0xbro (@sec_0xbro) 's Twitter Profile
0xbro

@sec_0xbro

Penetration tester, content creator & wannabe ethical hacker

ID: 1225080977522937856

linkhttps://0xbro.red calendar_today05-02-2020 15:37:30

89 Tweet

394 Takipçi

163 Takip Edilen

0xbro (@sec_0xbro) 's Twitter Profile Photo

WAF bypass and vulnerability chain exploiting parser differentials | Waffle-y Order Hack The Box #hackthebox #WAF #ctf #hacking youtu.be/IESwry_l-UU

0xbro (@sec_0xbro) 's Twitter Profile Photo

Easy-peasy #android emulator setup without using Genymotion or Android Studio + installation of custom certificates inside the system #certificate store of an Android 10 device. youtu.be/v-p1dTWmWDY

0xbro (@sec_0xbro) 's Twitter Profile Photo

I moved my blog to a new domain and changed some username handles on my socials. Please refer to the following tweet to find out the new URLs 🫱🏼‍🫲🏾

0xbro (@sec_0xbro) 's Twitter Profile Photo

I'm happy to share the attribution of my first #CVE! Authenticated Static Code Injections in #OpenCart (CVE-2023-47444) You can find the details and PoCs about the two vulnerabilities on my blog: 0xbro.red/disclosures/di…

Simone Margaritelli (@evilsocket) 's Twitter Profile Photo

Researcher responsibly discloses a static code injection vulnerability in OpenCart and this is how the core developer responds. The disclosure timeline is hilarious, huge OpenCart fail. Kudos to 0xbro for handling it so well. Check his post out!

Researcher responsibly discloses a static code injection vulnerability in OpenCart and this is how the core developer responds.

The disclosure timeline is hilarious, huge <a href="/opencart/">OpenCart</a> fail. 

Kudos to <a href="/sec_0xbro/">0xbro</a> for handling it so well. Check his post out!
Shielder (@shieldersec) 's Twitter Profile Photo

🎉 Cheers hackers! 🎊 As we bid farewell to 2023, let's celebrate together! 🎁 Like, follow, and retweet for a chance to WIN a €30 coupon for swag.shielder.com! 🏆 3 winners will be selected by EOY! #giveaways #swag

0xbro (@sec_0xbro) 's Twitter Profile Photo

I published a blog post detailing a #pentest I did against some #Salesforce Communities in which I exploited flaws that led to an account takeover #vulnerability. I show plugins, in-depth techniques and resources for delving into Salesforce attack surface 0xbro.red/writeups/web-h…

0xbro (@sec_0xbro) 's Twitter Profile Photo

Learn how to take EFFECTIVE notes for #CTF, penetration tests, vulnerability research, and #cybersecurity certifications like #OSCP, #OSEP, etc. using #Obsidian! 🎬 youtu.be/4t1MvfNK8Wc?si…

James Kettle (@albinowax) 's Twitter Profile Photo

I'm excited to announce I'll be delivering the keynote at RomHack this September! I can't share the title just yet but it's going to be a good one. See you in Rome!

zhero; (@zhero___) 's Twitter Profile Photo

the research paper is out: Next.js and the corrupt middleware: the authorizing artifact result of a collaboration with inzo that led to CVE-2025-29927 (9.1-critical) zhero-web-sec.github.io/research-and-t… enjoy the read!

the research paper is out:

Next.js and the corrupt middleware: the authorizing artifact

result of a collaboration with <a href="/inzo____/">inzo</a> that led to CVE-2025-29927 (9.1-critical)

zhero-web-sec.github.io/research-and-t…

enjoy the read!
0xbro (@sec_0xbro) 's Twitter Profile Photo

In my latest blog post, I explain two methods I used to achieve account takeover by targeting a vulnerable forgot password feature. Learn about guessing anti-tampering tokens and exploiting time-based vulnerabilities with a sandwich attack. 0xbro.red/writeups/web-h…