Chackal (Esdras DAGO) (@chackal__) 's Twitter Profile
Chackal (Esdras DAGO)

@chackal__

"Vulnerability researcher" doing Bug Bounty on free time (yeswehack.com/hunters/chackal) Also doing some Reverse on many targets but find no vuln 😒

ID: 969762059226316800

linkhttps://medium.com/@chackal calendar_today03-03-2018 02:31:06

2,2K Tweet

1,1K Followers

875 Following

Mehmet INCE (@mdisec) 's Twitter Profile Photo

There is only one atomic building blocks: I call it Context Confusion! which I believe LiveOverflow 🔴 referees as Injection in his tweet. Single data becomes part of the another data. It’is still “data” for you but the moment that data switched the context, for instance sent

solst/ICE (@icesolst) 's Twitter Profile Photo

Infosec folks when porn needs ID verification: 🗣️🗣️🗣️🗣️🗣️ Infosec folks when children are being killed by the IDF: 😴🧑‍🦯🙊🙈

c0dejump (@c0dejump) 's Twitter Profile Photo

Hello everyone, A little out of context this time, I'm leaving my current job to start a new adventure on my own. I wanted to thank you for all the strength you give me and for all your feedback on my tools ! 🤜🤛❤️ I love what I do and I'll keep doing it, but it's always nice

joernchen (@joernchen) 's Twitter Profile Photo

Today I have a more serious topic than usual, please consider reposting for reach: My wife and I are urgently looking for a specialist in neuropediatrics or a similar field for our autistic child with a diagnosed, but not further specified, movement disorder [1/3]

Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile Photo

Imagine you have a XSS vulnerability but you have a undefined variable before your injection. Is all hope lost? Not at all you can use a technique called XSS Hoisting to declare the variable and continue your exploit. Big thanks to ycam for the XSS cheat sheet submission

Imagine you have a XSS vulnerability but you have a undefined variable before your injection. Is all hope lost? Not at all you can use a technique called XSS Hoisting to declare the variable and continue your exploit. Big thanks to <a href="/ycam_asafety/">ycam</a> for the XSS cheat sheet submission
Stephen Sims (@steph3nsims) 's Twitter Profile Photo

Please join me on the next Off By One Security stream with guest Eugene Lim (spaceraccoon | Eugene Lim ) on 4-Sept at 6PM PT for a session on "0-day Hunting Strategy!" This will be a great session for those interested in vulnerability research! Note the time at 6PM PT youtube.com/watch?v=dMt2qy…

Please join me on the next <a href="/offby1security/">Off By One Security</a> stream with guest Eugene Lim (<a href="/spaceraccoonsec/">spaceraccoon | Eugene Lim</a> ) on 4-Sept at 6PM PT for a session on "0-day Hunting Strategy!" This will be a great session for those interested in vulnerability research! Note the time at 6PM PT

youtube.com/watch?v=dMt2qy…
Chackal (Esdras DAGO) (@chackal__) 's Twitter Profile Photo

I'm not good enough at guessing obvious things, so it took me way too many DLLs to reverse and a few rabbit holes to go down, only to find that the final payload was a very classic one. Still, the research journey was really fun, with a happy ending 😁

I'm not good enough at guessing obvious things, so it took me way too many DLLs to reverse and a few rabbit holes to go down, only to find that the final payload was a very classic one. 

Still, the research journey was really fun, with a happy ending 😁
GreHack (@grehackconf) 's Twitter Profile Photo

Synacktiv Volker bsecure.fr Orange Cyberdefense France Pierre Milioni 📢 #GreHack25 program release! We're kicking off this weekend with a bang by announcing our guest speaker for this edition 👀 👤 Gynvael Coldwind from HexArcana ➡️ CTF in a box ? The weirdest NETGEAR network switch 2021 exploit chain See you tomorrow for a next talk 🔥

exploits.club (@exploitsclub) 's Twitter Profile Photo

Anotha week, another VR newsletter 🏴‍☠️📰 NCC Group Research & Technology (McCaulay, Alex Plaskett) pop a Tesla TCU unit kCTF 1-day breakdowns from Faith 🇧🇩🇦🇺 & Pumpkin 🎃 Jann Horn - [email protected] talks potential remote ASLR leaks + Jobs and MORE 👇 blog.exploits.club/exploits-club-…

Stephen Sims (@steph3nsims) 's Twitter Profile Photo

Today at 11AM PT! This will be an interesting session on Windows Shellcode. You can watch on X, LinkedIn, or YouTube here: youtube.com/watch?v=WR7M_U…

Today at 11AM PT! This will be an interesting session on Windows Shellcode. You can watch on X, LinkedIn, or YouTube here: youtube.com/watch?v=WR7M_U…
FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

💣 We caught Y Combinator–backed Gecko Security stealing two of our CVEs, one on ollama , one on Gradio. They copied our PoCs, claimed CVE IDs, and even back-dated their blog posts. Here’s the full story 👇

💣 We caught <a href="/ycombinator/">Y Combinator</a>–backed <a href="/gecko_sec/">Gecko Security</a>  stealing two of our CVEs, one on <a href="/ollama/">ollama</a> , one on <a href="/Gradio/">Gradio</a>.
They copied our PoCs, claimed CVE IDs, and even back-dated their blog posts.
Here’s the full story 👇
Chackal (Esdras DAGO) (@chackal__) 's Twitter Profile Photo

My imposter syndrome now that I know there’s no entry for Brother printer at this p2o edition. Still looking forward to seeing what others found - especially this WhatsApp zero-click bug (or bugs).