Yoeri Vegt
yoerivegt.com
Yoeri Vegt
@yoerivegt.com
Student | Attempting to Bug Bounty Hunt | Dutch Hackerone Ambassador | Proud Dutchy 🇳🇱
Dream big ⭐
The Netherlands advanced to the next @hacker0x01.bsky.social #AmbassadorWorldCup round, being in the top 8 countries! I'm so insanely proud of this team!! Next round, we'll be hacking against Nepal! Good luck, and have fun everyone! 🇳🇱
December 20, 2024 at 10:59 AM
🦚 Proud to share my 2024 #BugBounty journey on @Hacker0x01! 48 vulnerabilities reported, including 11 critical findings. Specializing in XSS - even ventured into AI security! Here's to making the internet safer, one bug at a time! 🛡️ #InfoSec #CyberSecurity #HackerOne hackerone.com/stories-of-2...
Unsupported Browser | HackerOne
hackerone.com
December 12, 2024 at 8:35 AM
We are all directors of our own lives, so why do we so often film others?📸
December 4, 2024 at 6:08 PM
uh oh
Ruh roh

github.com/peass-ng/PEA...

"curl -s "http[s]://log.linpeas.sh/?uuid=$(cat /proc/sys/kernel/random/uuid)&id=$(cat /var/lib/dbus/machine-id)&root=$IAMROOT&hostname=$(hostname)&user=$(whoami)&uname=$(uname -a | base64 -w 0)&cwd=$(pwd | base64 -w 0)" > /dev/null 2>/dev/null"
https://linpeas.sh ownership · Issue #450 · peass-ng/PEASS-ng
The linpeas.sh version hosted at https://linpeas.sh is sending info to a remote server: curl -s "https://log.linpeas.sh/?uuid=$(cat /proc/sys/kernel/random/uuid)&id=$(cat /var/lib/dbus/machine-id)&...
github.com
November 27, 2024 at 7:45 PM
Just published a short blog about a very interesting technique for uncovering more attack surface, by reverse-searching NS records. It's pretty cool!

yoerivegt.com/unveiling-mo...
(Pleas share your feedback on my blog, if you have any :)
Unveiling more attack surface using matching NS records
Discover hidden domains for bug bounty targets by analyzing NS records and using an API to lookup matching domains.
yoerivegt.com
November 24, 2024 at 9:20 PM
Love this!!
The "bug bounty hunters and content creators" starter pack is now up to 60 users! Follow this to get instantly connected to the bug bounty community & let me know if I've missed you off!

go.bsky.app/GD7hKPX
Bug bounty hunters & content creators
Join the conversation
go.bsky.app
November 23, 2024 at 7:19 PM
Since I'm new to Bluesky! Let's post something from year ago!

In 2023, we hacked a NahamCON CTF challenge, and turned a challenge against the players! It was quite simple, but fun!

Read it here:
yoerivegt.com/how-we-turne...
How we turned a challenge against the players and creators - Nahamcon CTF 2023
About the Challenge During the process of deobfuscating the powershell payload from the IR challenge, we noticed that the domain to which all the encrypted files were being sent was not yet claimed. ...
yoerivegt.com
November 23, 2024 at 7:18 PM