Nosa Shandy (@localhost31337) 's Twitter Profile
Nosa Shandy

@localhost31337

another infosec guy | {insert your certification here}

ID: 3170412307

linkhttps://whoami.apapedulimu.click/ calendar_today24-04-2015 07:46:36

6,6K Tweet

1,1K Takipçi

1,1K Takip Edilen

Google VRP (Google Bug Hunters) (@googlevrp) 's Twitter Profile Photo

☁️ Ever wondered how the Google Cloud VRP rewards security researchers? 💰🤔 Our latest podcast episode gives you the inside scoop! 🎙️ cloud.withgoogle.com/cloudsecurity/…

payloadartist (@payloadartist) 's Twitter Profile Photo

Browser vulnerability research is probably one of the toughest areas for AI to automate. It's a great skill to learn. Here's an awesome intro to browser security research by Ivan Fratric 💙💛: docs.google.com/presentation/d… The talk is full of great practical examples, and good advice.

Browser vulnerability research is probably one of the toughest areas for AI to automate. It's a great skill to learn. Here's an awesome intro to browser security research by <a href="/ifsecure/">Ivan Fratric 💙💛</a>:

docs.google.com/presentation/d…

The talk is full of great practical examples, and good advice.
Sergey Toshin (@_bagipro) 's Twitter Profile Photo

New Android host validation bypass technique! [1/4] All parsed URIs in Android are android.net.Uri.StringUri objects. However, the scheme parser only looks for the ":" delimiter

New Android host validation bypass technique!

[1/4] All parsed URIs in Android are android.net.Uri.StringUri objects. However, the scheme parser only looks for the ":" delimiter
stephen (@_tsuro) 's Twitter Profile Photo

If you like Chrome IPC shenanigans like this, you might also enjoy my talk from black hat 25: youtu.be/qhhJCLy0YBA?si…

Synacktiv (@synacktiv) 's Twitter Profile Photo

We've just released a tool to decrypt all Synology encrypted archives! We used it to compare SynologyPhotos versions and highlight our #Pwn2Own Ireland 2024 vulnerability on the BeeStation BST150-4T. Check out Tek_'s blog post for more details. synacktiv.com/en/publication…

那个饺子🦆(JJ) (@thatjiaozi) 's Twitter Profile Photo

As promised Blogpost is here! I find that a lot of the times people ask “how can researchers find complex bugs” This is my small contribution to show how the journey looked for me. I presented this content at hitcon last week! bughunters.google.com/blog/580034147…

zere (@j_zere) 's Twitter Profile Photo

Just published my first blog post "Cache Deception + CSPT: Turning Non Impactful Findings into Account Takeover" You can read the full write-up here: zere.es/posts/cache-de…

Jakub Domeracki (@j_domeracki) 's Twitter Profile Photo

Google VRP (Google Bug Hunters) disclosed my most impactful client-side report to date: bughunters.google.com/reports/vrp/wG… TL;DR An attacker could've gained access to Gemini Code Assist Tools (GitLab, GitHub etc.) configured by the victim

November Rain (@xchopath) 's Twitter Profile Photo

I kinda love those developers who rely on WAF rules too much. • /res-api/<ID>/status → 200 OK • /res-api/<ID>/qwertyasdf → 404 • /res-api/<ID>/ → 403 Forbidden • /res-api/<ID>/?anyparam → 200 OK

I kinda love those developers who rely on WAF rules too much.

• /res-api/&lt;ID&gt;/status → 200 OK
• /res-api/&lt;ID&gt;/qwertyasdf → 404
• /res-api/&lt;ID&gt;/ → 403 Forbidden
• /res-api/&lt;ID&gt;/?anyparam → 200 OK