YesWeHack ⠵
@yeswehack
Global Bug Bounty & Vulnerability Management Platform 🎯 https://yeswehack.com/programs 👾 https://dojo-yeswehack.com 💡 https://www.yeswehack.com/blog
However your day’s been, it’s about to get better. Our @_leHACK_ video is out 😎 This edition had everything: a buzzing booth, heaps of swag, a fortune wheel, and of course, our #LiveHackingEvent. Press play and relive #leHACK2025 👇 youtube.com/watch?v=gZAOHn…
🔍 You can now track @yeswehack's #BugBounty programs and scopes on @zoomeye_team ’s Bug Bounty Radar! See which scopes suit your hacking skills 👉zoomeye.ai/bugbounty #YesWeRHackers #BugBountyTips

Ever heard of httpx? ⚡ A fast, powerful tool to probe URLs, detect live hosts, status codes, titles, tech stack & more. Supports HTTP/2, CDN/IP detection, filters & custom headers - perfect for massive recon 👉 github.com/projectdiscove… #BugBountyTips #YesWeRHackers

We’re proud to sponsor @BugBountyDEFCON this year again 😎 Meet @Brumens2 & Anthony Silva for #BugBountyTips, #Dojo demos, or a coffee ☕ Anthony will join the triage panel discussion with experts from other #BugBounty platforms on Aug 9. See you there! #DEFCON #YesWeRHackers

Want to be part of our next live hacking event at #NullconBerlin2025 on Sep 4-5? Apply for the @nullcon Bug Bounty Scholarship and get a FREE pass, which includes access to expert talks, workshops, CTFs and more 🔥 ⏳Deadline: July 28 🔗nullcon.net/berlin-2025/sc… #YesWeRHackers
Hacking a $1 billion company, choosing targets and his advice for beginners – @g4mb4h shares his #BugBounty story in this video interview 🔥👇 yeswehack.com/community/pati…
The countdown begins… Our next #LiveHackingEvent is getting closer – and this time, we're heading to Berlin for @nullcon 🇩🇪 🗓️ September 4-5 📍 #NullconBerlin2025 😎 Open to all conference attendees More info: yeswehack.com/page/yeswehack… #YesWeRHackers #LHE #BugBounty

Counting down to Las Vegas! 💫 In just a few weeks, we'll attend #BHUSA. Meet our team at booth #2367, grab exclusive swag, and try your skills on a special "Hide & Seek" challenge created by @Brumens2 🧠 More info 👉 yeswehack.com/page/yeswehack… #YesWeRHackers @BlackHatEvents

Bug hunters: how do you keep your morale up when you hit a dry spell? 🤔 @leo__rac reflects on the psychological side of hacking, his favourite vulnerabilities, tips for beginners and thoughts on the evolution of hacking 👇 yeswehack.com/community/chal…
A new #Dojo challenge is out! You have access to a CCTV application and need to upload a malicious firmware to control the CCTV 📹 Do you have what it takes? 👉 dojo-yeswehack.com/challenge-of-t… #YesWeRHackers #BugBounty

What happens when a Dojo challenge collides with a library update? 🔍 The Hex Color Palette challenge used to rely on a specific XXE flow – until lxml changed the rules. Find out why our latest Dojo report includes two different payloads and reports that leak the same flag via…

Want to get more out of @CaidoIO for your #BugBounty workflow? There might be a surprise in the video... 🎁 In Part 2 of our #TalkiePwnii Caido series, @pwnwithlove explores advanced features and plugins like QuickSSRF, AuthMatrix, YesWeCaido & more 👇 youtu.be/4NITbv-_C9w
Save the date! @swisspost’s 2025 Public Intrusion Test starts on 28 July 🚨 💰 Rewards up to €230K - with the highest payout to date at €40K 🎯 Bonus of €3K for the first 3 confirmed reports 🆕 Write-in fields now in scope Test the e-voting platform: yeswehack.com/programs/swiss…

Do you know how to perform port scanning, subdomain enumeration, HTTP fingerprinting and other intel-gathering activities? 🤔 Check out this recap of our six-part series on the recon techniques you need to know to thrive as a #BugBounty hunter 👇 yeswehack.com/learn-bug-boun…
Our latest hacker-focused roundup features abuse of ambiguous chunk line terminators to uncover request smuggling vulnerabilities, @slonser_ ‘making self-XSS great again’, and @infosec_au leveraging HTTP redirect loops to achieve full-response SSRF 🔥👇 yeswehack.com/news/chunked-p…
Good writing here by @yeswehack. When I get nostalgic on recon, I often 'dig' into the past using some variation of what's mention in the article, though my approach is more manual than tools (by simply spending more time on wayback machine). yeswehack.com/learn-bug-boun…