v1ce0ye (@vincebye) 's Twitter Profile
v1ce0ye

@vincebye

INFJ/Need a Job of Fuzzing

ID: 700906333642444800

calendar_today20-02-2016 04:54:26

84 Tweet

56 Takipçi

723 Takip Edilen

v1ce0ye (@vincebye) 's Twitter Profile Photo

You guys rate vulnerabilities, why don't you rate companies? Some companies are just garbage, they don't fix their vulnerabilities, they wait for us to waste our time submitting reports and then give us a duplicate bugcrowd

v1ce0ye (@vincebye) 's Twitter Profile Photo

Are your auditors really professional? A vulnerabilitie that allows free users to use the quota of paid users is classified as p4. Strangely, another one is classified as p3. Can you unify your standards? Or does it depend on the mood of the auditors? bugcrowd

Philippe Delteil (@philippedelteil) 's Twitter Profile Photo

I get a lot of DMs asking how to start in bug bounty. I can give you 4 advises that helped me a lot: 1. Stop reading writeups and watching videos and start hunting. 2. Check JS0N Haddix's methodology (got my first bounty this way) 3. Start practicing in Hack The Box (D̒̕ᵈăᵃn̕ᶰ Ť̾̾̓͐͒͠ᵗe͗̑́̋̂́͡ᵉn̅ᶰtᵗl̀̓͘ᶫe̓̒̂̚ᵉrʳ🫡)

Today In Infosec (@todayininfosec) 's Twitter Profile Photo

1996: "Smashing The Stack For Fun And Profit" was published in the hacker zine, Phrack. The article by Elias Levy (aka Aleph One) introduced many to stack buffer overflow vulnerabilities and how to exploit them.

1996: "Smashing The Stack For Fun And Profit" was published in the hacker zine, Phrack. The article by Elias Levy (aka Aleph One) introduced many to stack buffer overflow vulnerabilities and how to exploit them.
/dev/ttyS0 (@devttys0) 's Twitter Profile Photo

Just in time for Christmas: a repository for decrypting many encrypted D-Link firmware images. Also integrated into Binwalk for auto-magic decryption & extraction. github.com/devttys0/delink

h0mbre (@h0mbre_) 's Twitter Profile Photo

I tried my hand at exploiting an nday on the Google Container Optimized OS instance in kCTF but sadly was very late to the party. Here is my exploit write-up for it. I learned a lot during the process, let me know what you think. I'll post TL;DR in thread h0mbre.github.io/Patch_Gapping_…

Phrack Zine (@phrack) 's Twitter Profile Photo

Hackers rejoice! We are releasing the Phrack 71 PDF for you today! Don't forget this year is Phrack's 40th anniversary release! Send in your contribution and be part of this historical issue! The CFP is still open, you can find it and the PDF link at phrack.org

Synacktiv (@synacktiv) 's Twitter Profile Photo

Interested in vulnerabilities in old video games? 🎮 Check out our latest article written by Tomtombinary on Heroes of Might and Magic V 👇 synacktiv.com/en/publication…

lcamtuf (@lcamtuf) 's Twitter Profile Photo

I still remember when I had to put out a press release saying that afl-fuzz was too dangerous to make available to the general public

v1ce0ye (@vincebye) 's Twitter Profile Photo

Submission limits are being enforced, but some of my vulnerability reports have been pending for over 2 months with no review. This creates a bottleneck where I can’t submit new findings or continue contributing. Intigriti

Submission limits are being enforced, but some of my vulnerability reports have been pending for over 2 months with no review.

This creates a bottleneck where I can’t submit new findings or continue contributing.  <a href="/intigriti/">Intigriti</a>