Include Security (@includesecurity) 's Twitter Profile
Include Security

@includesecurity

Simply stated: Give us any kind of app and we'll hack it better than the rest.

Our clients include awesome tech companies in Silicon Valley, NYC, and beyond.

ID: 584107229

linkhttp://www.includesecurity.com calendar_today18-05-2012 19:53:49

209 Tweet

1,1K Takipçi

1 Takip Edilen

Alexander Mackie (@zandermackie) 's Twitter Profile Photo

One of the better posts on prompt injection I’ve seen. And this is because it gives actionable advice to developers! Attack insights without defense is insufficient.

Include Security (@includesecurity) 's Twitter Profile Photo

We're still seeing a lot of Ruby code out there in the tech world. If we see it we hack it! Latest blog post on advanced Ruby deserialization gadget chains for exploitation of application is up blog.includesecurity.com/2024/03/discov…

Include Security (@includesecurity) 's Twitter Profile Photo

We're happy to support great open/free security training to get more folks into our industry. If you want to learn low-level RE/hacks/OS check out OST2! ost2.fyi/Home.html

#BSidesNYC (@bsidesnyc) 's Twitter Profile Photo

Check out this #BSidesNYC 0x03 interview by Preeti Ravindra with Erik Cabetas where he discusses how BSidesNYC is different from the other New York conferences, how he started Include Security, and what it's like to consult for #hacker movies. youtube.com/watch?v=ktk8px…

Include Security (@includesecurity) 's Twitter Profile Photo

Fresh blog post for ya; We introduce coverage-guided fuzzing as a concept to hunt down bugs faster via modification of the Fuzzilli fuzzer from Google Project Zero. blog.includesecurity.com/2024/04/covera…

Include Security (@includesecurity) 's Twitter Profile Photo

Who hacks the hackers? We do! Our new research on vulns in multiple common C2 frameworks used by netpen and red teams. If you use any of these take a look and patch up. blog.includesecurity.com

Include Security (@includesecurity) 's Twitter Profile Photo

New blog! Join us as we explore seemingly safe but deceptively tricky ground in Elixir, Python, and the Golang standard library. Well-documented behavior is not always what it appears! blog.includesecurity.com/2024/11/spelun…

Include Security (@includesecurity) 's Twitter Profile Photo

We're happy to sponsor great learning resources like OpenSecurityTraining2, the world is awash with a lot of bad training/certs, here's some courses that are solid and open/free!😀

Include Security (@includesecurity) 's Twitter Profile Photo

Hey folks, for those who like the HTB community we've done a collab contribution of a challenge box (free, no subscription needed), give it a spin if you like to hack the hackers! 🪓 👩‍💻 hackthebox.com/machines/backf… Hint: It's a tough box, check our github and our blog for info.

Include Security (@includesecurity) 's Twitter Profile Photo

It's winter, so hacking space heater IoT devices to completely control their firmware seems like the thing to do! In our latest blog post, you'll see some of the things we do for our IoT/HW clients!! blog.includesecurity.com/2025/02/replac…

Include Security (@includesecurity) 's Twitter Profile Photo

New research🤩 on old tech👴! Our team's latest blog post demonstrates many ways memory vulnerabilities can occur in your legacy Delphi code despite being described as a "memory safe" language by the NSA. blog.includesecurity.com/2025/03/memory…

Include Security (@includesecurity) 's Twitter Profile Photo

Today our team at IncludeSec is releasing a site to help with key collision concerns. We've known for a while that private keys should not be shared, use this site to ensure they are not! ismyprivatekeypublic.com

Include Security (@includesecurity) 's Twitter Profile Photo

Do you use or exploit WebSockets? Check out our new blog post to see how modern browsers may (or may not) be protecting you from Cross-Site WebSocket Hijacking! blog.includesecurity.com/2025/04/cross-…