Daniel Púa

3K posts

Daniel Púa banner
Daniel Púa

Daniel Púa

@devploit

Head of Security @Freepik · CTF Player 🇪🇸 (@ripp3rsCTF / SFPE) · @hackandbeers Málaga Organizer · Real-world infosec, no hype. Opinions my own.

Málaga, Spain انضم Nisan 2016
875 يتبع2.9K المتابعون
Daniel Púa أُعيد تغريده
Nate
Nate@nnwakelam·
geohot.github.io//blog/jekyll/u… This is a really good read. I like how this guy brings a lot of what he speaks on back to this idea of “creating more value than you consume”.
English
6
37
212
27.8K
Daniel Púa أُعيد تغريده
slonser
slonser@slonser_·
I didn't really want to get involved in the discussion about the "death of CTF" because of AI. But the conversations on Twitter keep going, so I'll express my thoughts in this thread. For those too lazy to read — CTF will live on. For the rest, I suggest reading the thread below.
English
4
39
226
26.1K
Daniel Púa أُعيد تغريده
Hackviser
Hackviser@hackviserr·
Top FFUF Commands 🚀 Ready to fuzz faster? ffuf is the go-to tool for modern web reconnaissance, and this cheat sheet has the top commands you need. Uncover hidden directories, fuzz parameters, and discover subdomains with incredible speed. ⭐️ Save this post! It's a must-have for any web pentest or bug bounty hunt. 👇 What's your favorite wordlist for fuzzing? Share it below!
Hackviser tweet media
English
2
44
167
5.5K
Daniel Púa أُعيد تغريده
LiveOverflow 🔴
LiveOverflow 🔴@LiveOverflow·
CTF for the post LLM era: deploy real up-to-date open source projects and put flag in /flag.txt
English
7
18
425
27.6K
Daniel Púa أُعيد تغريده
Intigriti
Intigriti@intigriti·
Hitting 403/401 errors during testing? 🧐 Nomore403 by @devploit is an advanced bypass tool that automates several different techniques to get past access restrictions, from header manipulation to HTTP method tampering! The tool also features auto-calibration, concurrent scanning, and customizable payloads! 😎 Check it out! 👇 🔗 github.com/devploit/nomor…
Intigriti tweet media
English
1
39
235
10.2K
Daniel Púa أُعيد تغريده
André Baptista
André Baptista@0xacb·
Tired of hitting 403 errors during your security testing?  NoMore403 by @devploit automates bypass techniques to get past those pesky restrictions.  Try it at 👇 github.com/devploit/nomor…
English
3
45
242
10.3K
Daniel Púa أُعيد تغريده
Tom Dörr
Tom Dörr@tom_doerr·
Captures Android network traffic without proxies or certificates github.com/ProxymanApp/at…
Tom Dörr tweet media
English
7
191
1.1K
62.5K
Daniel Púa أُعيد تغريده
Behi
Behi@Behi_Sec·
This is one of the most informative writeups I've come across on Prompt Injection: aikido.dev/blog/promptpwn…
English
2
57
297
16.1K
Daniel Púa أُعيد تغريده
Shakquraa | Cybersecurity
Shakquraa | Cybersecurity@shakquraa·
🐞If you hunt modern web apps, this guide is worth your time. A deep dive into Next.js security testing covering real attack surfaces — SSRF, XSS, CSTI/SSTI, cache issues, data leaks, and more — with a mindset tailored for bug hunters and pentesters. Frameworks evolve fast, and so do their flaws. Understanding how Next.js handles rendering, routing, APIs, and caching can open doors to impactful findings. Great work by @daoud_youssef — definitely adding this to my testing workflow. 🔥deepstrike.io/blog/nextjs-se… #BugBounty #AppSec #WebSecurity #Pentesting #NextJS #CyberSecurity #SecurityResearch
English
2
75
354
16.7K
Daniel Púa أُعيد تغريده
Melvyn • Builder
Melvyn • Builder@melvynx·
PRO Tips with Claude Code: The "deny" list overrides `bypassPermissions` So you can basically enable bypassPermissions and then deny every command you're afraid AI can do Simple and safe
Melvyn • Builder tweet media
English
37
62
955
115.1K
Daniel Púa أُعيد تغريده
mrinank
mrinank@MrinankSharma·
Today is my last day at Anthropic. I resigned. Here is the letter I shared with my colleagues, explaining my decision.
mrinank tweet mediamrinank tweet media
English
2.5K
5K
35.6K
15M
Daniel Púa أُعيد تغريده
Zack Korman
Zack Korman@ZackKorman·
New OpenClaw vulnerability: If you talk to your bot via iMessage, the allowlist might not protect you at all. Allowlist matches phone numbers, but many telecoms don’t enforce number ownership. On those networks, anyone can spoof an allowed number and message your bot.
Zack Korman tweet media
English
11
22
129
22.3K
Daniel Púa أُعيد تغريده
max
max@maxbittker·
racing Opus 4.6 against 4.5 to max out a Runescape account
English
233
247
5.1K
1.4M
Daniel Púa أُعيد تغريده
Filip Kowalski
Filip Kowalski@filippkowalski·
Codex is like a senior/architect engineer in their 40s who takes time to build something properly. Claude Code is like a senior engineer in their mid-20s, working for an SF startup, who's running on Red Bulls or occasionally cocaine and doesn't sleep much.
English
235
480
8K
547.9K