breno_css (@breno_css) 's Twitter Profile
breno_css

@breno_css

ID: 1252781537839415297

calendar_today22-04-2020 02:09:38

124 Tweet

133 Takipçi

369 Takip Edilen

blasty (@bl4sty) 's Twitter Profile Photo

auth bypass confirmed! > INFO:paramiko.transport:Authentication (password) successful! mm_keyallowed_backdoor cmd 1 allows to override the response for mm_answer_authpassword with a custom one. if you set it to { u32(9), u8(13), u32(1), u32(0) } you can login with any pass 🤓

r3tr074 (@r3tr074) 's Twitter Profile Photo

Just dropped my exploit with new cross-{cache,bucket} techniques (I love the creativity of kernel exploits, it gave me a very cool experience with SLAB allocators), the coolest part for me is the exploit, basically almost any memory corruption in Blink/Chrome can achieve RCE :D

Luan Herrera (@lbherrera_) 's Twitter Profile Photo

"Additionally we set Attack Complexity to High because the attack depends on the victim being authenticated in their default browser" - Shopify

Luan Herrera (@lbherrera_) 's Twitter Profile Photo

Decided to give my childhood game a try now that they relaunched Habbo's 2005 version back again, oops! (It was already reported and fixed).

Balthasar (@balthasarmartin) 's Twitter Profile Photo

Today at #Troopers24 we released Certiception – the ADCS honeypot we always wanted to have. Blog: srlabs.de/blog-post/cert… Source code: github.com/srlabs/Certice… Slide deck, including our guide to deception strategy: github.com/srlabs/Certice…

HackerOne (@hacker0x01) 's Twitter Profile Photo

The results are in!🥇 Congratulations to these 32 teams who will move on to the Group Round of the 2024 #AmbassadorWorldCup! 🙌 The next round kicks off at the end of August! Stay tuned for the latest info, and read more about the AWC here. bit.ly/3SwGbkV

The results are in!🥇

Congratulations to these 32 teams who will move on to the Group Round of the 2024 #AmbassadorWorldCup! 🙌 

The next round kicks off at the end of August! Stay tuned for the latest info, and read more about the AWC here. bit.ly/3SwGbkV
Luan Herrera (@lbherrera_) 's Twitter Profile Photo

Seeing that Pwn2Win isn't happening this year, here's an unreleased beginner-level XSS challenge I created for it (shouldn't be too difficult). lbherrera.me/challenge

OtterSec (@osec_io) 's Twitter Profile Photo

NEW blog post: Netfilter Universal Root 1-day Our latest blog dives deep into the state of Linux kernel security and the open-source patch-gap, exploring how we monitored new bug fixes and achieved 0day-like capabilities by exploiting a 1-day vulnerability. Read more here →

bugcrowd (@bugcrowd) 's Twitter Profile Photo

Where there’s bug bounty, there’s #Bugcrowd. 😉✨ We’re honored to have supported the Bug Bounty Village Brazil at H2HC in #Brazil, big thanks to bsysop! Seeing the hacker community come together with such passion was nothing short of amazing (as always). 🥲 Huge thanks to the organizers,

Where there’s bug bounty, there’s #Bugcrowd. 😉✨

We’re honored to have supported the <a href="/BugBountyBr/">Bug Bounty Village Brazil</a> at H2HC in #Brazil, big thanks to <a href="/bsysop/">bsysop</a>! Seeing the hacker community come together with such passion was nothing short of amazing (as always). 🥲

Huge thanks to the organizers,
Epic Leet Team (@eltctfbr) 's Twitter Profile Photo

Brazil made history last weekend, and of course, ELT was a part of it! Thanks Ganesh , boitatech , GRIS UFRJ and #hawksec_unifei for partnership! We got 17th place, the best brazilian result, at #DEFCONCTF Quals as "pwn de queijo"! Thanks Hackaflag for hosting us!

Brazil made history last weekend, and of course, ELT was a part of it!

Thanks <a href="/GaneshICMC/">Ganesh</a> , <a href="/boitatech/">boitatech</a> , <a href="/gris_ufrj/">GRIS UFRJ</a> and #hawksec_unifei for partnership! We got 17th place, the best brazilian result, at #DEFCONCTF Quals as "pwn de queijo"!

Thanks <a href="/hackaflag/">Hackaflag</a> for hosting us!
Epic Leet Team (@eltctfbr) 's Twitter Profile Photo

youtube.com/watch?v=5Yt3HG… Obrigado Mente Binária (ONG) ! Não foi dessa vez mas DEFCON que nos espere ano que vem! Até lá, como todos devem fazer sempre, estudaremos! Obrigado novamente ao Hackaflag por nos receber!

youtube.com/watch?v=5Yt3HG…

Obrigado <a href="/mentebinaria/">Mente Binária (ONG)</a> !

Não foi dessa vez mas DEFCON que nos espere ano que vem!

Até lá, como todos devem fazer sempre, estudaremos!

Obrigado novamente ao <a href="/hackaflag/">Hackaflag</a> por nos receber!
Mente Binária (ONG) (@mentebinaria) 's Twitter Profile Photo

🚀 Orgulho nacional! 🇧🇷 Parabenizamos todos os envolvidos por essa conquista histórica! Vocês levaram o nome do Brasil ao topo e mostraram que nossa comunidade de CTF está cada vez mais forte e preparada para desafios globais! 🔗 Assista o vídeo em youtube.com/watch?v=5Yt3HG…

🚀 Orgulho nacional! 🇧🇷

Parabenizamos todos os envolvidos por essa conquista histórica! Vocês levaram o nome do Brasil ao topo e mostraram que nossa comunidade de CTF está cada vez mais forte e preparada para desafios globais! 

🔗 Assista o vídeo em youtube.com/watch?v=5Yt3HG…
corvo (@pqcorvo) 's Twitter Profile Photo

A comunidade de Bug Bounty Brasileira está fazendo um evento GRATUITO e trazendo gringo para palestrar. Você de São Paulo ou q pode está nessa data em SP simplesmente VÁ nesse evento. #Bolhasec Maiores detalhes aqui neste tweet.

0xor0ne (@0xor0ne) 's Twitter Profile Photo

CVE-2025-6554: in-the-wild V8 the_hole based vulnerability analysis and exploit Bug analysis by [email protected]: retr0.zip/blog/cve-2025-… PoC by j j: github.com/mistymntncop/C… #infosec

CVE-2025-6554: in-the-wild V8 the_hole based vulnerability analysis and exploit

Bug analysis by <a href="/r3tr074/">r3tr074@nso.group</a>:
retr0.zip/blog/cve-2025-…

PoC by <a href="/mistymntncop/">j j</a>:
github.com/mistymntncop/C…

#infosec
James Kettle (@albinowax) 's Twitter Profile Photo

CVSS' Attack Complexity metric is the bane of bug bounty hunters: "you tried really hard to find that bug, so we'll pay you less".

CVSS' Attack Complexity metric is the bane of bug bounty hunters:  "you tried really hard to find that bug, so we'll pay you less".