Youssef Sammouda

@Samm0uda

Cyber Security Expert. YES™ team member.

Vrijeme pridruživanja: listopad 2016.

Tweetovi

Blokirali ste korisnika/cu @Samm0uda

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Samm0uda

  1. proslijedio/la je Tweet
    28. sij

    I'm looking for a new role doing something AppSec/Red Team/OSINT related in Seattle or remote. My strong suite is web and mobile security, with lots of bug bounty experience. My resume and contact info are on , DMs open as well. RT's are much appreciated.

    Poništi
  2. proslijedio/la je Tweet
    26. sij

    Кто рано встаёт, тому Бог подаёт записать скоро )) Yes™

    Poništi
  3. 26. sij

    Data extraction bug in Facebook. Sorry, no write-up for this one for the current time!

    Poništi
  4. proslijedio/la je Tweet
    24. sij

    Create living room polls as a Facebook page analyst



    Poništi
  5. 24. sij

    Cross-Site Websocket Hijacking bug in Facebook that leads to account takeover

    Poništi
  6. proslijedio/la je Tweet
    23. sij

    Subscribe to the list of requesters to join a Facebook live video using MQTT

    Poništi
  7. 10. sij

    Anyone knows how the Payee manager program with Westernunion works? I've been struggling for a month now checking both sides and no luck!

    Poništi
  8. proslijedio/la je Tweet

    ┏━━┓┏━━┓┏━━┓┏━━┓ ┗━┓┃┃┏┓┃┗━┓┃┃┏┓┃ ┏━┛┃┃┃┃┃┏━┛┃┃┃┃┃ ———HACK THE PLANET———- ┃┏━┛┃┃┃┃┃┏━┛┃┃┃┃ ┃┗━┓┃┗┛┃┃┗━┓┃┗┛┃ ┗━━┛┗━━┛┗━━┛┗━━

    Poništi
  9. 22. pro 2019.
    Poništi
  10. 18. pro 2019.

    Always appreciate cool swags. Thanks FACEBOOK!

    Poništi
  11. proslijedio/la je Tweet
    12. pro 2019.

    First blog post in a short series about some vulnerabilities that I found in Ubuntu's crash reporter earlier this year. I learned a lot from working on the exploits, so I am going to share some of the tips and tricks that I learned.

    Poništi
  12. proslijedio/la je Tweet
    9. pro 2019.

    We open sourced PathAuditor: a tool for Linux that and I worked on this summer. Tl;dr: you can use it to instrument root daemons and find insecure file access patterns like CVE-2019-3461. Check out the code: Blog post:

    Poništi
  13. proslijedio/la je Tweet
    6. pro 2019.

    Subscribe to typing notifications for any Instagram user



    Poništi
  14. 3. pro 2019.

    2019 accomplishments: - Got 250k$ in bounties from two BB programs only. - Went to my first Hacking Event and met grade people 2020 goals: - Participate more in other BB programs - Expand my knowledge to other areas like browser and mobile vulns research - Make 1m$ in bounties.

    Poništi
  15. proslijedio/la je Tweet
    2. pro 2019.

    Kernel exploits for the Oculus Quest CVE-2018-9568 - WrongZone CVE-2019-2215 - BinderThreadUaf

    Poništi
  16. proslijedio/la je Tweet
    28. stu 2019.
    Poništi
  17. 27. stu 2019.

    Reflected XSS in graph .facebook.com which leads to account takeover in IE/Edge

    Poništi
  18. 11. stu 2019.

    Anyone is called a hacker these days!

    Poništi
  19. 27. ruj 2019.

    Back to hunting! i'm taking a break from FB program and i'm moving to H1.

    Poništi
  20. 23. ruj 2019.

    And yes i think i chose the perfect background!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·