- Disclosed.
- Posts
- Disclosed. May 25, 2025: From Nepal to NahamCon. XSS Smuggling, NoSQL Injection, and Updates to Burp and Caido
Disclosed. May 25, 2025: From Nepal to NahamCon. XSS Smuggling, NoSQL Injection, and Updates to Burp and Caido
The bug bounty world, curated.

Welcome to Disclosed.
Hey hackers! This was a big week for bug bounty content as NahamCon just wrapped up! I didn’t get a chance to watch all the content due to work, but I was able to pop in/out. Ya’ll gotta tell me what I missed as I’m sure there were some bangers in there. I can’t wait to start watching the recordings as they come out on YouTube.
In other news, I’ve found some awesome video creators in the bug bounty scene this week. Shoutout to Coffee&&Pizza for including me on an episode for an interview, and shoutout to ethicalPap for creating some high quality educational technical content. I’ve never seen their channel before so it was cool to come across this.
Next week, HackerOne will be kicking off a Live Hacking Event so I’m sure there will be a ton of great photos coming online soon. Until then, enjoy this week’s drop!
In This Issue

NahamCon 2025 Recap and Highlights
🔗 Tweet by Ben Sadeghipour
Celebrating the conclusion of NahamCon 2025, sharing community highlights and expressions of gratitude.
Read the full tweet →
That's a wrap for #NahamCon2025! 🫶🏼🫶🏼🫶🏼🫶🏼🫶🏼
— Ben Sadeghipour (@NahamSec)
10:06 PM • May 23, 2025
The Bug Bounty Community in Cybersecurity with Harley Kimball - DEFCON - Coffee & Pizza Podcast #025
🎥 Video by Coffee&&Pizza
In this episode, Harley Kimball discusses his cybersecurity journey, from ethical hacking to community management at HackerOne, emphasizing collaboration and networking for aspiring professionals. The conversation also covers the role of AI in security and its implications for pentesting.
Watch video →
Highlights from Nepal's First Open Bug Bounty Event
🔗 Tweet by Ananda Dhakal
Summarizing Nepal's inaugural open bug bounty event, noting key networking opportunities and live interviews with participants.
Read the full tweet →
We just wrapped up our first open-for-all bug bounty event. Lots of hacking, collabing, networking.
We also did live interviews of the AWC members and some of the best bug hunters of Nepal.
Huge thanks to @Hacker0x01 and @CedarGateTech for the sponsorship.
#togetherwehitharder
— Ananda Dhakal (@dhakal_ananda)
3:05 PM • May 17, 2025
Have something you want to Spotlight? Tell me.

RyotaK’s Recognition at Meta's Bug Bounty Conference
🔗 Tweet by RyotaK
Expressing gratitude for receiving the Most Impact award at Meta's Bug Bounty Researcher Conference in Tokyo.
Read the full tweet →
Got the Most Impact award at the Meta's Bug Bounty Researcher Conference in Tokyo!
Thank you so much @metabugbounty team and everyone who attended the event!
#MBBRC2025— RyotaK (@ryotkak)
2:08 PM • May 18, 2025
New HackenProof Bug Bounty Offering Up to $250K
🔗 Tweet by Flow.com
A new bug bounty program on HackenProof offers rewards up to $250,000 for identifying critical vulnerabilities, promoting extensive participation in the security community.
Read the full tweet →

Did I miss an important update? Tell me.

New Caido Plugin Facilitates Collaboration with Drop
🔗 Tweet by Caido
Introducing 'Drop', a collaboration plugin for Caido that enables users to share objects seamlessly with collaborators.
Read the full tweet →
🚀New plugin in the Caido Store!
Introducing "Drop" by @Rhynorater
Get connected to your collaborator’s instance and share objects back and forth such as Replay tabs, M&R rules, scopes and filters.
Check out more details: github.com/caido-communit…
— Caido (@CaidoIO)
10:44 AM • May 23, 2025
Exciting New Enhancements in Burp Suite
🔗 Thread by James Kettle
Detailing recent enhancements in Burp Suite, the update highlights performance improvements and new features aimed at benefiting security testers.
Read the full thread →
I'm super proud of the @Burp_Suite enhancements launched by the team over the last year. Beyond the AI features, my personal favorites are:
- Massive performance improvements
- Enhanced single-packet attack
- Custom Actions
- Numerous QoL wins like "hide boring headers"— James Kettle (@albinowax)
10:41 AM • May 23, 2025
Try the Enhanced Uff: A New Fork of Ffuf
🔗 Thread by sw33tLie
A new fork of the ffuf tool, named Uff, is introduced, offering improvements in performance for bug bounty hunters.
Read the full thread →
I've recently put more work into my ffuf fork, uff, and I think every ffuf user should at least give it a try - and maybe even switch to it.
Here's why, in a #bugbounty 🧵
— sw33tLie (@sw33tLie)
10:22 PM • May 20, 2025
New Burp Suite Extension Integrates SQLmap for Easy Use
🔗 Tweet by Yousef
Introducing a new Burp Suite extension that allows users to run SQLmap directly from the GUI, simplifying the SQL injection testing process.
Read the full tweet →
Built a Burp Suite extension to run SQLmap directly from the GUI.
No more saving HTTP requests + jumping to terminal.
Just:
– Mark param with *
– Right-click → Send to SQLmap
– Pick options → RunLinux-only for now. Windows support coming soon.
Full write-up:— Yousef (@iYousefAlotaibi)
6:35 PM • May 19, 2025
New Knoxnl Update Enhances Stealthy URL Processing
🔗 Tweet by / XNL -н4cĸ3r
The latest Knoxnl update improves stealth by shuffling URLs in file inputs to minimize detection while interacting with target servers.
Read the full tweet →
v5.2 of knoxnl is available:
✅If input is a file of URLs, these will be shuffled before being processed to avoid hitting the target server sequentially so KNOXSS can fly under the radar better.
@KN0X55#BugBounty
🤘— / XNL -н4cĸ3r (and @xnl-h4ck3r in the new Sky) (@xnl_h4ck3r)
8:42 AM • May 23, 2025
Have a favorite tool? Tell me.

Grafana CVE-2025–4123: Full Read SSRF & Account Takeover
📝 Writeup by Alvaro Balada

Analyzing CVE-2025-4123 in Grafana, this post details a Full Read SSRF and account takeover vulnerability, outlining exploitation methods including client-side JavaScript path traversal. The article emphasizes the importance of vigilance in secure applications.
Read more →
Full-Blown SSRF to Gain Access to Millions of Users’ Records and Multiple Internal Panels
📝 Writeup by @skycer_00
A researcher exploited a critical SSRF vulnerability to bypass domain validation, leverage redirect chains, and access unsecured internal services, ultimately exposing data from millions of users.
Read more →
HTML to PDF Renderer: A tale of local file access and shellcode execution — Neodyme
📝 Writeup by Alain (neodyme.io)
Illustrating a security engagement with an HTML to PDF renderer, the post covers local file access vulnerabilities and remote code execution exploits, underscoring the necessity for secure configurations.
Read more →
Meta BBP — Stored XSS at Meta Careers
📝 Writeup by Muntadhar M. Ahmed
The author shares a privilege escalation vulnerability in a Meta application, detailing their method of manipulating user roles during the workspace invitation process for a successful bounty.
Read more →
Did I miss an important update? Tell me.

Top War Stories from a Try Hard Bug Bounty Hunter, Rhynorater | Bug Bounty Village, DEF CON 32
🎥 Video by Bug Bounty DEFCON
Justin Gardner shares critical vulnerabilities discovered in various applications, providing insights into strategies and tools used in ethical hacking.
Watch video →
Bug Bounty: Exploiting Prototype Pollution for Easy $$$ (Manual + Automation Guide)
🎥 Video by ethicalPap_
This video provides a comprehensive guide on exploiting prototype pollution vulnerabilities, detailing manual and automated testing methods, including XSS techniques.
Watch video →
This Browser Hack Scored Me a $20,000 Bug Bounty
🎥 Video by NahamSec
Covering an XXE vulnerability in Chrome, this video illustrates practical exploitation and highlights the vulnerability's relevance in modern systems.
Watch video →
This HACKER Made $84,000 HACKING Reddit!
🎥 Video by DeadOverflow
Lar Voltage discusses his methodology for exploiting vulnerabilities on Reddit, culminating in earnings of $84,000 from his findings.
Watch video →
Hacking AI Series: Vulnus ex Machina - Part 2 (Ep.123)
🎥 Video by Critical Thinking - Bug Bounty Podcast
Joseph delves into exploitation methods for AI applications in this episode, discussing vulnerabilities and techniques relevant to bug bounty programs.
Watch video →
Did I miss something? Tell me.

Understanding Regex Dot and Its Security Implications
Tweet by André Baptista
Explaining the regex dot operator, this tweet addresses its potential to match unintended strings, raising awareness about regex-related vulnerabilities.
Read the full tweet →
In regex, . means “any character.”
So /www.ethiack.com/ actually matches:
✅ ethiack.com
✅ wwwwethiack.com (entirely attacker-controlled)
✅ wwwethiackkcom.attacker.com (if no $ terminator is used)Searching for unescaped dots in regex patterns in source code
— André Baptista (@0xacb)
8:34 AM • May 21, 2025
Mastering SQL Injection Recon: Step-by-Step Guide for Bug Bounty Hunters
📝 Writeup by coffinxp
Providing effective reconnaissance techniques for identifying SQL injection vulnerabilities, this guide offers actionable steps for bug bounty hunters.
Read more →
NoSQL Injection - Payloads All The Things
📝 Writeup by Unknown author
This article outlines NoSQL injection methodologies and attack vectors while providing practical scripts for vulnerability testing and bypass strategies.
Read more →
CORS Misconfigurations: Advanced Exploitation Guide
📝 Writeup by blackbird-eu
This comprehensive guide discusses CORS misconfiguration vulnerabilities, identification methods, and advanced exploitation techniques.
Read more →
Smart XSS Fuzzing With Polyglots [📝 Writeup]
by Unknown author
Discussing XSS polyglots as effective testing payloads, this article illustrates their advantages in identifying XSS vulnerabilities across different contexts.
Read more →
Did I miss something? Tell me.

Journey to Winning the Hacker0x01 Ambassadors World Cup
🔗 Thread by remot3
Sharing a personal journey of winning the Hacker0x01 Ambassadors World Cup starting with zero points on HackerOne.
Read the full thread →
We won the @Hacker0x01 Ambassadors World Cup for second time. 🏆
🧵 This is thread about my journey, and how it all started 8 months ago when I had 0 points on HackerOne ⬇️
— remot3 (@_remot3)
3:26 PM • May 21, 2025
Enhancing Hacking with Cursor AI and GitHub Tools
🔗 Tweet by TESS
Highlighting how to customize an open-source tool using Cursor AI for effective code analysis in hacking.
Read the full tweet →
Are you using @cursor_ai right? For H#cking?
It's easy to customize open-source tools now IMO, Just visit download the tool as "Download ZIP", upload it to the cursor, be precise with prompt,s for example:
Me:
Hey, cursor analyze the code very carefully— TESS (@ArmanSameer95)
5:22 PM • May 22, 2025
Leveraging URL-Based XSS Payload Smuggling Techniques
🔗 Thread by Gareth Heyes
Introducing a creative method for smuggling XSS payloads through URLs to evade various filters.
Read the full thread →
URL-based XSS payload smuggling yup, it’s a thing. You can sneak payloads past filters in unexpected ways using the window name and creative URL abuse. Shoutout to @WilliamSerizao for the idea.
Link to vectors👇— Gareth Heyes \u2028 (@garethheyes)
1:59 PM • May 22, 2025
Comprehensive Bug Bounty Recon Workflow for Token Finds
🔗 Tweet by X
Outlining a recon workflow targeting common vulnerabilities in enterprise applications, emphasizing token discovery and OAuth misconfigurations.
Read the full tweet →
How I Recon 10 Top Targets for Tokens, Misconfigs & OAuth Goldmines
This workflow built my entire bug bounty strategy.
10 enterprise targets.
1 elite recon method.
Unlimited ways to print P1s.Save this. You’ll use it weekly.
⸻
Phase 1: Own the Surface — Find What They
— X (@TheMsterDoctor1)
12:39 AM • May 23, 2025
Five Key Strategies for Effective Vulnerability Modeling
🔗 Tweet by bugcrowd
Providing five strategies for ethical hackers to model web applications effectively, focusing on understanding application structures and data flows.
Read the full tweet →
A lot of hackers fail because they only look for bugs, not systems.
If you want to find vulnerabilities others miss, you need to model how the application works first.
Here are 5 ways to do it right 👇
1️⃣ Identify valuable target data
Start by asking: what data does the
— bugcrowd (@Bugcrowd)
5:01 PM • May 22, 2025
Fast Subdomain Bruteforcing Using dnsx Tool
🔗 TWeet by ProjectDiscovery
Sharing an efficient command for subdomain bruteforcing using the dnsx tool, aiding rapid discovery for security researchers.
Read the full tweet →
Quick subdomain bruteforcing with dnsx 🚀
Run: dnsx -d <domain> -w <subdomain-wordlist>
Fast, simple, and effective for rapid subdomain discovery!
#bugbounty#pentesting#hacking#cybersecurity#recon
— ProjectDiscovery (@pdiscoveryio)
5:11 PM • May 17, 2025
First Bug Bounty Payout: IDOR Explained
🔗 Tweet by Oliver Ellis
Celebrating a first bug bounty payout for an IDOR vulnerability discovered at Audible, with tips on recognizing similar vulnerabilities.
Read the full tweet →
Thrilled to share that I’ve been awarded my first bug bounty payout of $400 on @Hacker0x01 by Audible for discovering an IDOR vulnerability! Many thanks to the Audible team for their great communication!
TIP: if you can access your own accounts data using another accounts
— Oliver Ellis (@OliverEllis03)
10:14 AM • May 18, 2025
Did I miss something? Tell me.
Did you like this week's drop?Please share feedback. |
Because Disclosure Matters: This newsletter was produced with the assistance of AI. While I strive for accuracy and quality, not all content has been independently vetted or fact-checked. Please allow for a reasonable margin of error. The views expressed are my own and do not reflect those of my employer.