
Angel Hacker
@4ng3lhacker
George Mason Cyber Security Engineering Student | Databuoy Software Engineering Intern | Bug Hunter
ID: 1536045125427765248
12-06-2022 17:58:12
82 Tweet
310 Followers
23 Following



Looking forward to running our workshop “Lost in Translation - WAF Bypasses By Abusing Data Manipulation Processes” at the inaugural bug bounty village! Bug Bounty Village Ariel Garcia Harley Kimball



A big thanks to everyone who attended our workshop! So glad to have run it with Ryan Barnett (B0N3).

My daughter (Angel Hacker) and I had a BLAST! DEF CON 26 (Daughter’s first at 12yo) and now 32 and presenting together Bug Bounty Village!!! Cyber Wonder Woman 💪 We will be back in ‘25!!



I am ecstatic to announce that I will be presenting @ #BHUSA alongside my daughter (Angel Hacker)! "Lost in Translation: Exploiting Unicode Normalizations" We created this talk based on response & feedback from our Bug Bounty Village workshop last year. blackhat.com/us-25/briefing…






ActiveScan++ can now detect multiple advanced unicode exploits just dropped at #BHUSA including confusables, codepoint overflows, case-conversion and combining diacritics! Thanks to researchers Ryan Barnett (B0N3) @ hackersummercamp & Angel Hacker for contributing this awesome update.




Just released a new recollapse version thanks to Ryan Barnett (B0N3) @ hackersummercamp and Angel Hacker after their talk in Black Hat today. What’s new? 💥Mode 6: Fuzz case folding/upper/lower 💥 Mode 7: Fuzz byte truncations 💥 Recollapse is now available to use as a python library and

Ryan Barnett (B0N3) Angel Hacker Black Hat Ryan Barnett (B0N3) and Angel Hacker - you guys rocked it on stage yesterday. Congratulations on this remarkable achievement!

