45tr00 (@amaizing_human) 's Twitter Profile
45tr00

@amaizing_human

A cyber security enthusiast, CTF player @p3rf3ctr00t.
Building Self Sovereign Identity 🆔️

ID: 1396479120553480199

linkhttp://www.perfectroot.wiki calendar_today23-05-2021 14:52:48

52 Tweet

27 Followers

113 Following

cheqd.io 🆔 (@cheqd_io) 's Twitter Profile Photo

🧵Verifiable AI: The Case for Trustworthy AI Agents While #AI technology advances, so do ‘AI agents.’ These aren’t just text generators; they can actively complete tasks for us, like researching online, executing trades, or writing code. Think of AutoGPT as an early example.

p3rf3ctr00t (@p3rf3ctr00t) 's Twitter Profile Photo

Thank you for playing our CTF! We hope it was both fun and educational. Keep exploring , learning.See you in the next one. Big thank you to our guest challenge creators🙏: Oste Winter Tahaa Farooq Joel. they call me jjjohn And p3rf3ctr00t team members

Ethereum Intern (@ethereumintern_) 's Twitter Profile Photo

ethereum is the SINGLE MOST DECENTRALIZED CHAIN. THERE IS NO SECOND BEST. ethereum has the best decentralization and security of ANY chain from economics to social layer. and we can illustrate this through a series of comparisons with bitcoin. bitcoin has security budget issues

ethereum is the SINGLE MOST DECENTRALIZED CHAIN. THERE IS NO SECOND BEST. ethereum has the best decentralization and security of ANY chain from economics to social layer. and we can illustrate this through a series of comparisons with bitcoin.

bitcoin has security budget issues
45tr00 (@amaizing_human) 's Twitter Profile Photo

Hi guys, I am working on a DID-based Insurance Verification System. I would appreciate if y'all spared some few mins to fill it in. forms.gle/19T62nKnyczFhX…

Hacktron AI (@hacktronai) 's Twitter Profile Photo

Apple once ran this software. Multiple security firms poked at it. No one spotted the bug. Here's a thread of how we found CVE-2025-5086 in Delmia Apriso... 👇🧵

Hacktron AI (@hacktronai) 's Twitter Profile Photo

Enter Hacktron — our AI security engineer. We gave it the decompiled .NET code and said: "Find pre-auth deserialization flaws". It tore through thousands of files in minutes. First stop: every .Deserialize() call it could see. Most were boring JSON converters with safe defaults.

Hacktron AI (@hacktronai) 's Twitter Profile Photo

⚠️Then it landed on one weird serializer: NetDataContractSerializer. It turns out that this serializer embeds .NET metadata. Translation? It lets attackers sneak in full .NET objects if you’re not careful! The serializer lived inside a WCF service called FlexNetOperationsService.

Hacktron AI (@hacktronai) 's Twitter Profile Photo

Plot twist: the FlexNetOperationsService was commented out in the config. Was this another dead end?🤔Well... the .svc file was still deployed. In IIS, that means the service was still live! Hacktron built a quick SOAP payload, fired it, and got a Windows directory listing back.

Hacktron AI (@hacktronai) 's Twitter Profile Photo

💣Pre-auth RCE in under 10 minutes. This vuln survived years of audits because it looked innocuous: forgotten service, commented code, and an obscure serializer. Humans skim past that, but AI doesn’t blink. 🤖

Hacktron AI (@hacktronai) 's Twitter Profile Photo

Takeaway: Legacy enterprise apps + modern AI auditing = good security. Your "quiet" endpoints aren’t safe just because they’re dusty. Full write-up, PoC, and lessons learned👉hacktron.ai/blog/posts/das… Retweet if you think AI bug hunting is about to change red teaming forever.

Norah (@0xnorah23) 's Twitter Profile Photo

🚀 Kicking Off My Web3 Learning Journey Series! I've received many questions about how I transitioned into Web3 Security. So, I’ve decided to share my exact learning journey, step by step. This isn’t meant to be the ultimate guide. There are plenty of great resources out there

🚀 Kicking Off My Web3 Learning Journey Series!

I've received many questions about how I transitioned into Web3 Security. So, I’ve decided to share my exact learning journey, step by step.

This isn’t meant to be the ultimate guide. There are plenty of great resources out there
sysxplore (@sysxplore) 's Twitter Profile Photo

LINUX USERS ARE NOT HACKERS! LINUX USERS ARE NOT HACKERS! LINUX USERS ARE NOT HACKERS! LINUX USERS ARE NOT HACKERS! LINUX USERS ARE NOT HACKERS! LINUX USERS ARE NOT HACKERS! LINUX USERS ARE NOT HACKERS! LINUX USERS ARE NOT HACKERS!