Toggle navigation
TWText.com
TWText.com
faq
Contact US
Follow US
#Hackerone
Bill Gurley
bgurley
Recently, I have been super impressed two elements of Zoom (@zoom_us). First, the scalability has been amazing. From 10mm to 200mm users, with increasing usage per user. Wow. Second, the
Read more
Hussein Daher
HusseiN98D
Thread about my life journey since my first bounty exactly 6 years ago.
Read more
Syed Mushfik Hasan Tahsin
SMHTahsin33
Hello,If you are just getting started into bug bounties and can't find enough resources, this thread might help you to find a way To get started into bug bounties
Read more
Hadley Beeman
hadleybeeman
It’s here! The @NHSCOVID19App for England and Wales is going live today. It will help each of us to keep our loved ones safe.It also keeps our personal information private.To
Read more
Aseem Shrey
AseemShrey
A 3 step process to finding and reporting critical secrets : Find secrets : Look into source control like Github, gitlab etcUse github dorks for more directed searches. Likehttps://github.com/techgaun/github-dorks/blob/master/github-dorks.
Read more
Huthaifa
J0rd4nian
#ثريد :مصادر لتعلم اختراق الاختبار ، من قنوات يوتيوب و كتب ومقالات ..الخ سأقوم بتجزئتها كل على حدى كيف تبدأ في مجال اختبار الاختراق :[ Guides/Roadmaps/How to Start ] :1.
Read more
Colin Snover
zetafleet
I reported this privilege escalation w/ arbitrary code execution vuln to @Backblaze in Oct 2019. Instead of following my recs to fix it, they apparently cheesed in some broken mitigations
Read more
Cory Doctorow
doctorow
You entrust digital products with a lot: from your thermostat to your car's informatics to your pacemaker to your email and financial data, defects in computers can expose you to
Read more