- Disclosed.
- Posts
- Disclosed. May 18 2025: From Dubai to DEFCON. SSRF, RCE, and Upgrades to Naabu and More
Disclosed. May 18 2025: From Dubai to DEFCON. SSRF, RCE, and Upgrades to Naabu and More
The bug bounty world, curated.

Welcome to Disclosed.
Hey hackers! Lots of exciting updates to share from the past couple of weeks.
First off, I’m back home from the Ambassador World Cup finals in Dubai, and let me tell you, it was a wonderful event. I got to connect in person for the first time with so many hackers I’ve talked with online for years, and reconnect with lots of friends I’ve seen at cons and LHEs. It was a ton of work though, and low-key, I’m glad to say that the tournament is over. If you competed this year, make sure to give HackerOne all the feedback so they can iterate and improve for the next one!
Unfortunately, I got sick while traveling back home, which is why some of these announcements are a bit late. But in case you missed any of the craziness from the past couple of weeks, I’ve got you covered!
Thanks again, now onto the content:
In This Issue

Celebrating the HackerOne Ambassador World Cup Champions
🔗 Tweet by HackerOne
This tweet announces the winners of the Ambassador World Cup, applauding the contributions of security researchers and underscoring the significance of crowdsourced security.
Read the full tweet →
Ambassador World Cup Final Results 🏆
🥇 Spain — back‑to‑back #AWC champions! CONGRATULATIONS!
🥈 Egypt — an impressive run to 2nd place.
🥉 Greece — securing 3rd place after a hard‑fought battle.
🇳🇱 Netherlands — props for keeping the pressure on, right to the final— HackerOne (@Hacker0x01)
4:42 PM • May 13, 2025
Insights from Google LHE Winners Roundtable Discussion
🔗 Tweet by Critical Thinking - Bug Bounty Podcast
This tweet reveals a new episode featuring discussions with bug bounty winners and insights from the recent Google LHE event.
Read the full tweet →
Google LHE episode just dropped and your boys are MVH winners!
First we’re joined by Zak, to discuss the LHE and he surprised us with a bug of his own!
Then, we sit down with @0xLupin and @monkehack for a winners roundtable + event discussion.— Critical Thinking - Bug Bounty Podcast (@ctbbpodcast)
12:11 PM • May 15, 2025
Countdown to Hack Space Con
🔗 Tweet by HackSpaceCon
This tweet invites registrations for the upcoming Hack Space Con, emphasizing innovation and projects in the cybersecurity realm.
Read the full tweet →
Engage! Only 12 days until Hack Space Con begins on May 13th. Prepare to warp into a universe of innovation and groundbreaking projects. Your adventure is about to start! 🚀
Register Here: zurl.co/p54bL
#HackSpaceCon#FutureIsNow#Space#Cyber
— HackSpaceCon (@HackSpaceCon)
8:10 PM • May 1, 2025
Amazon's In-Person Challenge Yields 45 Critical Bugs
🔗 Tweet by HackerOne
Amazon's first in-person challenge, hosted on HackerOne, discovered 45 valid critical or high-severity issues in nine days, showcasing collaborative security effectiveness.
Read the full tweet →
28 researchers. 9 days. 45 valid critical or high severity issues uncovered.
@amazon's first-ever In-Person Challenge brought together top security researchers to test its systems.
A HackerOne Challenge is more than just a bug bounty—it’s an invite-only, time-bound offensive
— HackerOne (@Hacker0x01)
5:30 PM • Apr 25, 2025
Have something you want to Spotlight? Tell me.


NahamCon2025 Introduces AI-Focused Tracks for Hacking
🔗 Tweet by Nahamsec
NahamCon2025 will feature two days dedicated to specialized tracks, with Day 1 focusing on Hacking AI and Day 2 on the main signature track, featuring noted speakers.
Read the full thread →
Highlights from Nepal's First Open Bug Bounty Event
🔗 Tweet by Ananda Dhakal
This tweet summarizes a bug bounty event in Nepal, showcasing collaboration among hackers and participant interviews, emphasizing community involvement and sponsorship.
Read more →
We just wrapped up our first open-for-all bug bounty event. Lots of hacking, collabing, networking.
We also did live interviews of the AWC members and some of the best bug hunters of Nepal.
Huge thanks to @Hacker0x01 and @CedarGateTech for the sponsorship.
#togetherwehitharder
— Ananda Dhakal (@dhakal_ananda)
3:05 PM • May 17, 2025
CFP for Bug Bounty Village at DEF CON is Now Closed
🔗 Tweet by Bug Bounty Village
The call for papers for the Bug Bounty Village at DEFCON is closing soon, inviting submissions for talks and workshops on hacking and vulnerability research.
Read the full tweet →
New Bug Bounty to Test Anti-Jailbreaking System
🔗 Tweet by Anthropic
A bug bounty initiative has launched to evaluate an updated anti-jailbreaking system, running through Sunday in collaboration with Hacker0x01.
Read the full tweet →
Did I miss an important update? Tell me.

PentestPad/subzy: Subdomain Takeover Vulnerability Checker
📁 Tool by PentestPad
This GitHub repository introduces Subzy, a subdomain takeover vulnerability checker that identifies potential vulnerabilities via response fingerprint matching. It includes installation instructions for Golang users and provides effective usage examples. Key command options allow users to customize scans to their requirements, improving vulnerability discovery efficiency.
View the tool →

xnl-h4ck3r/knoxnl: Python Wrapper for KNOXSS API
📁 Tool by xnl-h4ck3r
The knoxnl project offers a Python wrapper for the KNOXSS API, aimed at XSS vulnerability testing. It features installation instructions, command usage options, and examples showcasing vulnerability scanning techniques. Notable features include customizable output, support for both GET and POST requests, and Discord notification integration. Documentation highlights API usage protocols and specific flags for optimal performance.
View the tool →
Effortlessly Split IP Ranges with mapcidr Tool
🔗 Tweet by ProjectDiscovery
This tweet showcases the mapcidr tool, which quickly segments large IP address ranges into /24 subnets, facilitating easier network management for security assessments.
View the tool →
reconFTW v3.1.0 Released with Exciting New Features
🔗 Tweet by Six2dez
The latest reconFTW version enhances reconnaissance for bug bounty hunters with improved analysis tools, a new AI-based subwizard, and Arcanu tool integration.
View the tool →
CaidoIO Releases Major Update with WebSocket Interception
🔗 Tweet by Caido
The latest CaidoIO update integrates features like WebSocket interception and guest mode, enhancing the tool's security testing capabilities.
View the tool →
SecShiv/OneDorkForAll
📁 Tool by SecShiv
The 'OneDorkForAll' repository hosts a vast collection of over 1 million Google dorks, useful for penetration testing and vulnerability discovery. Recently updated, it includes dorks associated with dark web searches and various patterns to assist security research, while cautioning against potential misuse.
View the tool →
Naabu Now Supports UDP Port Scanning for Recon
🔗 Tweet by ProjectDiscovery
This tweet announces Naabu's new support for UDP port scanning, providing commands to bolster users' reconnaissance efforts.
View the tool →
Have a favorite tool? Tell me.

Shopify | Report #2885269 - Privilege Escalation via Partners Invitation Process
📝 Writeup by mr_asg
This report documents a vulnerability allowing unauthorized users to escalate privileges in Shopify's Partner invitation process without email verification. It details reproduction steps, a Proof of Concept video, and recommendations for reinforcing security through email verification and multi-factor authentication.
Read more →
💵 The $2500 Bug: Remote Code Execution via Supply Chain Attack
📝 Writeup by Naveen Kumawat
This blog recounts an RCE attack linked to a compromised GitHub account. The author outlines how to identify vulnerable repositories and execute attacks, detailing mitigation strategies following responsible disclosure.
Read more →
$10,000 Bounty: HackerOne Report Comments Leak via “Export as .zip”
📝 Writeup by Monika Sharma
This blog highlights a critical vulnerability in HackerOne's 'Export as .zip' feature that inadvertently exposed private comments. The author details the discovery process, proof of concept, and advice for locating similar bugs by assessing data visibility across interfaces.
Read more →
$25,000 SSRF in HackerOne’s Analytics Reports
📝 Writeup by Monika Sharma
The article discusses an SSRF vulnerability in HackerOne’s PDF generation that exposed sensitive AWS metadata. It includes code snippets illustrating the exploitation process that resulted in a $25,000 bounty.
Read more →
$3,750 Bounty: Account Creation with Invalid Email Addresses
📝 Writeup by Monika Sharma
This write-up examines a vulnerability in HackerOne’s account creation process that allowed sign-ups with invalid email formats. The findings underscore the need for rigorous format validation to prevent injection attacks and data integrity issues.
Read more →
Did I miss an important update? Tell me.

Intigriti May XSS Challenge (0525)
📝 Writeup by Intigriti
This blog details the Intigriti XSS Challenge, highlighting vulnerabilities like regex bypass and DOM clobbering, including payload crafting for validation bypass and script injection.
Read more →

2fa, OTP Bypass Checklists 2025
📝 Writeup by Mohaned Alkhlot
This blog collates various techniques for bypassing 2FA and OTP mechanisms, providing insights into attack vectors and practical examples for ethical hackers looking to enhance their methodologies.
Read more →
A Guide to Path Traversal and Arbitrary File Read Attacks
📝 Writeup by YesWeHack
This guide explains path traversal and arbitrary file-read vulnerabilities, alongside detection methods, encoding tricks for bypassing defenses, and chaining exploits for greater impact.
Read more →
Uncover Hidden URLs with Archived JavaScript Files
📝 Writeup by Jsmon.sh
This blog reveals a method for extracting hidden URLs from archived JavaScript files, outlining a process that can unveil forgotten APIs and services for bug bounty reconnaissance
Read more →
Automated Techniques for Detecting Misconfigured AWS S3 Buckets
🔗 Tweet by Intigriti
This tweet discusses automation techniques for identifying misconfigured AWS S3 buckets, addressing prevalent security issues in cloud environments.
Read more →
Mastering Rate Limit Bypass Techniques
📝 Writeup by coffinxp
Nikhil Shrivastava shares his successful journey in bug bounty hunting, offering advice on strategic vulnerability selection and the role of learning and persistence in achieving success.
Read more →
Master CRLF Injection
📝 Writeup by coffinxp
This post explores CRLF Injection vulnerabilities and their potential to alter HTTP header behaviors, emphasizing recognition and mitigation for modern web applications.
Read more →
Did I miss something? Tell me.

The Mindset for Finding Highs and Crits in Bug Bounty
🎥 Video by Bug Bounty Reports Explained
In this talk, bug bounty hunter JR0ch17 discusses insights from their journey, underlining the hacker mindset developed through experiences like OSCP training. They emphasize report impact, critical bug strategies, and the balance between life and bug hunting.
Watch video →
Reflections on a Decade in Bug Bounties
🎥 Video by Bug Bounty DEFCON
This presentation reviews key lessons learned in bug bounties from both triager and researcher perspectives, sharing practical advice for honing bug hunting skills and community engagement
Watch video →
This Tiny Chrome Behavior Leads to an Account Takeover
🎥 Video by NahamSec
This video discusses a critical vulnerability in browser behavior that may lead to account takeovers, demonstrating an exploit setup and highlighting key concepts around referral policies.
Watch video →
Explaining XSS Through a Viral Breakdown Video
🔗 Tweet by Aditya Soni
This tweet shares a video that simplifies XSS mechanics, making it easier for researchers to understand the vulnerability.
View the Tweet →
Did I miss something? Tell me.

Testing IDORs: Beyond Incrementing IDs
🔗 Tweet by RogueSMG
This tweet emphasizes the necessity of employing various HTTP methods when testing for Insecure Direct Object References (IDORs), as primary method authentication may not be enforced.
Read the full tweet →
When testing for IDORs, don't just increment IDs. Try different HTTP methods (PATCH/PUT/DELETE) on the same endpoint with another user's ID.
Sometimes auth is only enforced on the primary method🤡
Found a LOT of such cases over the years :)#bugbountytips#BugBounty#Pentesting
— RogueSMG (@RogueSMG)
5:00 AM • May 13, 2025
Upcoming Bugcrowd 101 Talk at BSides Amman
🔗 Tweet by Godfather Orwa 🇯🇴
Join us for a 'Bugcrowd 101' talk at BSides Amman, focusing on bug bounty platform insights, critical bug demonstrations, and system setups for both novice and expert hunters.
Read the full tweet →
All friends / followers in #Jordan
My talk with the amazing #HackerX007@XHackerx007 this week in @BSidesAmman
The talk is #BugCrowd 101 (The Power Of Bugbounty)
This talk goin to be so interesting and so helpful for Bug bounty / Pentesting
In this talk we will present
— Godfather Orwa 🇯🇴 (@GodfatherOrwa)
9:33 AM • May 14, 2025
Unlocking Secrets in Deleted Git Files for Profit
🔗 Tweet by Critical Thinking - Bug Bounty Podcast
Discover how Sharon Brizinov successfully earned $64,000 by retrieving secrets from deleted Git files, underlining that removed files can still be accessible through git rm.
Read the full tweet →
Sharon Brizinov made ~$64k by recovering secrets from deleted files in public Git repos. Even after using git rm, files remain in the history stored in the .git/objects dir until garbage collection runs.
Here's the command to use:
— Critical Thinking - Bug Bounty Podcast (@ctbbpodcast)
4:30 PM • May 15, 2025
Exploring $3,000 Instagram IDOR Vulnerability Write-Up
🔗 Tweet by Dark Web Informer - Cyber Threat Intelligence
The tweet highlights a $3,000 bounty awarded for an IDOR vulnerability in Instagram, along with a link to a comprehensive write-up of the findings.
Read the full tweet →
[Bug Bounty] $3,000 Instagram delete highlight cover IDOR
Credit: youtube.com/@adragos_
Write-up: adragos.ro/idor-bug-insta…— Dark Web Informer - Cyber Threat Intelligence (@DarkWebInformer)
5:15 PM • May 15, 2025
Did I miss something? Tell me.
Did you like this week's drop?Please share feedback. |
Because Disclosure Matters: This newsletter was produced with the assistance of AI. While I strive for accuracy and quality, not all content has been independently vetted or fact-checked. Please allow for a reasonable margin of error. The views expressed are my own and do not reflect those of my employer.