@ApinLusen Profile picture

ApinLusen

@ApinLusen

Hacker | Security Reseacher | Google Hall of Fame | BSCP | OSCP | Security+

Similar User
Zodiac photo

@TopsecretArtpc

Shubham photo

@The_Cyber_Lycan

Rezn photo

@HanggoroSeto

Sourabh_tomar_official photo

@sourabh_tomar_

🇮🇹peppespe🇪🇺 photo

@peppespe

Het Vikam photo

@mangekyo_sec

avcatshy photo

@avcatshy

Naman photo

@BitThr3at

Saint_I_Aint photo

@S41NTsec

Astitwa Rawat🇮🇳 photo

@Astitwa_07

Haider Ali photo

@AlHaxor

Ar3ker0 photo

@Ar3ker0

praveen photo

@praveenstatuzz

Saurabh Kumar photo

@r3verseb0t

Roshan photo

@Roshan90972416

ApinLusen Reposted

During a bug bounty engagement for a program with four distinct Android applications, I discovered that one of the applications exposes a deep link handler associated with the login functionality, utilizing the scheme `scheme://login?token=...`. Read the Comments ⬇️

Tweet Image 1
Tweet Image 2
Tweet Image 3

ApinLusen Reposted

🕷️Exploiting Unconventional SQLis Manually 💉 A thread 🧵 1/n #sqli #synack #srt

Tweet Image 1

ApinLusen Reposted

How I Took Over All Mail Operations Of A Client A thread. 🪡🧵 #bugbounty #infosec #javascript 1/n

Tweet Image 1

ApinLusen Reposted

Congrats!! Folks, if you want a MASSIVE program to test your skills on... Try FIS on @Bugcrowd Its literally endless targets and pays a ton. Read the brief very carefully, its got a lot of restrictions. Still a lot left out there to be sure. Maybe I will join you 🤣

Reported my first finding on @Bugcrowd SSRF to internal port scanning ! - Was on that same program @rounak131106

Tweet Image 1


ApinLusen Reposted

A few little easy checks for webapps that can land critical vulnerabilites (I do these every time, just in case). - Once you've logged in, search your password in Burp history. Make sure your plaintext password isn't being sent anywhere it shouldn't (like a logging service). -…


ApinLusen Reposted

In this video I go over a simple $20,000 P1 #bugbounty report for IDOR based session stuffing that was found using a search engine, the Wayback Machine, and manual testing. Bug resolved, target information redacted. Get out there and slay them bugs yall'. Thanks @Bugcrowd!


ApinLusen Reposted

Database of leaked credentials; find emails, passwords, and more. weleakinfo.io More... -> t.me/+YIT5lj0qIsg2Z…

Tweet Image 1

ApinLusen Reposted

In this new #ZwinKUniversity series, I go over my own P1/critical #bugbounty reports from the @bugcrowd platform so we can see what real world reports look like and discuss different bug types. These reports will all be in a resolved state and obfuscated or redacted…


ApinLusen Reposted

What an amazing time to be building stuff in tech

Tweet Image 1

ApinLusen Reposted

ZwinK University v1.0 - All Content Reposted #17: Subdomain Recon with Intruder


ApinLusen Reposted

🔒Bug Bounty Tips - Here's how I earned a $6000 Bounty by escalating a simple Elmah File Disclosure Issue 🔒 💡 If you haven't already, add /elmah and /elmah.axd to your wordlist! These paths often lead to Elmah file disclosures, a finding many researchers report as Low/Medium…

Tweet Image 1

ApinLusen Reposted

Another day another bug 🔥 This time we found #XXE in a PHP application by searching for the string: libxml_disable_entity_loader(false) It indicates that external XML entities are able to be loaded. Add it to your list :) #bugbounty #bugbountytips #Hacking

Tweet Image 1

ApinLusen Reposted

In the first new #bugbounty video, I go over (3) manual subdomain reconnaissance sites, how to check which are online, potentially find WAF bypasses, and how I use dorks to manually explore and pivot. This is an intermediate level video requiring some existing understanding of…


ApinLusen Reposted

Here's a quick hack to easily find SSRF vulnerabilities! 🤑 Open your proxy interceptor and set the following match & replace rule! This will replace any URL in your incoming requests with your canary token! 👇

Tweet Image 1

ApinLusen Reposted

Editorial from @hackthebox_eu involves abusing a SSRF to read private data from an internal API, leaking a password. Then I'll abuse Git two ways, first finding another password in an old commit, and then exploiting CVE-2022-24439 to get root. 0xdf.gitlab.io/2024/10/19/htb…


ApinLusen Reposted

If you're new to bug hunting, you've gotta check out offsec.tools! It's a HUGE collection of security tools designed to help pentesters and bug hunters in their every day tasks! 🧰 Check it out: offsec.tools


ApinLusen Reposted

Yay, I was awarded a $15,000 bounty on @Hacker0x01! The program was running a 3x campaign and had an average of 0% critical vulnerabilities. An unusual combination of persistent tokens and good ol' Google Dorking. I will be doing a write-up for this one when it is resolved,…

Tweet Image 1

ApinLusen Reposted

I’ve already found several bugs within days of using it. Expected bounties is in mid 4 digits. This tool is simple, almost naive, but it works, so who cares🤷🏻‍♂️ If you want to play with it, check it out at github.com/ngalongc/authz… and let me know if you has any success using it,…


ApinLusen Reposted

New giveaway, this time thanks to @hacker0x01! We will pick 10 winners to win a 1-month pentesterlab license! To enter: 1️⃣ Follow us @BugBountyDefcon and @hacker0x01 2️⃣ Like this post ❤️ 3️⃣ Retweet this post The giveaway is open until next Friday (10/25) Good luck Everyone!


Loading...

Something went wrong.


Something went wrong.