Shlomie Liberow (@shlibness) 's Twitter Profile
Shlomie Liberow

@shlibness

Head of Hacker R&D @Hacker0x01. Lover of 4AM shell battles. All things hacking!

ID: 46462683

calendar_today11-06-2009 19:09:20

1,1K Tweet

2,2K Followers

1,1K Following

Shlomie Liberow (@shlibness) 's Twitter Profile Photo

Working on exploiting a SSRF where the service is using axios. Looking at GH issues shows a PR that would have been perfect, allowing for local file read github.com/axios/axios/pu… Reviewing the profile of this "helpful" PR [that was never merged] shows some suspicious biases 😂

Working on exploiting a SSRF where the service is using axios.  Looking at GH issues shows a PR that would have been perfect, allowing for local file read github.com/axios/axios/pu…

Reviewing the profile of this "helpful" PR [that was never merged] shows some suspicious biases 😂
Lupin (@0xlupin) 's Twitter Profile Photo

We just released a new article on how we made 50,000$ in #BugBounty by doing a really cool Software Supply Chain Attack🔥 🔗Link: landh.tech/blog/20250211-…

We just released a new article on how we made 50,000$ in #BugBounty by doing a really cool Software Supply Chain Attack🔥

🔗Link: landh.tech/blog/20250211-…
Lupin (@0xlupin) 's Twitter Profile Photo

For the past few months I've been talking a lot of Software Supply Chain security and Depi ... Depi is SaaS platform aimed to find ways to backdoor the Software Supply Chain Security of the target we scan 🔥 Here it is ! The full story on how we built Depi and its philosophy 😁

For the past few months I've been talking a lot of Software Supply Chain security and Depi ...

Depi is SaaS platform aimed to find ways to backdoor the Software Supply Chain Security of the target we scan 🔥

Here it is ! The full story on how we built Depi and its philosophy 😁
Shlomie Liberow (@shlibness) 's Twitter Profile Photo

Looks like heathrowdropoffcharge.co.uk has been operating since February, gouging an extra £4 from circa 83,000 travelers by charging £10 for Heathrow's actual £6 drop-off fee. Just casual predatory behaviour that I suppose isn't illegal...

Shlomie Liberow (@shlibness) 's Twitter Profile Photo

Such a joy talking comprehensive asset discovery! Meeting the amass creator felt full circle - that tool's power to reveal overlooked and obscure subdomains is what kicked off my asset reconnaissance obsession years back and I've never looked back.

Shlomie Liberow (@shlibness) 's Twitter Profile Photo

Just guy next to me at the gym explaining to his friend that before Hitler went for it, Jews boycotted Germany "just like we boycott Israel" and something something Rothschild controls all finances. Good work BBC News (UK) et al for the constant stream of blood libels setting the tone

Shlomie Liberow (@shlibness) 's Twitter Profile Photo

Excited to be part of #HackAIcon. Great lineup - lots to discuss with AI reshaping everything we thought we knew about security

Shlomie Liberow (@shlibness) 's Twitter Profile Photo

My 7 year journey at HackerOne recently came to a close🏁 It's been an incredible run working with the best people and being part of something that transformed the security industry. Working there gave me a unique vantage point: the intersection of the world's best security

My 7 year journey at HackerOne recently came to a close🏁

It's been an incredible run working with the best people and being part of something that transformed the security industry. 

Working there gave me a unique vantage point: the intersection of the world's best security
Shlomie Liberow (@shlibness) 's Twitter Profile Photo

I’ve been training LLMs to recognise vulnerability chains and revisiting my favorite bug bounty reports to understand what patterns they can be taught to spot. Let’s look at this example of a ticketing platform's booking flow that leaked millions of PII records. This wasn’t  a

I’ve been training LLMs to recognise vulnerability chains and revisiting my favorite bug bounty reports to understand what patterns they can be taught to spot.

Let’s look at this example of a ticketing platform's booking flow that leaked millions of PII records.

This wasn’t  a
Shlomie Liberow (@shlibness) 's Twitter Profile Photo

Zero surprises here. Attack vectors don't need to be sophisticated as much as just needing to be persistent and trying all variants possible.