DiasS(@0xDiasS) 's Twitter Profileg
DiasS

@0xDiasS

CyberSec Boy | Founder of @P4Hacking

ID:829799534003884032

calendar_today09-02-2017 21:10:00

71 Tweets

80 Followers

421 Following

DiasS(@0xDiasS) 's Twitter Profile Photo

Bipin Jitiya 1/5: There is a quick explanation about this payload for the people who are asking: Certainly, here's a more detailed tweet comment explaining the payload:

This payload is an attempt to bypass WAF.
It disguises 'echo' and uses '$IFS' to evade detection.

account_circle
Justin Gardner(@Rhynorater) 's Twitter Profile Photo

All my current bug bounty knowledge is gone.

Here's how I get it back and make $100k in the first year:

First, I've got to learn the basics. For this, I will make sure I understand at a high level how the components I'm working with function.

I'll need to understand...

All my current bug bounty knowledge is gone. Here's how I get it back and make $100k in the first year: First, I've got to learn the basics. For this, I will make sure I understand at a high level how the components I'm working with function. I'll need to understand...
account_circle
haksec.io(@haksecio) 's Twitter Profile Photo

The Security Reference Guide by s0cm0nkeysec is an excellent, well-curated and well-organised repository of cybersecurity resources! 👇

s0cm0nkey.gitbook.io/s0cm0nkeys-sec…

account_circle
Francisco(@andr0idp4r4n0id) 's Twitter Profile Photo

My talk is now available on youtube. Thanks owasplisboa, for giving me the opportunity to share my experience.

youtube.com/watch?v=l_ODT7…

account_circle
HADESS(@Hadess_security) 's Twitter Profile Photo

Finding 0-day vulnerabilities in apps using the Red Team approach

redteamrecipe.com/Finding-0-day-…

`if ($credential == 'password') {` Probably vulnerable to type juggling and should be `if ($credential === 'password') {`

recipe

account_circle
0xor0ne(@0xor0ne) 's Twitter Profile Photo

Analysis and exploitation of a buffer overflow vulnerability (CVE-2022-47949) in Nintendo games network code by PabloMK7

github.com/PabloMK7/ENLBu…

Analysis and exploitation of a buffer overflow vulnerability (CVE-2022-47949) in Nintendo games network code by @Pablomf6 github.com/PabloMK7/ENLBu… #cybersecurity
account_circle
0xor0ne(@0xor0ne) 's Twitter Profile Photo

Excellent introduction to Linux kernel exploitation
Series by I write about security stuff

Debugging with QEMU: blog.k3170makan.com/2020/11/linux-…
Stack Overflows: blog.k3170makan.com/2020/11/linux-…
RIP control: blog.k3170makan.com/2021/01/linux-…

Excellent introduction to Linux kernel exploitation Series by @k3170Makan Debugging with QEMU: blog.k3170makan.com/2020/11/linux-… Stack Overflows: blog.k3170makan.com/2020/11/linux-… RIP control: blog.k3170makan.com/2021/01/linux-… #cybersecurity
account_circle
0xdf(@0xdf_) 's Twitter Profile Photo

If you play CTFs with a fake TLD (like *.htb), you're probably used to typing siteisup.htb into firefox and getting a google search. Just learned you can add this key in about:config, and now it will stop searching!

support.mozilla.org/en-US/question…

I'm overly excited about this.

If you play CTFs with a fake TLD (like *.htb), you're probably used to typing siteisup.htb into firefox and getting a google search. Just learned you can add this key in about:config, and now it will stop searching! support.mozilla.org/en-US/question… I'm overly excited about this.
account_circle