LiveOverflow 🔴(@LiveOverflow) 's Twitter Profileg
LiveOverflow 🔴

@LiveOverflow

wannabe hacker... he/him

🌱 grow your hacking skills @hextreeio

ID:3094698976

linkhttps://www.youtube.com/LiveOverflow calendar_today18-03-2015 14:33:53

8,3K Tweets

141,0K Followers

1,2K Following

Gareth Heyes \u2028(@garethheyes) 's Twitter Profile Photo

Shazzer will now highlight the differences in behaviour between browsers. If one does something different it will be highlighted in red.

shazzer.co.uk/vectors/661643…

Shazzer will now highlight the differences in behaviour between browsers. If one does something different it will be highlighted in red. shazzer.co.uk/vectors/661643…
account_circle
Gareth Heyes \u2028(@garethheyes) 's Twitter Profile Photo

I've built a brand new version of my fuzzing tool Shazzer🚀

shazzer.co.uk

- Easy fuzz browser behaviour
- Find bugs
- Share the results with the world

account_circle
Calle Svensson(@ZetaTwo) 's Twitter Profile Photo

We have some nice challenges in store for you. Mark the calendar, gather the team, get ready!

Also remember that the best teams qualify for Hackceler8!

account_circle
Alisa Esage Шевченко(@alisaesage) 's Twitter Profile Photo

This. The problem with cybersecurity is that almost everything that is taught about it is based on high level abstractions generated by people who never found a single software vulnerability in their lives.

This is a problem because cyber offense works on a concrete level, and…

This. The problem with cybersecurity is that almost everything that is taught about it is based on high level abstractions generated by people who never found a single software vulnerability in their lives. This is a problem because cyber offense works on a concrete level, and…
account_circle
chompie(@chompie1337) 's Twitter Profile Photo

A lot of tradecraft being burned here. Generally, good backdoor OpSec means shipping the least code possible. Later on, deploy additional stages to the desired targets.

Not only bc you risk burning less, but because more code samples means more “DNA” left behind for attribution

account_circle
Gynvael Coldwind(@gynvael) 's Twitter Profile Photo

Hey folks, if you're looking for an amazing security engineer, check out jvoisin whom I had the pleasure to work with on a lot of cool projects at Google :)

> I don't have anything lined-up job-wise, so feel free to reach out if you're hiring.

Looks like an opportunity!

account_circle
blasty(@bl4sty) 's Twitter Profile Photo

whoever designed this stuff had to take a deep dive into openSSH(d) internals (and so did I for the past couple of days, oof) .. hats off, once again :)

account_circle
LiveOverflow 🔴(@LiveOverflow) 's Twitter Profile Photo

Im really annoyed by shitty cooking 🧑‍🍳 recipes with unnecessary text. Can anybody recommend a good iOS app? I am so annoyed I would pay.

account_circle
Louis Nyffenegger(@snyff) 's Twitter Profile Photo

Too many people fall into the traps of gamification or certification, focusing on the wrong objectives.

Your goal should be to learn, not to be at the top of the leaderboard or merely to pass an exam.

[1/2]

account_circle
James Kettle(@albinowax) 's Twitter Profile Photo

'I wasn't going to report it, I thought it was your laboratory but after my first analysis this seems real'

We've just disclosed a surprisingly simple directory traversal that 0xd0m7 found in our website for $5,000!
hackerone.com/reports/2424815

account_circle
LiveOverflow 🔴(@LiveOverflow) 's Twitter Profile Photo

Shoutout to Tim Perry and HTTP Toolkit. Incredible convenient to quickly configure a proxy for various programs - including browsers, shells and Android.

Also great writeup about the technical details of the android interception changes in Android 14 🙇‍♀️
httptoolkit.com/blog/android-1…

Shoutout to @pimterry and @HttpToolkit. Incredible convenient to quickly configure a proxy for various programs - including browsers, shells and Android. Also great writeup about the technical details of the android interception changes in Android 14 🙇‍♀️ httptoolkit.com/blog/android-1…
account_circle
stacksmashing(@ghidraninja) 's Twitter Profile Photo

I just learned that a vulnerability I found made it into the list of 'Notable magic numbers' in the Hexspeak Wikipedia article 😂

I just learned that a vulnerability I found made it into the list of 'Notable magic numbers' in the Hexspeak Wikipedia article 😂
account_circle
blasty(@bl4sty) 's Twitter Profile Photo

xz bd engineer 1: bro, we need a way to probe the address space to make sure we never SEGV sshd
xz bd engineer 2: we'll just do a pselect syscall with empty fd sets, a timeout of 1 nanosecond and the addr we want to probe is passed as the sigmask pointer, EFAULT means unmapped

xz bd engineer 1: bro, we need a way to probe the address space to make sure we never SEGV sshd xz bd engineer 2: we'll just do a pselect syscall with empty fd sets, a timeout of 1 nanosecond and the addr we want to probe is passed as the sigmask pointer, EFAULT means unmapped
account_circle