Joao Matos (@joaomatosf) 's Twitter Profile
Joao Matos

@joaomatosf

ID: 841976228508794886

linkhttps://github.com/joaomatosf calendar_today15-03-2017 11:35:50

395 Tweet

1,1K Takipçi

976 Takip Edilen

GitHub Security Lab (@ghsecuritylab) 's Twitter Profile Photo

The bug was fixed by adding a new member variable named allowTemplateFromHeader. If it's false then templates in the header are ignored. github.com/apache/camel/c… Congrats to unknown_person Joao Matos and intrigus for giving the answer!

SSD Secure Disclosure (@securiteam_ssd) 's Twitter Profile Photo

Slack recently paid a researcher $1750 USD for an RCE. The same disclosure through our program, would have earned him in excess of $10,000 USD!! Submit your findings quickly and discreetly and get the BIG payouts you deserve!

Ptrace Security GmbH (@ptracesecurity) 's Twitter Profile Photo

DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685) github.com/knqyf263/dnspo… #Pentesting #DNS #CVE #CyberSecurity #Infosec

DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)  github.com/knqyf263/dnspo…  #Pentesting #DNS #CVE #CyberSecurity #Infosec
H2HC (@h2hconference) 's Twitter Profile Photo

15a Edicao da H2HC Magazine lancada!! 70+ paginas de conteudo tecnico exclusivo: bit.ly/h2hcmagazine15 ( excelente trabalho de nosso editor, Gabriel Negreira Barbosa ) #H2HC2021 #H2HConference #H2HCMagazine H2HC

JD Work (@hostilespectrum) 's Twitter Profile Photo

When researchers said no more free bugs, they were serious. This includes red teams. If vendors fail to appropriately incentivize disclosure against prevailing market rates, somebody is gonna pay the bills.

Joao Matos (@joaomatosf) 's Twitter Profile Photo

this is what happens when you entrust your company's security to self-titled "security XPTO" who spend all their time criticizing security researchers on twitter

J (@jespinhara) 's Twitter Profile Photo

I did release a very small blogpost/exploit I wrote for a vulnerability found by Joao Matos some years ago. Vulnerability details are on the slides (link on the post). jspin.re/jboss-eap-as-6…

Heyder Andrade (@heyderandrade) 's Twitter Profile Photo

Landed a Metasploit Project module that exploit a Java deserialization vulnerability in JBOSS EAP/AS Remoting Unified Invoker interface for versions 6.1.0 and prior. Credits: Joao Matos github.com/rapid7/metaspl… #cybersecurity

Rodrigo Branco (@bsdaemon) 's Twitter Profile Photo

A lot of folks asked H2HC to release the image used in the banner of the past edition of the magazine, so we did (high res in the link, low res in the tweet)! h2hc.com.br/wallpapers/Rev… #H2HC2022

A lot of folks asked <a href="/h2hconference/">H2HC</a> to release the image used in the banner of the past edition of the magazine, so we did (high res in the link, low res in the tweet)!  h2hc.com.br/wallpapers/Rev…  #H2HC2022