Just Another Security Expert (@iamsecurity) 's Twitter Profile
Just Another Security Expert

@iamsecurity

Senior Information Security Specialist, Photoshop professional, Nuke advanced user, amateur Python programmer

ID: 3290485559

calendar_today19-05-2015 21:14:46

917 Tweet

673 Takipçi

9 Takip Edilen

H4x0r.DZ (@h4x0r_dz) 's Twitter Profile Photo

Jenkins CVE-2024-23897 Arbitrary file read vulnerability through the CLI can lead to RCE POC #BugBounty #vulnerabilities #rce

Jenkins CVE-2024-23897 Arbitrary file read vulnerability through the CLI can lead to RCE 

POC 

#BugBounty  #vulnerabilities #rce
Nicolas Krassas (@dinosn) 's Twitter Profile Photo

AI Exploits: A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities securityonline.info/ai-exploits-a-…

qu35t (@qu35t_tv) 's Twitter Profile Photo

Discover my latest article on explaining and exploiting the file write vulnerability into RCE via Mobsf (CVE-2024-21633) ! 📑 Kudos to 0x33c0unt for discovering and reporting the vulnerability 🐛 qu35t.pw/posts/2024-216…

Harel (@h4r3l) 's Twitter Profile Photo

Just published a writeup on my account takeover vulnerability in ChatGPT, using a really cool web cache deception technique. Waited a while to finally publish this, enjoy :) nokline.github.io/bugbounty/2024…

Ptrace Security GmbH (@ptracesecurity) 's Twitter Profile Photo

linWinPwn is a bash script that automates a number of Active Directory Enumeration and Vulnerability checks github.com/lefayjey/linWi… #Pentesting #CyberSecurity #Infosec

linWinPwn is a bash script that automates a number of Active Directory Enumeration and Vulnerability checks github.com/lefayjey/linWi… #Pentesting #CyberSecurity #Infosec
Justin Ibarra (@br0k3ns0und) 's Twitter Profile Photo

The lolol.farm continues to grow! Introducing a new project: LoFP - Living off the False Positive Where you can blend into the noise, or leverage it for triage and rule writing. 🎊🍻 br0k3nlab.com/LoFP/ #DetectionEngineering #Security

Binni Shah (@binitamshah) 's Twitter Profile Photo

HTTP Downgrade attacks with SmuggleFuzz : moopinger.github.io/blog/smugglefu… smugglefuzz : A customizable and rapid HTTP downgrade smuggling scanner written in Go : github.com/Moopinger/smug… Ref : http2smugl : tool helps to detect and exploit HTTP request smuggling in cases it can be

Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

Four years after publishing my code stealing passwords from WinLogon I have just realized that NPLogonNotify() has a twin! NPPasswordChangeNotify() obtains old and new cleartext passwords changed via CtrlAltDel. Clearly documented by MS and easy to use: github.com/gtworek/PSBits…

Four years after publishing my code stealing passwords from WinLogon I have just realized that NPLogonNotify() has a twin! 
NPPasswordChangeNotify() obtains old and new cleartext passwords changed via CtrlAltDel. Clearly documented by MS and easy to use: github.com/gtworek/PSBits…
Clint Gibler (@clintgibler) 's Twitter Profile Photo

🐳 Docker Security – Step-by-Step Hardening (Docker Hardening) One of the most detailed guides I've ever seen 🔥 Covers hardening steps for the Docker Host, Docker Daemon, images, and containers reynardsec.com/en/docker-plat…

🐳 Docker Security – Step-by-Step Hardening (Docker Hardening)

One of the most detailed guides I've ever seen 🔥

Covers hardening steps for the Docker Host, Docker Daemon, images, and containers

reynardsec.com/en/docker-plat…
Cyber Detective💙💛 (@cyb_detective) 's Twitter Profile Photo

Vortimo OSINT An online tool for quickly searching hundreds of different sources and then processing the information found. As an entry point you can use: - email - domain - hash - phone number - image and more. find.osint-tool.com Creator Vortimo Roelof Temmingh

Vortimo OSINT 

An online tool for quickly searching hundreds of different sources and then processing the information found. As an entry point you can use:

- email
- domain
- hash
- phone number
- image

and more.

find.osint-tool.com

Creator <a href="/VortimoTech/">Vortimo</a> <a href="/RoelofTemmingh/">Roelof Temmingh</a>
Just Another Security Expert (@iamsecurity) 's Twitter Profile Photo

I'm not sure what's more disturbing: the fact that AI can generate images, or the fact that people are willing to use them in almost every fckng security post or article without bothering or caring about their quality at all.

Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile Photo

Everyone knows that the RFCs for email addresses are crazy. This post will show without doubt that you should not be following the RFC. portswigger.net/research/split…