henrique (@hjsbranq) 's Twitter Profile
henrique

@hjsbranq

🦍

ID: 974094317844402176

calendar_today15-03-2018 01:25:57

750 Tweet

91 Followers

204 Following

Jack Califano (@jackcalifano) 's Twitter Profile Photo

In 31 years of age I think I’ve finally discovered the cure to depression and it’s just leaving the house at every single possible opportunity no matter how badly you don’t want to.

michael (@filledwithurine) 's Twitter Profile Photo

“april fools” so im a fool because you betrayed my trust? im a fool for holding what you say with complete sincerity? i’m not the fool, you are

Ethiack (@ethiack) 's Twitter Profile Photo

AI won’t replace hackers. But it’s changing everything. We published our full guide from the “AI for Ethical Hacking” workshop on C-DAYS: tutorials, tools, CTFs & live demos from LLM fuzzing to autonomous hackbots. Read + hack now: blog.ethiack.com/blog/dont-fear…

André Baptista (@0xacb) 's Twitter Profile Photo

Can you hack a vibe coded PHP app? Yes. Can you use AI to hack the same app? Yes. Just dropped our workshop on AI for Ethical Hacking. Full materials 👇 github.com/ethiack/ai4eh/… Blog post: blog.ethiack.com/blog/dont-fear…

Can you hack a vibe coded PHP app? Yes. Can you use AI to hack the same app? Yes.

Just dropped our workshop on AI for Ethical Hacking.

Full materials 👇

github.com/ethiack/ai4eh/…

Blog post: blog.ethiack.com/blog/dont-fear…
Ethiack (@ethiack) 's Twitter Profile Photo

Hackian just uncovered a high-severity vulnerability and achieved 1-click RCE in (previously Clawdbot), fully autonomously, in under 2 hours. We explain how and show you Hackian’s thought process in our latest blog: ethiack.com/news/blog/one-…

Hackian just uncovered a high-severity vulnerability and achieved 1-click RCE in <a href="/openclaw/"></a>  (previously Clawdbot), fully autonomously, in under 2 hours.

We explain how and show you Hackian’s thought process in our latest blog: ethiack.com/news/blog/one-…
André Baptista (@0xacb) 's Twitter Profile Photo

Our pentesting agent found a 1-click ATO to RCE in Gateway Control UI in under 2 hours. Local instances can also be exploited with one click. Patched in main, update now. Watch the exploit 👇

André Baptista (@0xacb) 's Twitter Profile Photo

đź’Ą One click could completely compromise a @OpenClaw / Moltbot / Clawdbot (CVE-2026-25253) The vulnerability is now fixed, but here's how it worked: - gatewayUrl Parameter: A GET parameter automatically overrides the WebSocket gateway URL used by the Control UI - Token

đź’Ą One click could completely compromise a @OpenClaw / Moltbot / Clawdbot (CVE-2026-25253)

The vulnerability is now fixed, but here's how it worked:

- gatewayUrl Parameter: A GET parameter automatically overrides the WebSocket gateway URL used by the Control UI

- Token
André Baptista (@0xacb) 's Twitter Profile Photo

🚨We found RCE in Clawdbot 🚨 If you're using Clawdbot/Moltbot, I can get RCE on your computer just by getting you to click a link.  The coolest part? This vulnerability (CVE-2026-25253) took only 100 minutes to discover, and it was discovered completely autonomously using

Ethiack (@ethiack) 's Twitter Profile Photo

AI Speed x Human Precision Combining autonomous capability with human hacker intuition enables us to provide the highest level of protection. Feel the confidence of continuous offensive security  Signup for a 30-day FREE trial now 👇 portal.ethiack.com/signup