0xc0ffee

@0xc0ffee_

student, security consultant, bug bounty hunter. ☕️💻

Montreal, Canada
Vrijeme pridruživanja: rujan 2011.

Tweetovi

Blokirali ste korisnika/cu @0xc0ffee_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xc0ffee_

  1. Prikvačeni tweet
    26. ožu 2019.

    My writeup for the H1-702 CTF! Had lots of fun on that one!

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    9. sij

    Hey :) If you want to know how you can get started in bug bounties, the first and most important step is learning how to use Google, because that'll be your main tool for your whole career.

    Poništi
  3. proslijedio/la je Tweet
    26. stu 2019.

    Had a fun week collabing with that lead to some cool SSRFs in a PDF generator. Looking forward to working with him again!

    Poništi
  4. 20. ruj 2019.
    Poništi
  5. proslijedio/la je Tweet
    8. kol 2019.

    Jonathan Birch is sharing tips on new Unicode normalization bugs (HostSplit/HostBond) he discovered. So many vulns found. He is encouraging folks to look around for more and showing how.

    Prikaži ovu nit
    Poništi
  6. 7. kol 2019.

    Touchdown, Vegas! Excited to meet everyone at the event 😄

    Poništi
  7. 25. srp 2019.

    In San Francisco w/ for the bug bash! Stoked to be here! 🔥👌

    Poništi
  8. proslijedio/la je Tweet
    7. lip 2019.

    Here are my slides for "Cache Me If You Can: Messing with Web Caching", presented & ! 🎉 Material includes: - Web Caching 101 - Web Cache Deception - Edge Side Include Injection - Web Cache Poisoning ...with real bugs showcased!

    Poništi
  9. 3. lip 2019.

    My writeup for the FacebookCTF "Secret Note Keeper" challenge. Thank you for this great event!

    Poništi
  10. 15. svi 2019.

    3 day BurpSuite Pro training given by at was excellent! Workflow improved heaps, learned a lot of neat tricks and ready to use them to find more bugs! Recommended!

    Poništi
  11. proslijedio/la je Tweet
    5. svi 2019.

    Just posted my writeup for INS'Hack 2019's "Bypasses Everywhere" XSS challenge - Bypassing CSP and Chrome's XSS auditor with Iframes -

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet

    AWS is not about paying for what you use, it’s about paying for what you forgot to turn off.

    Poništi
  13. proslijedio/la je Tweet
    10. tra 2019.

    “[CVE-2019–5418] Ruby on Rails Arbitrary File Content Disclosure Analysis| Victor Zhu” by Victor Zhu

    Poništi
  14. proslijedio/la je Tweet
    5. tra 2019.

    I just submitted my new tool, "BitLeaker" to the CFP system of USA 2019. BitLeaker can extract the Volume Master Key (VMK) of BitLocker from the TPM. I also prepared new and not-published feature for Black Hat USA. I hope I could present it! Stay tuned!

    Poništi
  15. proslijedio/la je Tweet

    The day belongs to , the Most Valuable Hacker 🏆 at ! Congrats to all our awardees and thanks for being an amazing partner!

    Poništi
  16. proslijedio/la je Tweet
    19. ožu 2019.

    Turbo Intruder can now trigger a callback per socket read, so you can extract and use response data before the response is fully delivered!

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    5. ožu 2019.

    If you ever wondered what it looks like when hackers find a cool bug.. here's a gif to explain it. (Featuring and )

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    19. sij 2019.
    Poništi
  19. 1. velj 2019.

    In January, I submitted 10 vulnerabilities to 4 programs on .

    Poništi
  20. proslijedio/la je Tweet
    22. pro 2018.

    nice write up from worth the read!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·