Obieda (@bashghoul) 's Twitter Profile
Obieda

@bashghoul

Infosec | OSINT analyst | IR + Int' law researcher | Building tools, gathering intel & decoding power | Code is my weapon, knowledge my armor.

ID: 1021797294759469061

calendar_today24-07-2018 16:40:33

46 Tweet

180 Followers

621 Following

Critical Thinking - Bug Bounty Podcast (@ctbbpodcast) 's Twitter Profile Photo

A few things you need to do to make Claude a great hacking partner: 1. Install the Caido skill (github.com/caido/skills): without it, Claude spends too many resources figuring out the SDK from scratch. 2. A CLAUDE .md that tells Claude who you are. Something like "I'm a bug

Google Research (@googleresearch) 's Twitter Profile Photo

Introducing TurboQuant: Our new compression algorithm that reduces LLM key-value cache memory by at least 6x and delivers up to 8x speedup, all with zero accuracy loss, redefining AI efficiency. Read the blog to learn how it achieves these results: goo.gle/4bsq2qI

Faiyaz Ahmad (@faiyazz007) 's Twitter Profile Photo

If you ask me the most underrated vulnerabilities that beginners don’t look for, I would say Blind XSS — here’s why: They don’t really know how to find it. This is one of those vulnerabilities where you don’t see results instantly. No reflection, no popup — so most beginners

If you ask me the most underrated vulnerabilities that beginners don’t look for, I would say Blind XSS — here’s why:

They don’t really know how to find it.

This is one of those vulnerabilities where you don’t see results instantly. No reflection, no popup — so most beginners
bugcrowd (@bugcrowd) 's Twitter Profile Photo

Did you know IDORs have a variant? And it will probably be a P1. Yes, it’s the Second-Order IDORs. Sometimes called Stored IDORs Let’s have a mini masterclass🧵👇

Did you know IDORs have a variant? And it will probably be a P1.

Yes, it’s the Second-Order IDORs. Sometimes called Stored IDORs

Let’s have a mini masterclass🧵👇
vx-underground (@vxunderground) 's Twitter Profile Photo

There is this strange phenomena where people new to cybersecurity go way overboard trying to look cool and badass to give the facade of being really technical. I'll tell you something right now. You probably won't like to hear it, but it is important. Nobody cares about: - Your

The Wall Street Journal (@wsj) 's Twitter Profile Photo

A flurry of powerful attacks had internet experts baffled. A college student armed with a cat meme helped solve the mystery. on.wsj.com/3O3sxqz

Security Response (@msftsecresponse) 's Twitter Profile Photo

🚨 New $100,000 RCE award added 🚨 We’ve introduced a new $100,000 Remote Code Execution (RCE) award to the Microsoft Hyper‑V bounty program, recognizing high‑impact guest escape research and rewarding high-quality submissions. Learn more and submit: msft.it/6019Q0oxB

🚨 New $100,000 RCE award added 🚨
We’ve introduced a new $100,000 Remote Code Execution (RCE) award to the Microsoft Hyper‑V bounty program, recognizing high‑impact guest escape research and rewarding high-quality submissions.
 
Learn more and submit: msft.it/6019Q0oxB