'il y'a une forte probabilité pour que ça soit juste du phishing/social engineering classique avec ouverture d'un ".exe". En tout cas j'y crois très très peu à la piste de l'exploitation d'une vulnérabilité sur le client Discord lui même où sur le browser lui même. Autant pour ce que tu dis concernant les XSS et CSRF, ça a beau être Google, Twitch ou je ne sais quel autre GAFAM, comme tout le monde ils ont des vulnérabilités et notamment des XSS (Stored ou Reflected) et ils doivent en recevoir fréquemment sur leur prog de Bug Bounty 😅
0
0
1
RT @yeswehack: Master the art of recon with our new blog series 😎 In this opening article, we explore the essential first steps of #BugBoun…
0
16
0