ARPSyndicate - Cyber & Open Source Intelligence (@arpsyndicate) 's Twitter Profile
ARPSyndicate - Cyber & Open Source Intelligence

@arpsyndicate

A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence

ID: 1726571887499821056

linkhttps://www.arpsyndicate.io/pricing.html calendar_today20-11-2023 12:03:39

1,1K Tweet

373 Takipçi

247 Takip Edilen

XBOW (@xbow) 's Twitter Profile Photo

Sometimes the most illogical approach wins. XBOW discovered XSS in Salesforce Aura by testing aura.format=JSON - which counterintuitively returns text/html content type instead of JSON. The kind of discovery that comes from systematic testing without assumptions. Full hunt

Sometimes the most illogical approach wins.

XBOW discovered XSS in Salesforce Aura by testing aura.format=JSON - which counterintuitively returns text/html content type instead of JSON.

The kind of discovery that comes from systematic testing without assumptions.

Full hunt
djurado (@djurado9) 's Twitter Profile Photo

Check this XSS affecting every /aura instance on the internet 🎉 again, fully discovered by XBOW We’ve shared the full trace in case anyone is interested.

Silent Push (@silentpush) 's Twitter Profile Photo

Firefox has a cool hidden feature for phishing investigations 😄 CTRL+SHIFT+M opens up responsive design mode, a menu for simulating mobile devices via preset user agents and screen resolutions. Great for bypassing user agent blocks and seeing the "real" #phishing pages.

Firefox has a cool hidden feature for phishing investigations 😄

CTRL+SHIFT+M opens up responsive design mode, a menu for simulating mobile devices via preset user agents and screen resolutions. 

Great for bypassing user agent blocks and seeing the "real" #phishing pages.
Steven Lim (@0x534c) 's Twitter Profile Photo

🕷️The Hunt for Spidy Phishing Domains🎣 The "KQL" to sniff out the web across your MDE & MDO telemetry 🤣 blog.checkpoint.com/research/expos… KQL: detections.ai/rules/1fb925e9…

🕷️The Hunt for Spidy Phishing Domains🎣

The "KQL" to sniff out the web across your MDE & MDO telemetry 🤣

blog.checkpoint.com/research/expos…

KQL:
detections.ai/rules/1fb925e9…
5pider (@c5pider) 's Twitter Profile Photo

Introducing Havoc Professional: A Lethal Presence We’re excited to share a first look at Havoc Professional, a next-generation, highly modular Command and Control framework, and Kaine-kit our fully Position Independent Code agent engineered for stealth! infinitycurve.org/blog/introduct…

0xh3l1x (@cgomezz_23) 's Twitter Profile Photo

See you soon on #OOTB2025BKK to talk a bit about Phising and new things :) Thank you very much for the confidence as always to the Out Of The Box Security Conference team and specially to l33tdawg <3 ootb.net/talks/cloud-ed…

JSec (@jsec_) 's Twitter Profile Photo

A student research team I lead discovered and reported a path traversal vulnerability in WinRAR. This vulnerability is not limited to WinRAR; it also affects various other software applications.

A student research team I lead discovered and reported a path traversal vulnerability in WinRAR.
This vulnerability is not limited to WinRAR; it also affects various other software applications.
XBOW (@xbow) 's Twitter Profile Photo

When standard SQL injection vectors fail, dig deeper. ⚡️New XBOW discovery: Z-Push vulnerability hidden in Basic Authentication username field. Response timing differences revealed PostgreSQL time-based injection where obvious targets were clean. Full analysis:

Adel Ka (@0x4d31) 's Twitter Profile Photo

excited to be back in vegas for my second DEF CON, and second talk on the creator stage! i’ll be diving into a mix of my favorite things: network fingerprinting, honeypots, and ai agents! tool drops in a few days--stay tuned 👾defcon.org/html/defcon-33… wallofsheep

excited to be back in vegas for my second <a href="/defcon/">DEF CON</a>, and second talk on the creator stage! i’ll be diving into a mix of my favorite things: network fingerprinting, honeypots, and ai agents! tool drops in a few days--stay tuned 👾defcon.org/html/defcon-33… <a href="/wallofsheep/">wallofsheep</a>
John Hultquist (@johnhultquist) 's Twitter Profile Photo

Google has just used AI and threat intel to foil a zeroday before it could launch. Working from artifacts gathered by GTIG, Big Sleep was used to identify a vuln before actors could ramp up exploitation. It doesn’t get much better than this in intel. blog.google/technology/saf…