trein (@reindaelman) 's Twitter Profile
trein

@reindaelman

Application Security Engineer at @intigriti | OSWE | BSCP | hackerone.com/trein

ID: 1142411767

linkhttps://hacked.be calendar_today02-02-2013 13:00:22

11 Tweet

113 Followers

142 Following

Robbe Verwilghen (@grumpinout) 's Twitter Profile Photo

So... I created a challenge for Intigriti! 🥳🎉 I created this as part of my bachelor thesis, and I will send a short survey to anyone who solved the challenge. I will give away another €50 swag voucher to a random person that filled in the survey! 😄

Intigriti (@intigriti) 's Twitter Profile Photo

Unique opportunity: @Intel and Intigriti are organizing an exclusive virtual hacking experience focused on Intel® Software Guard Extensions (Intel® SGX). Apply now and you may earn entry into a subsequent live hacking event on an unreleased Intel product: guardenparty.intigriti.io

Intigriti (@intigriti) 's Twitter Profile Photo

Hackers, we are proud to share that we raised €21 million, and that we're investing it in YOU! We are introducing paid bug bounty engagements, hacker automation tools, and get a ton of new programs. Thanks for being part of our journey! 🤩💙 blog.intigriti.com/2022/04/26/int…

Intigriti (@intigriti) 's Twitter Profile Photo

🔥 Defcon 32: Embrace the Bug Life! 🐞 📅 August 8-11, 2024 📍 Join our crew at the Hack Shack 🍹 🎮 Meet the team & hack alongside the best 🏆 Compete for swag & prizes worth up to $500 Don't miss out—let's decode, debug, and dominate! 🚀 #Defcon32 #HackWithIntigriti

🔥 Defcon 32: Embrace the Bug Life! 🐞
📅 August 8-11, 2024
📍 Join our crew at the Hack Shack 🍹 🎮 Meet the team & hack alongside the best 🏆 Compete for swag & prizes worth up to $500
Don't miss out—let's decode, debug, and dominate! 🚀 #Defcon32 #HackWithIntigriti
s1r1us (@s1r1u5_) 's Twitter Profile Photo

MXSS Part 2: Why Client-Side HTML Sanitization is hard In this video, we dive into Parser Differentials, Namespace Confusion, and the Nesting Depth Limit that led to an XSS on Google and multiple DOMPurify bypasses. youtu.be/vVwo5tW6d3w

MXSS Part 2: Why Client-Side HTML Sanitization is hard

In this video, we dive into Parser Differentials, Namespace Confusion, and the Nesting Depth Limit that led to an XSS on Google and multiple DOMPurify bypasses.

youtu.be/vVwo5tW6d3w
trein (@reindaelman) 's Twitter Profile Photo

CVE-2024-8856 is out! This is my 7th CVE and my first critical one. TL;DR Unauthenticated RCE via Arbitrary File Upload (thanks to some very questionable file type validation). Big thanks to Wordfence for the quick triage and bounty! Full write-up: hacked.be/posts/CVE-2024…

Aikido Security (@aikidosecurity) 's Twitter Profile Photo

🚨We just hacked Google’s Gemini CLI, and multiple undisclosed Fortune 500 companies, though prompt injections in GitHub Actions. We uncovered a systemic weakness in how AI agents like Google Gemini Claude code, OpenAI codex, and GitHub AI inference are integrated into GitHub

trein (@reindaelman) 's Twitter Profile Photo

Introducing "PromptPwned": how we hacked Google Gemini CLI, and a bunch of other big names, through prompt injections in GitHub workflows: aikido.dev/blog/promptpwn… #bugbounty #security

Aikido Security (@aikidosecurity) 's Twitter Profile Photo

From “no bullsh*t security” to $1 billion valuation in three years. Announcing Aikido Security $60M Series B at $1B led by Tom Stafford at DST Global. What’s next? Self-securing software. Stay tuned.