Uranium238 (@uraniumhacker) 's Twitter Profile
Uranium238

@uraniumhacker

I do the hacks. He/him. Building and hacking stuff at @OphionSecurity

ID: 761575326853976064

calendar_today05-08-2016 14:51:22

2,2K Tweet

11,11K Followers

526 Following

Uranium238 (@uraniumhacker) 's Twitter Profile Photo

At the rate “AI code editors” have popped, I wanna see these code editors writing code for new code editors startups.

Uranium238 (@uraniumhacker) 's Twitter Profile Photo

Getting access to thousands of customers' chat history with support agents with just a cookie. Learn more on blog one of two from our Live Chat security research at Ophion Security. ophionsecurity.com/post/live-chat… #livechat #vulnerabilitydisclosure

Uranium238 (@uraniumhacker) 's Twitter Profile Photo

We found a vulnerability in Cisco's Webex Connect giving access to live chat histories of every organizations from government agencies to fortune 500. Check it out: ophionsecurity.com/post/cisco-web… #vulnerabilitydisclosure #cisco #attacksurfacemanagement

hackerfantastic.x (@hackerfantastic) 's Twitter Profile Photo

North Korea stole $1.4billion by injecting JavaScript through an AWS S3 bucket to spoof the UI interface during a transaction? It's almost like the entire infosec industry is focusing on hyperbolic amplified APT threats that are "cool" rather the stark realities confronting us.

Uranium238 (@uraniumhacker) 's Twitter Profile Photo

Announcing: Ask Us Anything Security - A free security advisory for startups Security often gets pushed to the back burner at startups until something breaks or a big deal requires it. But what if you could get expert security guidance without the overhead? At Ophion Security,

Uranium238 (@uraniumhacker) 's Twitter Profile Photo

taptastic.app/?score=10&patt… I reached level 10 in Taptastic! 🎮 Final speed: Super Fast Tiles: 9 The pattern that defeated me: 🟥 🟨 🟨 🟥 🟦 🟦 🟦 🟥 🟨 🟩 🟨 Can you beat my score? #Taptastic

Ben (@polygonben) 's Twitter Profile Photo

🚨 New blog alert! I recently "compromised" a threat actors Telegram based C2 channel, that was used for exfiltration of stolen data from the Nova infostealer. The threat actor stupidly tested their infostealing malware on their OWN production "hacking" box.... (1/3)

Uranium238 (@uraniumhacker) 's Twitter Profile Photo

Been trying out Cursor for the last few days with prompts generated through deep research via ChatGPT and Grok, it is definitely a game changer. I have deployed apps that I have wanted personally within hours. ◦ AI aided development is future. ◦ Security is still

Uranium238 (@uraniumhacker) 's Twitter Profile Photo

Presenting on some fun stuff with Ophion Security this year at kernelcon and Bsidesseattle. Come for the talk, stay for the vulnerabilities. #vulnerabilities #bugbounty #attacksurfacemanagement

Presenting on some fun stuff with <a href="/OphionSecurity/">Ophion Security</a>  this year at <a href="/_kernelcon_/">kernelcon</a> and <a href="/bsidesseattle/">Bsidesseattle</a>. Come for the talk, stay for the vulnerabilities. #vulnerabilities #bugbounty #attacksurfacemanagement
Uranium238 (@uraniumhacker) 's Twitter Profile Photo

We are doing #VibeSecurityForAI If you are an AI startup (pre-seed or seed ) we will test your application for free. We are doing this only for next two weeks. We are hackers who have hacked major companies like Zoom, AWS, Amazon, Google, banks and more. DM me or contact us

Uranium238 (@uraniumhacker) 's Twitter Profile Photo

Hacking with AI recently has been fun. Here is couple of things I did recently: - Parsed multiple JS files within seconds after identifying a target domain. Used the parsing data to find a critical vulnerability. - For a different program, used mixture of redress, radare2 and

Uranium238 (@uraniumhacker) 's Twitter Profile Photo

Every critical I find in major corp has been through the most obscure feature that is annoying as hell to setup. It never ceases to give.