ergoproxy
@_erg0sum
16 year old whimsical wizard and part time fintech phantom. Red Team & Bug Bounty. CPTS,CRTP | Views are my own. Not affiliated with my employer.
I AM PLEASED TO SHARE THAT I HAVE PASSED THE CPTS CERTIFICATION @ HACKTHEBOX !!!

This stuff is slowly killing us
bro if an OAuth token leaked in a js file and you're asking “what should I do? how to escalate?” aren’t you a bug bounty hunter? not everything needs spoonfeeding. if we need help with this, and ask ai not even humans, idk man... is this what cybersecurity becoming?
FRUIT SHELL IYKYK
Added a new tool to: powershellforhackers.com/tools/revshell/ ⚠️Please Use Responsibly⚠️ You can use this to instantly generate an obfuscated reverse shell in powershell that i have personally used to beat EVERY single EDR out there right now. I've added some pretty cool stuff to my website…
HACKER’S most basic — yet powerful — trick: 💥 AUTHENTICATION BYPASS 💥 via SQL injection Still works in 2025. Still crazy effective. What’s your go-to payload? 👇 Here are a few of mine: ' OR 'chux'='chux ' OR IF(1=1, SLEEP(5), 0)-- ⏱️ This weird looking payload got me A LOT…
Added a new tool to: powershellforhackers.com/tools/revshell/ ⚠️Please Use Responsibly⚠️ You can use this to instantly generate an obfuscated reverse shell in powershell that i have personally used to beat EVERY single EDR out there right now. I've added some pretty cool stuff to my website…
Thank you for hacking them Dubai demons
Crumbl Cookies data allegedly breached Everest claims data on 29,000 employees The threat actor was kind enough to leave a recorded message for @crumbl lawyers
Did you know… certutil.exe can: Download remote payloads Base64 decode files Write to disk All using a signed Microsoft binary? This LOLBin is trusted by Defender. Attackers love it. Blue teams often miss it. 👊🏾
Did you know… certutil.exe can: Download remote payloads Base64 decode files Write to disk All using a signed Microsoft binary? This LOLBin is trusted by Defender. Attackers love it. Blue teams often miss it. 👊🏾
Yay, I was awarded a $700 bounty on @Hacker0x01! hackerone.com/erg0sum #TogetherWeHitHarder
Pedro pascal in every interview 💀💀https://t.co/PqvEmTLcp3
I’m going to capitol technology university for my first cyber event today! Career development day with @BHinfoSecurity