P1ain (@0xp1ain) 's Twitter Profile
P1ain

@0xp1ain

NEVER EVER GIVE UP πŸ’ͺ (WEB2/WEB3 Security Researcher)

ID: 1414920885023039492

calendar_today13-07-2021 12:13:29

87 Tweet

58 Followers

143 Following

SunSec (@1nf0s3cpt) 's Twitter Profile Photo

πŸ”₯ Introducing the DeFiHackLabs Incident Explorer! I've combined DeFiHackLabs with Root Cause Reports (RCA) into a Incident Explorer. πŸ” Now everyone can easily search, browse, and learn from DeFi security incidents. πŸ‘‡check #DeFi #Web3 #Hacks #Infosec #DeFiHackLabs

πŸ”₯ Introducing the DeFiHackLabs Incident Explorer!

I've combined DeFiHackLabs with Root Cause Reports (RCA) into a Incident Explorer. 

πŸ” Now everyone can easily search, browse, and learn from DeFi security incidents. 

πŸ‘‡check
#DeFi #Web3 #Hacks #Infosec #DeFiHackLabs
Friendly Maltese Citizens (@malta_ctf) 's Twitter Profile Photo

We're hosting MaltaCTF🚩 this year! An on-site event (with online qualifiers) in Valletta, Malta happening on the 12th of September 2025

#KBW2025 (@kbwofficial) 's Twitter Profile Photo

At #KBW2025, dive into the convergence of #Web3 & #AI, including the rise of autonomous AI agents. These agents are transforming DeFi, DAOs, and NFT marketplaces by automating complex tasks, optimizing strategies, and enabling new forms of intelligent asset management. Join

At #KBW2025, dive into the convergence of #Web3 & #AI, including the rise of autonomous AI agents. 

These agents are transforming DeFi, DAOs, and NFT marketplaces by automating complex tasks, optimizing strategies, and enabling new forms of intelligent asset management. 

Join
AIνƒ€μž„μŠ€(AITIMES) (@aitimes_news) 's Twitter Profile Photo

MCP의 'λ³΄μ•ˆ 취약점' νŒŒμ•…Β·λ°©μ§€ν•˜λŠ” ν”„λ ˆμž„μ›Œν¬ λ“±μž₯ #MCP #ν”„λ ˆμž„μ›Œν¬ #λ‰΄μŠ€ #news #AI #FYP #인곡지λŠ₯ #AIνƒ€μž„μŠ€ #aitimes aitimes.com/news/articleVi…

POC_Crew πŸ‘¨β€πŸ‘©β€πŸ‘¦β€πŸ‘¦ (@poc_crew) 's Twitter Profile Photo

[#POC2025 NOTICE] 20 Years. Reborn. The brand evolved - The mission remains. Welcome to a new era of POC. ⏰ Date: November 13–14, 2025 πŸ“ Venue: Four Seasons Hotel, Seoul, South Korea πŸ‡°πŸ‡· 🎀 CFP: June 5 – September 30 πŸ§‘β€πŸ’» Training: June 5 – September 30 🎟️ Registration:

[#POC2025 NOTICE]

20 Years. Reborn.
The brand evolved - The mission remains.
Welcome to a new era of POC.

⏰ Date: November 13–14, 2025
πŸ“ Venue: Four Seasons Hotel, Seoul, South Korea πŸ‡°πŸ‡·

🎀 CFP: June 5 – September 30
πŸ§‘β€πŸ’» Training: June 5 – September 30
🎟️ Registration:
chrisdior.eth (@chrisdior777) 's Twitter Profile Photo

This is a MUST repo if you're a Web3 dev. Founders - send this to your devs and thank me later. Audit checklists & best practices for almost everything. Important! These are not a substitute for an audit - use it before one. github.com/TradMod/awesom…

This is a MUST repo if you're a Web3 dev.

Founders - send this to your devs and thank me later.

Audit checklists & best practices for almost everything. 

Important! These are not a substitute for an audit - use it before one.

github.com/TradMod/awesom…
P1ain (@0xp1ain) 's Twitter Profile Photo

This is a new web hacking research team that I am currently lead. Our team is publicly recruiting new researchers to join our activities! If you are interested in participating, please click the link below for more detailed information! jun0911-devprivate.notion.site/Rewrite-Open-R…

Web Security Academy (@websecacademy) 's Twitter Profile Photo

Upstream HTTP/1.1 is inherently insecure and consistently exposes millions of websites to hostile takeover. Six years after we exposed the threat of HTTP desync attacks, there's still no end in sight. On August 6, at Black Hat USA, James Kettle from PortSwigger Research will

RewriteLab (@rewritelab) 's Twitter Profile Photo

We have successfully published our first research! This research conducts an in-depth study of potential security vulnerabilities and issues in the Next.js framework. We highlight security vulnerabilities in Next.js based on various CVEs and case studies.

We have successfully published our first research!

This research conducts an in-depth study of potential security vulnerabilities and issues in the Next.js framework. We highlight security vulnerabilities in Next.js based on various CVEs and case studies.
RewriteLab (@rewritelab) 's Twitter Profile Photo

We have successfully published our second research! This research focuses on various XSLeaks techniques through real case studies. It explains why XSLeaks are dangerous in the real world and how XSLeaks techniques can be utilized in challenges such as CTFs. This is a series

We have successfully published our second research!

This research focuses on various XSLeaks techniques through real case studies. It explains why XSLeaks are dangerous in the real world and how XSLeaks techniques can be utilized in challenges such as CTFs.

This is a series
Game0v3r (@kabilan1290) 's Twitter Profile Photo

Just dropped a blog after messing around with AI the past few days. Tried out Google’s new summarizer API and a well-known Chrome extension to pull off some indirect prompt overdose attacks. blog.game0v3r.in/blog/ai-silent…

P1ain (@0xp1ain) 's Twitter Profile Photo

(Not over yet but) defcon thoughts summarized in 5 lines: 1. I already knew this, but if your field is web, there’s really, really nothing to contribute 2. So because I couldn’t contribute, I’m feeling pretty awful right now 3. I need to start studying reversing sooner than I