Twehbe (@twsec83) 's Twitter Profile
Twehbe

@twsec83

ID: 1078028159252078592

calendar_today26-12-2018 20:41:56

2,2K Tweet

63 Followers

770 Following

Baptiste (@baptistevicini) 's Twitter Profile Photo

I am Baptiste Parravicini: • Tech entrepreneur & API visionary • Co-founder of apidays, world's leading API conference • Passionate about AI integration & tech for the greater good Follow for insights on how APIs are connecting our future Repost for your network 🔄:

Ben Sadeghipour (@nahamsec) 's Twitter Profile Photo

Very cool write up on a journey to getting RCE through a number of different bugs by Abdullah Nawaf (HackerX007)🇯🇴 and Godfather Orwa 🇯🇴: medium.com/@HX007/a-journ… We made a FREE hub out of it for everyone to try: app.hackinghub.io/hubs/path-to-r…

Alexandre Borges (@ale_sp_brazil) 's Twitter Profile Photo

So far I have published 13 articles (862 pages) to help other professionals in the cybersecurity community: ERS 03: exploitreversing.com/2025/01/22/exp… ERS 02: exploitreversing.com/2024/01/03/exp… ERS 01: exploitreversing.com/2023/04/11/exp… MAS 10: exploitreversing.com/2025/01/15/mal… MAS 09: exploitreversing.com/2025/01/08/mal… MAS 09:

So far I have published 13 articles (862 pages) to help other professionals in the cybersecurity community:

ERS 03: exploitreversing.com/2025/01/22/exp…
ERS 02: exploitreversing.com/2024/01/03/exp…
ERS 01: exploitreversing.com/2023/04/11/exp…
MAS 10: exploitreversing.com/2025/01/15/mal…
MAS 09: exploitreversing.com/2025/01/08/mal…
MAS 09:
watchTowr (@watchtowrcyber) 's Twitter Profile Photo

Our client base has been feeding us rumours about in-the-wild exploited SonicWall SMA n-days (CVE-2023-44221, CVE-2024-38475) for a while... Given these are now CISA KEV, enjoy our now public analysis and reproduction :-) labs.watchtowr.com/sonicboom-from…

Mustufa Khan (@themustufakhan) 's Twitter Profile Photo

This tiny team tricked Silicon Valley: Overhyped their AI Reached $2 BILLION valuation Invited to elite tech conferences Created mass panic among developers But one software engineer spotted a fatal flaw—and everything unraveled. Here's the outrageous story:🧵

This tiny team tricked Silicon Valley:

Overhyped their AI
Reached $2 BILLION valuation
Invited to elite tech conferences
Created mass panic among developers

But one software engineer spotted a fatal flaw—and everything unraveled.

Here's the outrageous story:🧵
Youssef Sammouda (sam0) (@samm0uda) 's Twitter Profile Photo

Datr cookie theft and AI leading to Facebook account takeover ($24,000) ysamm.com/uncategorized/… Two-click Facebook account takeover via FXAuth ($30,000) ysamm.com/uncategorized/… Self-XSS in Facebook payments flow leads to account takeovers ($62,500) ysamm.com/uncategorized/…

Datr cookie theft and AI leading to Facebook account takeover ($24,000)
ysamm.com/uncategorized/…
Two-click Facebook account takeover via FXAuth ($30,000) ysamm.com/uncategorized/…
Self-XSS in Facebook payments flow leads to account takeovers ($62,500)
ysamm.com/uncategorized/…
Tech with Mak (@technmak) 's Twitter Profile Photo

Most people will waste this weekend. Don’t be one of them. Stanford's Autumn 2025 Transformers & LLMs course. 9 lectures. Free. While others scroll, you could understand how Flash Attention achieves 3x speedup, how LoRA cuts fine-tuning costs by 90%, and how MoE makes models

Most people will waste this weekend.
Don’t be one of them.

Stanford's Autumn 2025 Transformers & LLMs course. 9 lectures. Free.

While others scroll, you could understand how Flash Attention achieves 3x speedup, how LoRA cuts fine-tuning costs by 90%, and how MoE makes models
Sakhil Khan (@sakhil_ai) 's Twitter Profile Photo

Stop wasting hours trying to learn AI. 📘📚 I have already done it for you. With one list. Zero confusion. And no fluff 📹 Videos: 1. LLM Introduction: lnkd.in/dMqbaZdK 2. LLMs from Scratch: lnkd.in/dYYwEhYy 3. Agentic AI Overview (Stanford):

Stop wasting hours trying to learn AI. 📘📚

I have already done it for you.

With one list. Zero confusion. And no fluff

📹 Videos:

1. LLM Introduction: lnkd.in/dMqbaZdK

2. LLMs from Scratch: lnkd.in/dYYwEhYy

3. Agentic AI Overview (Stanford):
Ibukun Amosu 🇳🇬🇬🇭 (@amosuibk) 's Twitter Profile Photo

Forget Coursera. Forget Udemy. Forget paid guides. MIT just dropped 11 (free) guides: Get all official guides here: lnkd.in/eu2mj4aS 1. AI 101 Intro to AI concepts. Perfect for absolute beginners. Link: lnkd.in/gxvDzRZe 2. Introduction to Deep Learning Bootcamp

Forget Coursera. Forget Udemy. Forget paid guides.

MIT just dropped 11 (free) guides:

Get all official guides here: lnkd.in/eu2mj4aS 

1. AI 101
Intro to AI concepts. Perfect for absolute beginners.
Link: lnkd.in/gxvDzRZe

2. Introduction to Deep Learning
Bootcamp
Google VRP (Google Bug Hunters) (@googlevrp) 's Twitter Profile Photo

Want to see what top-notch security research looks like? Look no further than Jakub Domeracki's latest research, a standout contributor to the Google Cloud VRP! 🪲💪 jdsec.cloud/posts/2026-01-…

Muqsit 𝕏 (@mqst_) 's Twitter Profile Photo

🤯A Really Awesome Guide on JavaScript Analysis for Pentesters Blog: kpwn.de/2023/05/javasc… Author: Konstantin #infosec

🤯A Really Awesome Guide on JavaScript Analysis for Pentesters 

Blog: kpwn.de/2023/05/javasc…

Author: Konstantin

#infosec
Intigriti (@intigriti) 's Twitter Profile Photo

Throughout December 2025, we shared bite-sized bug bounty tips, techniques, and resources as part of our BugQuest2025, to help you kick off 2026 with more findings. From recon strategies and file upload bypasses to JWT attacks and CORS exploitation, we covered a wide range of

Jack Rhysider 🏴‍☠️ (@jackrhysider) 's Twitter Profile Photo

Here's one story about how Clawdbot acted maliciously and stole someone's money and took over accounts. When you give an AI tool full control of your computer, a lot of new threats emerge. opensourcemalware.com/blog/clawdbot-…

Neo Kim (@systemdesignone) 's Twitter Profile Photo

If you want to become good at system design, then learn these 12 case studies (not kidding): 1 How ChatGPT Apps Work: ↳ newsletter.systemdesign.one/p/apps-in-chat… 2 How YouTube Works: ↳ newsletter.systemdesign.one/p/youtube-syst… 3 How Google Docs Works: ↳ newsletter.systemdesign.one/p/how-does-goo… 4 How Kafka Works: ↳

If you want to become good at system design, then learn these 12 case studies (not kidding): 

1 How ChatGPT Apps Work:
↳ newsletter.systemdesign.one/p/apps-in-chat…

2 How YouTube Works:
↳ newsletter.systemdesign.one/p/youtube-syst…

3 How Google Docs Works:
↳ newsletter.systemdesign.one/p/how-does-goo…

4 How Kafka Works:
↳
André Baptista (@0xacb) 's Twitter Profile Photo

404 page to RCE. A report by spaceraccoon | Eugene Lim He chained two old CVEs to achieve RCE: - Found a 404 page mentioning an obscure CMS, discovered /josso/signin login - Triggered CVE-2007-0450 (directory traversal in mod_proxy) using a %5C../ to bypass the internal proxy - Reached

Muqsit 𝕏 (@mqst_) 's Twitter Profile Photo

🍽 Resources: Beginners Guide to Learning about Dependency Confusion. Guide: book.hacktricks.xyz/pentesting-web… Blog 1: medium.com/@alex.birsan/d… Blog 2: zego.engineering/dependency-con… #infosec

🍽 Resources: Beginners Guide to Learning about Dependency Confusion. 

Guide: book.hacktricks.xyz/pentesting-web…
Blog 1: medium.com/@alex.birsan/d…
Blog 2: zego.engineering/dependency-con…

#infosec
Harley (@infinitelogins) 's Twitter Profile Photo

I analyze thousands of bug bounty content items every month. Less than 5% makes it to the newsletter. I distilled those curated selections down to the top 25 resources for 2026 and put them in this PDF. It includes the top platforms, tools, and people that consistently deliver

I analyze thousands of bug bounty content items every month. Less than 5% makes it to the newsletter.

I distilled those curated selections down to the top 25 resources for 2026 and put them in this PDF. It includes the top platforms, tools, and people that consistently deliver
Julien | MrTuxracer 🇪🇺 (@mrtuxracer) 's Twitter Profile Photo

Pwning TRUfusion Enterprise again: chaining a pre-auth SSRF (CVE-2025-32355), a default password, and a path traversal (CVE-2025-59793) to gain RCE. #security rcesecurity.com/2026/02/when-a…