Jeff (@jeffsepticeye2) 's Twitter Profile
Jeff

@jeffsepticeye2

ID: 3537337755

calendar_today03-09-2015 20:13:20

349 Tweet

117 Followers

87 Following

Yarden Shafir (@yarden_shafir) 's Twitter Profile Photo

Can we talk about how Windows Defender is using undocumented features that other EDRs aren't supposed to know about or use (officially)?

Can we talk about how Windows Defender is using undocumented features that other EDRs aren't supposed to know about or use (officially)?
0x52 (@iam0x52) 's Twitter Profile Photo

altyni 🪄 Top 5 areas off the top of my head and in no particular order: 1) Math 2) Oracles 3) Precision 4) Allowances 5) Access control

0x52 (@iam0x52) 's Twitter Profile Photo

Matt @kurzanovich Stumbled into Code4rena -> tried auditing directly in web browser GitHub -> read C4 docs -> find cmichel guide to being an auditor -> download VS Code -> open files -> have no idea what anything means -> start pasting code into remix to see what it does

jtriley2p (@jtriley2p) 's Twitter Profile Photo

the year is 2030. your type -1 evm L8 rollup blackholes ur ether bc the create6 opcode isn't supported and solc 0.8.98 doesn't use tstore2 bc only eof3 uses it and not eof4. you try to front run the miami hardfork with eip-523563C with huffc-zig but ipsilon kneecaps u out back

Jeff (@jeffsepticeye2) 's Twitter Profile Photo

I just pwned Distract and Destroy on Hack The Box! hackthebox.com/achievement/ch… #HackTheBox #htb #CyberSecurity #EthicalHacking #InfoSec #PenTesting

Jeff (@jeffsepticeye2) 's Twitter Profile Photo

I just pwned Survival of the Fittest on Hack The Box! hackthebox.com/achievement/ch… #HackTheBox #htb #CyberSecurity #EthicalHacking #InfoSec #PenTesting

Jeff (@jeffsepticeye2) 's Twitter Profile Photo

I just pwned Honor Among Thieves on Hack The Box! very interesting challenge, where I had to write a custom block explorer in python to hunt a specific transaction by emitted events values on a private blockchain hackthebox.com/achievement/ch… #HackTheBox #htb #CyberSecurity

h0mbre (@h0mbre_) 's Twitter Profile Photo

it's absolutely insane if you sit back and think that if a programmer erroneously frees an object, an attacker can potentially build an entire weird machine inside the program and take over the computer. like wtf?