Shail Patel (@appsecfreak) 's Twitter Profile
Shail Patel

@appsecfreak

Application Security, Cybersecurity (Un)Professional, M.S in Cybersecurity (class of 2019) @unccharlotte alum

ID: 1768877303390691328

calendar_today16-03-2024 05:50:04

760 Tweet

117 Followers

148 Following

Fat (@fattselimi) 's Twitter Profile Photo

Please stop asking Ethical hackers to hack Instagram, Snapchat and other Social medias account we don’t do that stuff

Jack Rhysider 🏴‍☠️ (@jackrhysider) 's Twitter Profile Photo

Tomorrow is a new episode. Listen to it in a carpeted room. Because your jaw is going to hit the floor, and I don't want you to get hurt. 🧑‍💻

Chris Wade (@cmwdotme) 's Twitter Profile Photo

Thrilled to share that Corellium is being acquired by Cellebrite! I'm excited to join Cellebrite as CTO and continue pushing the boundaries of mobile security and digital forensics. Big things ahead. forbes.com/sites/thomasbr…

spencer (@techspence) 's Twitter Profile Photo

Most IT teams don’t have a security problem…They have a bandwidth problem. Security gets pushed aside because everything feels urgent. To make progress we have to free up those IT folks to work on things that matter and have real impact

Phantom Security (@phantomopsec) 's Twitter Profile Photo

spencer Most breaches don’t happen because teams are clueless, they happen because they’re underwater. Security isn’t a knowledge gap, it’s a prioritization casualty, and I saw so many teams get rekt for putting security last

Octoberfest7 (@octoberfest73) 's Twitter Profile Photo

UDRL + Sleepmask is pretty powerful. You can extend Cobalt Strike's BeaconGate functionality to any API you want, no longer limiting you to the officially supported set of API's. Attached example shows proxying HttpOpenRequestA through BeaconGate

UDRL + Sleepmask is pretty powerful. You can extend Cobalt Strike's BeaconGate functionality to any API you want, no longer limiting you to the officially supported set of API's. Attached example shows proxying HttpOpenRequestA through BeaconGate
James Kettle (@albinowax) 's Twitter Profile Photo

I'm thrilled to announce "HTTP/1 Must Die! The Desync Endgame" is coming to #DEFCON33! This talk will feature multiple new classes of desync attack, mass exploitation spanning multiple CDNs, and over $200k in bug bounties. See you there!

I'm thrilled to announce "HTTP/1 Must Die! The Desync Endgame" is coming to #DEFCON33!  This talk will feature multiple new classes of desync attack, mass exploitation spanning multiple CDNs, and over $200k in bug bounties. See you there!
Aerospace Village (@secureaerospace) 's Twitter Profile Photo

Remember DEF CON 31’s dive into space & cybersecurity? Our own Jacob Oakley broke down satellite hacks, threats, and how attackers target orbiting tech. Watch the recap while gearing up for DEFCON 33!  youtu.be/bHsGfX18DQs?si… #DEFCON #CyberInSpace

Google VRP (Google Bug Hunters) (@googlevrp) 's Twitter Profile Photo

🚨 Heads up for web devs! 🚨 The HTML spec just got an important update to protect against mutation XSS (mXSS). Find out how escaping < and > in attributes is making the web a safer place. bughunters.google.com/blog/503874286…

TrustedSec (@trustedsec) 's Twitter Profile Photo

Drag a file, leak a hash—Chrome’s quiet secret exposed. In this blog, Drew @hoodoer reveals how Chrome’s drag-and-drop API lets web apps initiate complex actions; with some social engineering, it can also trigger NTLM hash leaks on Windows via SMB. Read now! trustedsec.com/blog/dragging-…

Shail Patel (@appsecfreak) 's Twitter Profile Photo

What a historic day! Today I reported 43 vulnerabilities (on all platforms combined), different classes of bugs of varying severities. Included both, VDPs and BBPs. Let's see how many of them will be duplicates... #BugBounty

Shail Patel (@appsecfreak) 's Twitter Profile Photo

0-day CVE reports falling under programs' 30/60/90 days timelines are being closed informative left and right by triage teams. Lost $$$$ 🥲