Angel Hacker (@4ng3lhacker) 's Twitter Profile
Angel Hacker

@4ng3lhacker

George Mason Cyber Security Engineering Student | Databuoy Software Engineering Intern | Bug Hunter

ID: 1536045125427765248

calendar_today12-06-2022 17:58:12

82 Tweet

310 Followers

23 Following

Angel Hacker (@4ng3lhacker) 's Twitter Profile Photo

Looking forward to running our workshop “Lost in Translation - WAF Bypasses By Abusing Data Manipulation Processes” at the inaugural bug bounty village! Bug Bounty Village Ariel Garcia Harley Kimball

Looking forward to running our workshop “Lost in Translation - WAF Bypasses By Abusing Data Manipulation Processes” at the inaugural bug bounty village! <a href="/BugBountyDEFCON/">Bug Bounty Village</a> <a href="/Arl_rose/">Ariel Garcia</a> <a href="/infinitelogins/">Harley Kimball</a>
Ryan Barnett (@ryancbarnett) 's Twitter Profile Photo

My daughter (Angel Hacker) and I had a BLAST! DEF CON 26 (Daughter’s first at 12yo) and now 32 and presenting together Bug Bounty Village!!! Cyber Wonder Woman 💪 We will be back in ‘25!!

My daughter (<a href="/4ng3lhacker/">Angel Hacker</a>) and I had a BLAST! 

<a href="/defcon/">DEF CON</a> 26 (Daughter’s first at 12yo) and now 32 and presenting together <a href="/BugBountyDEFCON/">Bug Bounty Village</a>!!! Cyber Wonder Woman 💪

We will be back in ‘25!!
Ryan Barnett (@ryancbarnett) 's Twitter Profile Photo

I am ecstatic to announce that I will be presenting @ #BHUSA alongside my daughter (Angel Hacker)! "Lost in Translation: Exploiting Unicode Normalizations" We created this talk based on response & feedback from our Bug Bounty Village workshop last year. blackhat.com/us-25/briefing…

Angel Hacker (@4ng3lhacker) 's Twitter Profile Photo

Thrilled to be co-presenting with my Dad (Ryan Barnett (B0N3) ), "Lost in Translation: Exploiting Unicode Normalization" at Black Hat USA!: blackhat.com/us-25/briefing… #BHUSA Black Hat

Thrilled to be co-presenting with my Dad (<a href="/ryancbarnett/">Ryan Barnett (B0N3)</a> ), "Lost in Translation: Exploiting Unicode Normalization" at Black Hat USA!:
blackhat.com/us-25/briefing… 
#BHUSA <a href="/BlackHatEvents/">Black Hat</a>
James Kettle (@albinowax) 's Twitter Profile Photo

ActiveScan++ can now detect multiple advanced unicode exploits just dropped at #BHUSA including confusables, codepoint overflows, case-conversion and combining diacritics! Thanks to researchers Ryan Barnett (B0N3) @ hackersummercamp & Angel Hacker for contributing this awesome update.

ActiveScan++ can now detect multiple advanced unicode exploits just dropped at #BHUSA including confusables, codepoint overflows, case-conversion and combining diacritics! Thanks to researchers <a href="/ryancbarnett/">Ryan Barnett (B0N3) @ hackersummercamp</a>  &amp; <a href="/4ng3lhacker/">Angel Hacker</a> for contributing this awesome update.
DCNextGen (@defconnextgen) 's Twitter Profile Photo

At DEF CON this year? Here is where to find us📍 We are on the 2nd floor room 230 Our opening ceremony is tomorrow at 10am, so don't miss it! DEF CON #defcon33 #defcon

Ryan Barnett (@ryancbarnett) 's Twitter Profile Photo

I am still riding the #ProudCyberDad high of my daughter Angel Hacker and I getting the opportunity to give the first ever “Multi-Generational” Black Hat Briefing! 🙏

I am still riding the #ProudCyberDad high of my daughter <a href="/4ng3lhacker/">Angel Hacker</a> and I getting the opportunity to give the first ever “Multi-Generational” <a href="/BlackHatEvents/">Black Hat</a> Briefing! 🙏
André Baptista (@0xacb) 's Twitter Profile Photo

Just released a new recollapse version thanks to Ryan Barnett (B0N3) @ hackersummercamp and Angel Hacker after their talk in Black Hat today. What’s new? 💥Mode 6: Fuzz case folding/upper/lower 💥 Mode 7: Fuzz byte truncations 💥 Recollapse is now available to use as a python library and