wtm@offensi.com

@wtm_offensi

Security researcher. My opinions are those of my employer.

The Netherlands
Joined June 2017

Tweets

You blocked @wtm_offensi

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @wtm_offensi

  1. Pinned Tweet
    17 Dec 2019

    I've received some great feedback after published a video about one of my Google Cloud Shell bugs. That's why i've decided to publish a series of posts on my blog: . Thanks to for a year filled with fun!

    Undo
  2. Retweeted

    2019 has been a record-breaking year on lots of fronts - thanks to you all! Keep up your awesome discoveries.

    Undo
  3. Retweeted
    12 Dec 2019

    We're looking to hire a web vulnerability researcher to join and I on the research team, and share their knowledge with the community via

    Undo
  4. Retweeted

    Today’s episode is about a typical race condition with file paths. Haxember #18 File Path Race Condition & How To Prevent It

    Undo
  5. Retweeted
    10 Dec 2019

    Because Squid maintainers and the Internet Bug Bounty are completely unresponsive, I've decided to publish the patch for the Squid remote buffer overflow, so people can patch ahead of an official release, whenever that may happen.

    Undo
  6. Retweeted

    CTF players, bug hunters and students descended onto London to play, hack and learn. Congrats to for winning - again! :)

    Show this thread
    Undo
  7. Retweeted
    19 Nov 2019

    I presented about Site Isolation in Google's event called 🙂 / "The world of Site Isolation and compromised renderer" Slide: Video:

    Show this thread
    Undo
  8. Retweeted
    28 Oct 2019

    My team at Google is hiring for a threat intel role focused on crimeware and botnets. Some RE experience preferred, and willingness to relocate to Zurich (no remote, sorry). DM’s open!

    Undo
  9. Retweeted
    4 Oct 2019

    Another bug with no CVE attached that was/is being exploited in the wild. The bug was fixed in Feb 2018. Had there been a CVE maybe would have been prioritised correctly by OEMs

    Undo
  10. Retweeted
    1 Oct 2019

    Thanks for working with us :-). We are huge fans and hope we can do more of this in the future! 1/n

    Show this thread
    Undo
  11. 3 Oct 2019

    CTF-players wanted! See for details. This CTF challenge is an attempt to unite the skills of bounty hunters and CTF-players. Inspired by and

    Undo
  12. 2 Oct 2019

    2. I will post a binary online that i'm struggling with later today. Perhaps both worlds can collaborate if us bug bounty hunters create small CTF challenges out of the problems we run into.

    Undo
  13. 1 Oct 2019
    Undo
  14. Retweeted
    18 Sep 2019

    The security scanner engineering team is growing! If you have both, security and software engineering experience, and are interested in a full time position reach out to me via PM. The position is based in Zurich. Remote work is not possible. Please RT.

    Undo
  15. Retweeted

    lastpass: bypassing do_popupregister() leaks credentials from previous site

    Undo
  16. 5 Sep 2019
    Undo
  17. Retweeted

    133.7 days left before the end of 2019! Just enough to show some leet skills on the best vuln report for the 100k GCP Prize :)

    Undo
  18. Retweeted

    Security researchers: Get more money for bugs! We've updated our reward categories and amounts. Chrome OS and Play Store too!

    Undo
  19. Retweeted
    25 Jun 2019

    You should totally apply here if you want to help making the web a better place! Also Munich is a really great city!

    Undo
  20. 12 Jun 2019

    My hairline might be the result of digital composites as well

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·