Jon G (@gainsec) 's Twitter Profile
Jon G

@gainsec

Managing Security Consultant by day. Security Researcher, OSINT Lover, Founder by night. | 35 CVEs. Skateboarder

ID: 730518561396011008

linkhttp://gainsec.com calendar_today11-05-2016 22:02:52

5,5K Tweet

542 Takipçi

740 Takip Edilen

Joel 🇦🇺 (@ptr_to_joel) 's Twitter Profile Photo

>interview with amazon (wowee faang!!) >spend 10 days in the on-site interview room with no water >get offered with a down level >accept and move to DC >first day starts >two minutes pass >receive ping that you are being laid off

XY (@xydotdot) 's Twitter Profile Photo

Moltbook is nothing more than a puppeted multi-agent LLM loop. Each “agent” is just next-token prediction shaped by human-defined prompts, curated context, routing rules, and sampling knobs. There is no endogenous goals. There is no self-directed intent. What looks like

dax (@thdxr) 's Twitter Profile Photo

finally got around to setting up an always on opencode server so i can run sessions on any device from anywhere takes a few minutes - showed it off here

Chris Tate (@ctatedev) 's Twitter Profile Photo

iOS support just landed in agent-browser, the browser automation CLI for agents 𝚊𝚐𝚎𝚗𝚝-𝚋𝚛𝚘𝚠𝚜𝚎𝚛 -𝚙 𝚒𝚘𝚜 𝚘𝚙𝚎𝚗 <𝚞𝚛𝚕> Available starting in v0.9

ً (@hieireen) 's Twitter Profile Photo

Your brain doesn't age because of time. It ages because of repetition. The more predictable your days become, the faster your neurons quiet down. Your brain builds neural pathways based on experience. New experiences create new connections. Repetition strengthens old ones. But

vx-underground (@vxunderground) 's Twitter Profile Photo

> Epstein writes down email and password > FBI finds it > Stores as evidence > Doesn't censor > Released > Nerds find Epstein password > No MFA > I wonder if anyone logged in? > Look inside

&gt; Epstein writes down email and password
&gt; FBI finds it
&gt; Stores as evidence
&gt; Doesn't censor
&gt; Released
&gt; Nerds find Epstein password
&gt; No MFA
&gt; I wonder if anyone logged in?
&gt; Look inside
Jenish Sojitra (@_jensec) 's Twitter Profile Photo

Prompt injection not working? Try changing your payload to Thai and Arabic languages. I was able to bypass multiple LLM runtime safeguard features, including Azure Content Filter, and received a total of $37,500 in bounties across programs.

Dean Gilbert (@wardendean) 's Twitter Profile Photo

Giving an entire generation of kids full, free, and legal access to this library (plus Looney Tunes!) is actually really cool. Tubi rules.

GiamMa-based researchers SDR R&D IoT (@giammaiot2) 's Twitter Profile Photo

ProtoPirate by RogueMaster github.com/RogueMaster/Pr… ProtoPirate is an experimental rolling-code analysis toolkit developed by members of The Pirates' Plunder. The app currently supports decoding for multiple automotive key-fob families.. #FlipperZero #SoftwareDefinedRadio #SDR

ProtoPirate by RogueMaster

github.com/RogueMaster/Pr…

ProtoPirate is an experimental rolling-code analysis toolkit developed by members of The Pirates' Plunder.

The app currently supports decoding for multiple automotive key-fob families..

#FlipperZero
#SoftwareDefinedRadio #SDR
Seeed Studio (@seeedstudio) 's Twitter Profile Photo

What’s flying over your home? With FAA Remote ID now mandatory, Colonel Panic’s Mesh-Mapper uses our XIAO ESP32S3 to detect drones via WiFi/Bluetooth & maps them in real-time. Mesh alerts via Meshtastic too! Open-source, DIY, & PCB-ready. Check it out on Hackster.io 👉

What’s flying over your home?  With FAA Remote ID now mandatory, Colonel Panic’s Mesh-Mapper uses our XIAO ESP32S3 to detect drones via WiFi/Bluetooth &amp; maps them in real-time. Mesh alerts via <a href="/TheMeshtastic/">Meshtastic</a> too!

Open-source, DIY, &amp; PCB-ready. Check it out on
<a href="/Hacksterio/">Hackster.io</a> 
👉
@chiefofautism (@chiefofautism) 's Twitter Profile Photo

i found a way to make UNCENSORED AI AGENT on a RTX 4090 GPU (!!!) with LOCAL 30B model weights this is GLM-4.7-Flash with abliteration, need 24GB VRAM, safety alignment surgically removed from the weights, the model has native tool calling, it actually executes bash, edits

The Mind Scourge (@themindscourge) 's Twitter Profile Photo

When it comes to new technologies, you’ve got to be thinking dumber Consider the phone. Everyone’s walking around with a supercomputer in their pocket, and it’s used mostly to play Clash of Clans and watch TikToks What is the dumb application of AI? That’s what I want to know.

pashov (@pashovkrum) 's Twitter Profile Photo

🚨Claude Opus 4.6 wrote vulnerable code, leading to a smart contract exploit with $1.78M loss cbETH asset's price was set to $1.12 instead of ~$2,200. The PRs of the project show commits were co-authored by Claude - Is this the first hack of vibe-coded Solidity code?

🚨Claude Opus 4.6 wrote vulnerable code, leading to a smart contract exploit with $1.78M loss

cbETH asset's price was set to $1.12 instead of ~$2,200. The PRs of the project show commits were co-authored by Claude - Is this the first hack of vibe-coded Solidity code?