@inspector_amb Profile picture

inspector-ambitious

@inspector_amb

Full time father. Part time bug bounty hunter.

Similar User
Ophion Security photo

@OphionSecurity

💚🩷Laura ♥️💙 photo

@LauraTorresPS

Gregor Biswanger photo

@BFreakout

Bri0810 photo

@BrianBri0810

DiaperDonny photo

@JPnPHX80

Don Griffin photo

@dongryphon

Juris Vecvanags photo

@yuris3d

Dong Nguyen photo

@ndaidong

Dajae photo

@Quas_eee

István Pató photo

@patoistvan

Kristin Blackburn photo

@KristinB1214

👉🏾 𝙆𝙞𝙤 ✨ photo

@KioG

I never expected to find a bug-hunting takeaway in a nature documentary… 'To ensure their survival, lionesses target the largest and weakest prey when hunting.'


inspector-ambitious Reposted
Tweet Image 1

inspector-ambitious Reposted

I’ve just published a write up for a recent @GoogleVRP submission that highlights the importance of pinning Actions by SHA instead of tag. #GitHub #BugBounty adnanthekhan.com/2024/11/11/rel…


Only a few days left of vacation. And then...


Whatever you do. Never forget that your family should be your first priority.


Let's play a game. What is the most impactful vulnerability one could find at Google?


Flying to Málaga for escal8


Google VRP update: 3 were not applicable.

Tweet Image 1

Today I sent a payload targeting a specific system to trigger a RCE. It worked, but then a few minutes later other systems responded as well... (I did report everything)


inspector-ambitious Reposted

Now might be a good time to remind/inform people that some terminal emulators (including rxvt/urxvt) will invoke lpr to send arbitrary (postscript) data to the default printer when certain ANSI escape codes are used, and that data will be hidden from the user ;) Try this: curl…


It depends how you hunt. But personally I see benefits in trying to understand the architecture of the target in detail, it's ok to spend a week trying to understand a system in detail (AI can help massively)


Loading...

Something went wrong.


Something went wrong.