Ugur Cihan Koc
@uceka_
AdemOglu 🇹🇷 | PenetrationTester | EthicalHacker | BugBountyHunter | oswe | osce | oscp | oswp @cobalt_io @hacker0x01 @bugcrowd
ID: 552107652
http://www.uceka.com 12-04-2012 17:25:09
273 Tweet
804 Followers
1,1K Following
Yay, today was a good day, after reading JS files for 10 hours and with several chains I found an ATO without interaction bypassing the client and server side encryption mechanism. I recommend this article, it helped me a lot, the bug was triaged :). infosecwriteups.com/bypassing-asym…
Deobfuscating Android ARM64 strings with Ghidra: Emulating, Patching, and Automating #MobileSecurity #AndroidSecurity by Jeroen Beckers and NVISO Labs blog.nviso.eu/2024/01/15/deo…
We Hacked Google A.I. for $50,000 : landh.tech/blog/20240304-… credits Lupin Joseph Thacker Justin Gardner