Gunnar Andrews (@g0lden_infosec) 's Twitter Profile
Gunnar Andrews

@g0lden_infosec

Hack Stuff | Code Stuff | Fitness | Kaizen
OSCP | OSWA | OSWE

youtube.com/@g0lden1

discord.gg/kqsdgGdVex

goldencybersec.com

ID: 3290552985

linkhttps://youtube.com/@g0lden1 calendar_today19-05-2015 23:04:24

2,2K Tweet

4,4K Takipçi

878 Takip Edilen

Recon Village (@reconvillage) 's Twitter Profile Photo

🔊 Talk Announcement: "Plumbing The Plumber: A Playbook for Integration Servers" by Roll4Combat The speaker is going to explore how misconfigured integration tech like Webmethods and Oracle can lead to major recon wins. 📍Recon Village, DEF CON 33 - Aug 8-10, 2025 #InfoSec

🔊 Talk Announcement: "Plumbing The Plumber: A Playbook for Integration Servers" by <a href="/BadAt_Computers/">Roll4Combat</a>

The speaker is going to explore how misconfigured integration tech like Webmethods and Oracle can lead to major recon wins.

📍Recon Village, <a href="/defcon/">DEF CON</a> 33 - Aug 8-10, 2025
#InfoSec
shubs (@infosec_au) 's Twitter Profile Photo

Whenever I audit C# code, I look for benign file operations such as File.Exists(), especially if there's a preceding Path.Combine(). Read about how we leaked NTLM hashes pre-authentication in DotNetNuke (CVE-2025-52488) due to a perfect storm of issues. slcyber.io/assetnote-secu…

Whenever I audit C# code, I look for benign file operations such as File.Exists(), especially if there's a preceding Path.Combine(). Read about how we leaked NTLM hashes pre-authentication in DotNetNuke (CVE-2025-52488) due to a perfect storm of issues. slcyber.io/assetnote-secu…
Arcanum Information Security (@arcanuminfosec) 's Twitter Profile Photo

Red, Blue, Purple AI starts TOMORROW! If you have already signed up, you'll get the zoom link today. If you haven't... what the heck are you waiting for?? arcanum-sec.com/training/red-b…

Bug Bounty Village (@bugbountydefcon) 's Twitter Profile Photo

The wait is finally over! We have published the Bug Bounty Village agenda for DEF CON 33. Want to know what you can learn, who you’ll meet, and when your favorite speaker takes the stage? Check out the full lineup at bugbountydefcon.com/agenda.

Assetnote (@assetnote) 's Twitter Profile Photo

Our Security Research team at Searchlight Cyber discovered a pre-authentication RCE vulnerability in Sawtooth Lighthouse Studio (CVE-2025-34300). It affects all versions up to 9.16.14. Read more here: slcyber.io/assetnote-secu…

Jason Haddix (@jhaddix) 's Twitter Profile Photo

Added some topics to the new course I’m building: Finding security workflows Security Prompt engineering Security Context engineering Prompt abstraction Security workflow glue - n8n, power automate, Atlassian, etc Mcp + fastapi design Benchmarking and evaluation Scaling

spaceraccoon | Eugene Lim (@spaceraccoonsec) 's Twitter Profile Photo

Heading to DEF CON?  On August 9 at 1pm - 2pm, I'll be signing copies of my new book "From Day Zero to Zero Day"!  I can't wait to see you all there! 📆 Add to your calendar now: hackertracker.app/event/?conf=DE…

Heading to <a href="/defcon/">DEF CON</a>? 

On August 9 at 1pm - 2pm, I'll be signing copies of my new book "From Day Zero to Zero Day"! 

I can't wait to see you all there!

📆 Add to your calendar now: hackertracker.app/event/?conf=DE…
Bug Bounty Village (@bugbountydefcon) 's Twitter Profile Photo

Don't miss "Referral Beware, Your Rewards Are Mine" by Whit Taylor (un1tycyb3r) on Saturday, August 9 at 03:00 PM inside the Creator Stage 5. Read more at bugbountydefcon.com/agenda #BugBounty #DEFCON33

Critical Thinking - Bug Bounty Podcast (@ctbbpodcast) 's Twitter Profile Photo

New Episode is out! (and what a crazy one too) — youtu.be/z9sCrHTl_rM Justin is joined by Mathias Karlsson to discuss vulns associated with archives. They talk about his new tool, Archive Alchemist, explore topics like the significance of Unicode paths, symlinks, and TAR.

Gunnar Andrews (@g0lden_infosec) 's Twitter Profile Photo

Wait a minute!!... Maybe the REAL goal of XBOW's marketing team is actually to get all the bug hunters arguing about whether it is legit or not, so it can keep finding MORE bugs (and climb the leaderboard), while the humans argue with each other instead of hunting🥸

spaceraccoon | Eugene Lim (@spaceraccoonsec) 's Twitter Profile Photo

I hacked an Optical Network Terminal (ONT)! This one was slightly more hardened than the usual ones, but thankfully hardware hacking expands your toolbox... spaceraccoon.dev/getting-shell-…

Critical Thinking - Bug Bounty Podcast (@ctbbpodcast) 's Twitter Profile Photo

Big news: the Hackalong team just got bigger! xssdoctor and Vitor Falcão "busfactor" are now part of the Hackalong crew with Justin Gardner From now on we’ll have 3 sessions per month on the CTBB Discord, each one hosted by a different team member.

Big news: the Hackalong team just got bigger!

<a href="/xssdoctor/">xssdoctor</a> and <a href="/busf4ctor/">Vitor Falcão "busfactor"</a> are now part of the Hackalong crew with <a href="/Rhynorater/">Justin Gardner</a>

From now on we’ll have 3 sessions per month on the CTBB Discord, each one hosted by a different team member.
Arcanum Information Security (@arcanuminfosec) 's Twitter Profile Photo

We are ONE WEEK away from Hacker Summer Camp 2025! Wanna know where the Arcanum team will be? Click on the image below to find out... AND Keep an eye out here for daily badge and swag drop announcements! #badgelife

We are ONE WEEK away from Hacker Summer Camp 2025!

Wanna know where the Arcanum team will be? Click on the image below to find out...

AND

Keep an eye out here for daily badge and swag drop announcements! #badgelife
Gunnar Andrews (@g0lden_infosec) 's Twitter Profile Photo

I've been working on client-side stuff. Trying to make a "roadmap" for topics relevant to hackers. Im finding it harder to focus in on what to deep dive / study. Of course, learning JS is first. But as someone who feels fairly comfy with JS, where to go next is confusing 🤷‍♂️