Zeecka 🥀 (@zeecka_) 's Twitter Profile
Zeecka 🥀

@zeecka_

Security Researcher - #OSCP #OSWE - Former @ENSIBS,
CTF Player, @AperiKube member,
Author of aperisolve.com

ID: 892364774822031361

linkhttps://zeecka.fr calendar_today01-08-2017 12:41:56

914 Tweet

2,2K Takipçi

445 Takip Edilen

noraj (@noraj_rawsec) 's Twitter Profile Photo

Thanks to Zeecka 🥀 for pointing me out Daniel Thatcher's conf. "New Techniques for Split-Second DNS Rebinding" from #BlackHatEurope2023. BH conf blackhat.com/eu-23/briefing… 1/2 intruder.io/research/we-ha… 2/2 intruder.io/research/split…

Thanks to <a href="/Zeecka_/">Zeecka 🥀</a> for pointing me out
<a href="/_danielthatcher/">Daniel Thatcher</a>'s conf. "New Techniques for Split-Second DNS Rebinding" from #BlackHatEurope2023.

BH conf blackhat.com/eu-23/briefing…
1/2  intruder.io/research/we-ha…
2/2 intruder.io/research/split…
Ambionics Security (@ambionics) 's Twitter Profile Photo

Introducing a new tool for #PHP filters attacks, #wrapwrap: an algorithm to add an arbitrary prefix and suffix to a PHP resource, improving the exploitation of file read and #SSRF vulnerabilities. ambionics.io/blog/wrapwrap-…

Sonar Research (@sonar_research) 's Twitter Profile Photo

🔥Multiple XSS vulnerabilities in popular CMS Joomla! (CVE-2024-21726) 🔥 PHP bug could be used to bypass sanitization - We just disclosed the technical details behind the recent Joomla vulnerability: sonarsource.com/blog/joomla-mu…

🔥Multiple XSS vulnerabilities in popular CMS Joomla! (CVE-2024-21726) 🔥

PHP bug could be used to bypass sanitization - We just disclosed the technical details behind the recent Joomla vulnerability:

sonarsource.com/blog/joomla-mu…
Ambionics Security (@ambionics) 's Twitter Profile Photo

Iconv, set the charset to RCE: in the first blog post of this series, Charles Fol will show a new exploitation vector to get RCE in PHP from a file read primitive, using a bug in iconv() (CVE-2024-2961) ambionics.io/blog/iconv-cve…

Ech0 (@ech0re) 's Twitter Profile Photo

I’m happy to share that after more than eight years with the team, I'm now the President of Root-Me. Root-Me is more than just an e-learning platform to me - it's where I learned cybersecurity, met incredible people, and even got my first job in the field of reverse

Kraken Exchange (@krakenfx) 's Twitter Profile Photo

A North Korean operative attempted to join Kraken. We had some questions. Is that your final answer❓ Let's hear what he had to say.

André Baptista (@0xacb) 's Twitter Profile Photo

Bug bounties ain't just web. Throwback to when Vinnie and I got RCE on Steam Client via a buffer overflow in Server Browser 🚨 Root Cause: 🎯 Wide-char conversion without boundary checks inside serverbrowser.dll leading to stack corruption Exploit: 🪲 Crafted oversized

Bug bounties ain't just web. Throwback to when <a href="/kernelpaniek/">Vinnie</a> and I got RCE on Steam Client via a buffer overflow in Server Browser 🚨

Root Cause:
🎯 Wide-char conversion without boundary checks inside serverbrowser.dll leading to stack corruption

Exploit:
🪲 Crafted oversized
Zeecka 🥀 (@zeecka_) 's Twitter Profile Photo

🍉 The AperiSolve website just got a fresh new look! - ⚙️ RAM doubled - ⚙️ CPU doubled - 😎 Swag doubled Got feedback? Drop a DM or open an issue: github.com/Zeecka/AperiSo… aperisolve.com

🍉 The AperiSolve website just got a fresh new look!
- ⚙️ RAM doubled
- ⚙️ CPU doubled
- 😎 Swag doubled
Got feedback? Drop a DM or open an issue: github.com/Zeecka/AperiSo…

aperisolve.com
Deedy (@deedydas) 's Twitter Profile Photo

Huge computer science result: A Tsinghua professor JUST discovered the fastest shortest path algorithm for graphs in 40yrs. This improves on Turing award winner Tarjan’s O(m + nlogn) with Dijkstra’s, something every Computer Science student learns in college.

Huge computer science result:

A Tsinghua professor JUST discovered the fastest shortest path algorithm for graphs in 40yrs.

This improves on Turing award winner Tarjan’s O(m + nlogn) with Dijkstra’s, something every Computer Science student learns in college.
Zeecka 🥀 (@zeecka_) 's Twitter Profile Photo

💻 After #OSCP & #OSWE, I spent a year on Offset Unlimited to tackle #OSEP & #OSED, earning #OSCE3. 🚀 Also completed: OSWP, OSTH, OSWA, OSIR, OSCC-SEC, OSCC-SJD, KLCP. 🙏 Big thanks to OffSec for the amazing trainings!

💻 After #OSCP &amp; #OSWE, I spent a year on Offset Unlimited to tackle #OSEP &amp; #OSED, earning #OSCE3.
🚀 Also completed: OSWP, OSTH, OSWA, OSIR, OSCC-SEC, OSCC-SJD, KLCP.
🙏 Big thanks to <a href="/offsectraining/">OffSec</a> for the amazing trainings!