André Baptista (@0xacb) 's Twitter Profile
André Baptista

@0xacb

Hacker grinding for L1gh7 and Fr33dφm, straight outta the cosmic realm. Co-founder @ethiack

ID: 1320338581

linkhttps://0xacb.com calendar_today01-04-2013 13:19:37

1,1K Tweet

15,15K Followers

730 Following

André Baptista (@0xacb) 's Twitter Profile Photo

Want to learn how to hack LLMs? The research team at Ethiack just launched a 5-level CTF. And we’ll be handing prizes to top performers every week, including Caido licenses! 👉 hacktheagent.com

Want to learn how to hack LLMs? The research team at <a href="/ethiack/">Ethiack</a> just launched a 5-level CTF.

And we’ll be handing prizes to top performers every week, including <a href="/CaidoIO/">Caido</a> licenses!

👉 hacktheagent.com
Ethiack (@ethiack) 's Twitter Profile Photo

Can AI truly be trusted in cybersecurity? With our multi-agent Hackbot and a dedicated Verifier that reviews the AI’s conclusions, we’re aiming for more reliable and transparent ethical hacking. The Verifier adds an extra layer of reasoning that helps catch weak assumptions,

Can AI truly be trusted in cybersecurity?

With our multi-agent Hackbot and a dedicated Verifier that reviews the AI’s conclusions, we’re aiming for more reliable and transparent ethical hacking. The Verifier adds an extra layer of reasoning that helps catch weak assumptions,
André Baptista (@0xacb) 's Twitter Profile Photo

Hackbots can be prone to hallucinations. The AI team at Ethiack was able to achieve a very low false positive rate through a specialized sub-agent known as the verifier. If you are interested about hackbot development👇

André Baptista (@0xacb) 's Twitter Profile Photo

And that's a wrap 🎰 First time with Ethiack at #hackersummercamp This year I didn't participate in any Live Hacking Events, so I pivoted to the OSINT competition from Recon Village. I'm now an uncertified geoguesser📍 It was awesome to see friends, meet new people, and learn

And that's a wrap 🎰

First time with <a href="/ethiack/">Ethiack</a> at #hackersummercamp

This year I didn't participate in any Live Hacking Events, so I pivoted to the OSINT competition from <a href="/ReconVillage/">Recon Village</a>. I'm now an uncertified geoguesser📍

It was awesome to see friends, meet new people, and learn
Ethiack (@ethiack) 's Twitter Profile Photo

Meet the Guy Who Hacked Google AI (Twice)🚨 We’re thrilled to welcome Roni Carta (aka Lupin) to the stage at #HackAIcon! Co-founder of Lupin & Holmes and an Ethical Hacker with a serious talent for breaking things (for the right reasons), his track record speaks for itself:

Meet the Guy Who Hacked Google AI (Twice)🚨

We’re thrilled to welcome Roni Carta (aka <a href="/0xLupin/">Lupin</a>) to the stage at #HackAIcon! Co-founder of Lupin &amp; Holmes and an Ethical Hacker with a serious talent for breaking things (for the right reasons), his track record speaks for itself:
André Baptista (@0xacb) 's Twitter Profile Photo

What happens after Black Hat and DEF CON? HackAIcon 2025.  We're hosting a conference dedicated to combining AI and ethical hacking in Lisbon! And we have some incredible speakers lined up for you. Early Bird tickets are available! Get your ticket:

What happens after <a href="/BlackHatEvents/">Black Hat</a> and <a href="/defcon/">DEF CON</a>?

HackAIcon 2025. 

We're hosting a conference dedicated to combining AI and ethical hacking in Lisbon! And we have some incredible speakers lined up for you.

Early Bird tickets are available!

Get your ticket:
André Baptista (@0xacb) 's Twitter Profile Photo

How to turn iframes and window.open into weapons for XSS. From origin manipulation to sandbox escape, this paper by huli is stacked with juicy info.  Huli dives deep into the magical world of iframes and window.open and is definitely worth a read!

How to turn iframes and window.open into weapons for XSS.

From origin manipulation to sandbox escape, this paper by <a href="/aszx87410/">huli</a> is stacked with juicy info. 

Huli dives deep into the magical world of iframes and window.open and is definitely worth a read!
André Baptista (@0xacb) 's Twitter Profile Photo

Typical CSS injection often relies on repeated context loading (usually via iframes) to exfiltrate sensitive tokens. I found this tool by مُحمّد that's both fast and works in Chrome and Safari. It can leak tokens with just a single CSS import by leveraging -webkit-cross-fade 🤯

Ethiack (@ethiack) 's Twitter Profile Photo

Hack the Agent Week #3 has arrived! The lucky hacker of Week 2 of Hack the Agent is h4ndsh. Congrats on scoring the Free HackAIcon ticket! 🏆 🎙️ This week’s prize is a 3-month Critical Thinker Discord subscription from the Critical Thinking - Bug Bounty Podcast (Critical Thinking - Bug Bounty Podcast)!

Hack the Agent Week #3 has arrived!

The lucky hacker of Week 2 of Hack the Agent is <a href="/h4ndsh/">h4ndsh</a>. Congrats on scoring the Free HackAIcon ticket! 🏆

🎙️ This week’s prize is a 3-month Critical Thinker Discord subscription from the Critical Thinking - Bug Bounty Podcast (<a href="/ctbbpodcast/">Critical Thinking - Bug Bounty Podcast</a>)!
André Baptista (@0xacb) 's Twitter Profile Photo

Want to win a ticket to HackAICon, Caido licenses or even a Critical Thinking - Bug Bounty Podcast discord subscription?  We're currently running a simple 5-level LLM CTF Challenge, where your goal is to jailbreak your way into a free ticket given by the LLM!  Complete all levels to enter our weekly

Want to win a ticket to HackAICon, <a href="/CaidoIO/">Caido</a> licenses or even a <a href="/ctbbpodcast/">Critical Thinking - Bug Bounty Podcast</a> discord subscription? 

We're currently running a simple 5-level LLM CTF Challenge, where your goal is to jailbreak your way into a free ticket given by the LLM! 

Complete all levels to enter our weekly