Abdulrahman Alqabandi (@qab) 's Twitter Profile
Abdulrahman Alqabandi

@qab

Security researcher @MicrosoftEdge

ID: 15752350

linkhttp://leucosite.com/ calendar_today06-08-2008 17:09:43

2,2K Tweet

6,6K Followers

954 Following

Royal Hansen (@royalhansen) 's Twitter Profile Photo

"This blog post aims to provide a detailed blueprint for how Google has created and deployed a high-assurance web framework that almost completely eliminates exploitable web vulnerabilities." bughunters.google.com/blog/664431627…

عماش (@ammashdev) 's Twitter Profile Photo

واخيرا تم الانتهاء من تطوير لعبة ثعلوب للاطفال .. كانت رحلة مليئة بالتحدي والتعليم , والان اكتملت الرحلة وهذه هي اللعبة بين ايديكم على متاجر اجهزة الجوال . اللعبة مجانية بالكامل ولا تحتوي على اي اعلان , فهي امنة جدا للاطفال . اتمنى دعمكم بالنشر , هذا الشي يجعلني استطيع ان

XBOW (@xbow) 's Twitter Profile Photo

XBOW automatically runs expert-level attacks across all webapps, giving security teams unprecedented scale. @XBOW reported 1092 vulnerabilities on HackerOne in just a few months, including RCE, XXE, SQLi, SSRF, exposed secrets, and XSS.

XBOW automatically runs expert-level attacks across all webapps, giving security teams unprecedented scale.

@XBOW reported 1092 vulnerabilities on HackerOne in just a few months, including RCE, XXE, SQLi, SSRF, exposed secrets, and XSS.
عماش (@ammashdev) 's Twitter Profile Photo

حياكم الله في فعالية اكسبو للالعاب الالكترونية في الافنيوز .. من تاريخ 2025-8-1 لغاية 2025-8-3 شاركت بلعبة ثعلوب للاطفال . ( ستكون في الفتره الصباحيه من 10ص لغاية 12م ) يوم السبت والاحد وايضا شاركت بلعبة المفتاح المفقود . ( في الفتره المسائية من الساعه 8م ) طوال ايام الفعاليه.

s1r1us (@s1r1u5_) 's Twitter Profile Photo

Securing Gumroad with Hacktron AI Three months ago, Hacktron was still early. Hacktron AI and Harsh Jaiswal were finding 0-days targeting specific vulnerabilities on OSS software. Then we ran a full pentest-style scan on a big open-source project. The results were insane. 🧵

Rana Khalil 🇵🇸 (@rana__khalil) 's Twitter Profile Photo

🎉 New Course Alert + Giveaway! 🎉 I'm excited to announce a brand-new course on Rana Khalil's Academy - OAuth 2.0 Vulnerabilities. This course includes: 📚 A technical deep dive into OAuth 2.0 and OpenID Connect: what they are, how they work, the common pitfalls in

🎉 New Course Alert + Giveaway! 🎉

I'm excited to announce a brand-new course on Rana Khalil's Academy - OAuth 2.0 Vulnerabilities.

This course includes:

📚 A technical deep dive into OAuth 2.0 and OpenID Connect: what they are, how they work, the common pitfalls in
FFmpeg (@ffmpeg) 's Twitter Profile Photo

Arguably the most brilliant engineer in FFmpeg left because of this. He reverse engineered dozens of codecs by hand as a volunteer. Then security "researchers" and corporate employees came along repeatedly insisted "critical" security issues were fixed immediately waving their

GLADIA Research Lab (@gladialab) 's Twitter Profile Photo

LLMs are injective and invertible. In our new paper, we show that different prompts always map to different embeddings, and this property can be used to recover input tokens from individual embeddings in latent space. (1/6)

LLMs are injective and invertible.

In our new paper, we show that different prompts always map to different embeddings, and this property can be used to recover input tokens from individual embeddings in latent space.

(1/6)
Brian in Pittsburgh (@arekfurt) 's Twitter Profile Photo

The sandbox escape vulnerability described by Kaspersky here is quite interesting. Especially in that the technical root cause of the issue bit both Chromium and FireFox developers. Other Windows apps along with OS components might well have similar vulnerabilities.

The sandbox escape vulnerability described by Kaspersky here is quite interesting. Especially in that the technical root cause of the issue bit both Chromium and FireFox developers. 
Other Windows apps along with OS components might well have similar vulnerabilities.
Windows Latest (@windowslatest) 's Twitter Profile Photo

Meta is replacing WhatsApp's full-fledged native Windows 11 app with a Chromium-based web wrapper that loads WhatsApp web in a container. This is likely due to recent layoffs. Meta won't directly admit that it's killing off the original WhatsApp app for Windows 11, but a new

Meta is replacing WhatsApp's full-fledged native Windows 11 app with a Chromium-based web wrapper that loads WhatsApp web in a container.

This is likely due to recent layoffs.

Meta won't directly admit that it's killing off the original WhatsApp app for Windows 11, but a new
jro (@junr0n) 's Twitter Profile Photo

I bypassed user approvals and achieved RCE in VS Code Copilot by flipping 4 bits. Find out how: jro.sg/CVEs/copilot/ Thanks to Microsoft Security Response Center for rapidly triaging and patching this vulnerability.

The Lunduke Journal (@lundukejournal) 's Twitter Profile Photo

Multiple, serious security vulnerabilities found in the Rust clone of Sudo — which shipped with Ubuntu 25.10 (the most recent release). Not little vulnerabilities: We’re talking about the disclosure of passwords and total bypassing of authentication. In fact, we’re getting new

Multiple, serious security vulnerabilities found in the Rust clone of Sudo — which shipped with Ubuntu 25.10 (the most recent release).

Not little vulnerabilities: We’re talking about the disclosure of passwords and total bypassing of authentication.

In fact, we’re getting new