Electro0ne Bytes
🦅
@electro0ne_bytes
364
subscribers
5
photos
60
links
I publish articles related to hacking and security for you, so let's learn together.
💪
Contact:
@Electro0ne
Blogs:
electro0nes.github.io
Download Telegram
Join
Electro0ne Bytes
🦅
364 subscribers
Electro0ne Bytes
🦅
Channel created
Electro0ne Bytes
🦅
https://samcurry.net/hacking-starbucks/
samcurry.net
Hacking Starbucks and Accessing Nearly 100 Million Customer Records
After a long day of trying and failing to find vulnerabilities on the Verizon Media bug bounty program I decided to call it quits and do some chores. I needed to buy gifts for a friends birthday and went online to order a Starbucks gift card.
Electro0ne Bytes
🦅
https://medium.com/@securityinsights/how-i-hacked-into-nasa-got-hall-of-fame-acknowledgement-2025-d22815f09e29
Medium
How I Hacked NASA & Got a Hall-Of-Fame Acknowledgement - 2025
👋
Hi, I’m Mehboob Khan, a Computer Science & Engineering graduate (2023). I’m obsessed with understanding how technology ticks and love bypassing logic to uncover hidden vulnerabilities.
🔍
💻
As a…
Electro0ne Bytes
🦅
https://www.vaadata.com/blog/graphql-api-vulnerabilities-common-attacks-and-security-tips/
VAADATA - Ethical Hacking Services
GraphQL API Vulnerabilities, Common Attacks & Security Tips
What Is GraphQL API and how does it work? This article explains the common vulnerabilities and attacks on this type of system and security tips to secure APIs.
Electro0ne Bytes
🦅
https://x.com/0x0SojalSec/status/1878516348957188540
Electro0ne Bytes
🦅
https://x.com/0x0SojalSec/status/1878494716020281688
Electro0ne Bytes
🦅
https://x.com/0x0SojalSec/status/1878507842585366606?t=SfDv-1PlF98vxW7-7vK-LA&s=19
X (formerly Twitter)
Md Ismail Šojal
🕷️
(@0x0SojalSec) on X
Time-Based Blind SQL Injection In GraphQL
The “sortc” parameter in the https://t.co/NrK100JSe5 endpoint was vulnerable to a SQL injection.
1) Login to the website.
2) Intercept the following request:
3) In the request body, add “OR SLEEP(20)” in sortc…
❤
1
Electro0ne Bytes
🦅
https://blog.teddykatz.com/2019/11/05/github-oauth-bypass.html
Teddy Katz’s Blog
Bypassing GitHub’s OAuth flow
For the past few years, security research has been something I’ve done in my spare time. I know there are people that make a living off of bug bounty programs, but I’ve personally just spent a few hours here and there whenever I feel like it.
❤
1
Electro0ne Bytes
🦅
Write-ups for prompt injection
✅
https://embracethered.com/blog/
Please open Telegram to view this post
VIEW IN TELEGRAM
❤
1
Electro0ne Bytes
🦅
https://www.bugbountyhunter.com/guides/?type=javanoscript_files
Bugbountyhunter
Making use of Javanoscript (.JS) files | Guides on BugBountyHunter.com
Browse guides written to help you with your bug bounty hunt. Learn various tips, tricks and techniques and begin finding more bugs
❤
1
Electro0ne Bytes
🦅
https://trufflesecurity.com/blog/millions-at-risk-due-to-google-s-oauth-flaw
Trufflesecurity
Millions of Accounts Vulnerable due to Google’s OAuth Flaw ◆ Truffle Security Co.
Millions of Americans can have their data stolen right now because of a deficiency in Google’s “Sign in with Google” authentication flow. If you’ve worked for a startup in the past - especially one that has since shut down - you might be vulnerable.
❤
1
TWeb.init({scrollToPost:'electro0ne_bytes/1'});