Patrik Grobshäuser

4.9K posts

Patrik Grobshäuser banner
Patrik Grobshäuser

Patrik Grobshäuser

@ITSecurityguard

Security Research @ Assetnote rɪsˈpɒnsəbl dɪsˈkləʊʒə https://t.co/VCPfgTLLBN https://t.co/qylqwXgc9I

Freiburg 가입일 Ocak 2013
295 팔로잉31.4K 팔로워
Patrik Grobshäuser
Patrik Grobshäuser@ITSecurityguard·
if you've ever had to decompile hundreds of JARs/DLL just to find the 38 that actually matter we built something for that 👀 Hyoketsu filters vendor dependencies out of your target before you even open your decompiler. 🪿 hash-matched against tens of millions of files. 👇
shubs@infosec_au

We got frustrated with dealing with vendor dependencies when reverse engineering large applications. @ITSecurityguard from @SLCyberSec’s Sec Research Team built Hyoktesu to solve this problem forever: github.com/assetnote/hyok… - releasing this today! Blog: slcyber.io/research-cente…

English
2
9
62
7.1K
Patrik Grobshäuser 리트윗함
Mo
Mo@atmoio·
AI is making CEOs delusional
Indonesia
989
2.6K
18.9K
2.7M
Bela Wiertz
Bela Wiertz@blwiertz·
Berlin, get ready for 50.000€ in Prizes @techeurope_ is back on 25 & 26 of April with Big Berlin Hack #2, bringing together >300 builders for a weekend 👇 Register Now
English
8
6
103
11.6K
Patrik Grobshäuser
Patrik Grobshäuser@ITSecurityguard·
There is an ongoing malware campaign for CVE-2026-20841 Repositories on Github, descriptions were updated ~1 hour ago with links to malware: SHA256 is 3200b7d6a42fc8d2bf213cd17b1bd6f0fc76c4f626330ec6fb0a3f9a0ef9e00e
Patrik Grobshäuser tweet mediaPatrik Grobshäuser tweet media
English
1
5
18
3K
Patrik Grobshäuser
Patrik Grobshäuser@ITSecurityguard·
@deadvolvo Interesting! My initial thought was to include all of them (~10,717), but I settled on the ones that are unredacted, were rewarded / are resolved.
English
1
0
6
992
d3d aka dead (dead, мёртв, 死了)
@ITSecurityguard Did that about a year back. Created a detailed RAG with all public reports. Didn't need a MCP for it, but I found back then it didn't add value like a detailed MDs would, but maybe things have changed since then?
English
1
0
5
1.2K
Patrik Grobshäuser
Patrik Grobshäuser@ITSecurityguard·
Added 3,600+ publicly disclosed HackerOne reports that paid a bounty to the MCP. 👇 github.com/PatrikFehrenba… This should help Claude to decide where to focus on, what attack surface was looked at before, and where new vulnerabilities could be 👀 (in theory 😏)
English
13
79
491
41.4K
Patrik Grobshäuser
Patrik Grobshäuser@ITSecurityguard·
@piquopiquo I am spending more time on improving the tooling vs. actually hunting for bugs. The next step is to ship a knowledge base with novel techniques so the AI gets a feeling of what I am after vs. what it thinks is a critical bug 😐
English
1
0
4
741
Piquo
Piquo@piquopiquo·
@ITSecurityguard How much did this help you in finding vectors? Thank you for this, Patrik!
English
1
0
0
1K
Patrik Grobshäuser
Patrik Grobshäuser@ITSecurityguard·
@0xw2w Not trolling! Just trying to figure out how BB- people actually work with AI. How much guidance is too much? Where's the line between getting results and getting results you wouldn't have found on your own?
English
1
0
0
127
Max Yaremchuk
Max Yaremchuk@0xw2w·
@ITSecurityguard Not sure if trolling but I'll reply. It imitates what I do by following methodology/decision tree. Oversimplified: an intelligent fuzzer lost by default, but we show it the way. Intelligence helps because otherwise you'd need millions of if statements to account for uniqueness
English
2
0
0
160
Max Yaremchuk
Max Yaremchuk@0xw2w·
I think we don’t thank infosec influencers enough for somehow persuading half the hacker community that AI can't find bugs. They are making sure there's minimal competition in the field of AI-assisted security testing. True MVPs
English
2
4
32
3.5K
Patrik Grobshäuser
Patrik Grobshäuser@ITSecurityguard·
@0xw2w Why aren't more people talking about this part? "proper plan, infra, context management, token efficiency, decision/fp tree" Is it the "secret sauce"? Is this enough to replace your entire Bug Bounty persona?
English
1
0
1
440
Max Yaremchuk
Max Yaremchuk@0xw2w·
Prompting “find all the bugs, make no mistakes” to a non-security-oriented agent without a proper plan, infra, context management, token efficiency, decision/fp tree, and materials is indeed a reliable signal that AI can’t hack
English
5
0
5
1K
Mashhood
Mashhood@Mashhood0x99·
However, I’m currently failing to exfiltrate any data. I also tried accessing 169.254.x.x metadata endpoints the server seems to attempt resolving them since the response takes 10+ seconds but I haven’t been able to retrieve any useful data yet.
English
1
0
2
357
Mashhood
Mashhood@Mashhood0x99·
Hi @TeslaTheGod @thedawgyg found SSRF in the app through an integration with an external service GitHub.Application takes a user controlled URL along with bearer token in the request, the backend makes a request to user-supplied URL My webhook gets hit, confirming SSRF. Any tips
English
5
1
28
4.5K
Patrik Grobshäuser
Patrik Grobshäuser@ITSecurityguard·
I didn't want to be the boomer that hates on AI so I actually tried it. Claude still sucks at finding bugs. But it's pretty good at remembering mine. h1-brain - MCP server that feeds it your full HackerOne history so it knows what you hacked, what you missed, and what paid off 🦆
Patrik Grobshäuser tweet media
English
4
2
61
8.8K
Patrik Grobshäuser
Patrik Grobshäuser@ITSecurityguard·
@HouranyIbrahim You can sync them without Claude, anonymize them or just share the skill that you used to find them with Claude
English
0
0
0
333
Ibrahim AH
Ibrahim AH@HouranyIbrahim·
@ITSecurityguard From my brief reading it looks cool, but is it safe to share my private reports with Claude? And do I need to get the green light from the company first before doing so? These questions came to my mind and I'd love to share them with you.
English
1
0
1
427
Patrik Grobshäuser
Patrik Grobshäuser@ITSecurityguard·
New series on using Claude for bug bounty 👀. sync your hackerone reports, cross-referencing past findings against new targets etc. The actual workflow, not the LinkedIn fantasy. Feedback from AI-maxers always welcome ❤️ clawd.it/posts/11-teach…
English
4
27
181
10K
Patrik Grobshäuser
Patrik Grobshäuser@ITSecurityguard·
@stokfredrik more files means more tokens burned on context before you even ask a question, I think the difficult part here is to get the right balance and only provide claude what is absolutely necessary.
English
1
0
1
249
Patrik Grobshäuser
Patrik Grobshäuser@ITSecurityguard·
@stokfredrik It's the same trick everywhere: context window stuffing. There's no actual persistent neural memory — you write things down in structured files, and the AI reads them at the start of each conversation. The fancier the file organization, the more "memory" it appears to have.
English
2
0
1
228
Patrik Grobshäuser
Patrik Grobshäuser@ITSecurityguard·
@stokfredrik Spoiler: So far, it hasn't found anything, wasn't creative, wasn't useful, wasted a ton of tokens and repeated things that we've ruled out before. It's a headstart for sure, but I don't see the magic yet
English
0
0
1
96
Patrik Grobshäuser
Patrik Grobshäuser@ITSecurityguard·
@stokfredrik Understood, the entire idea of the blog is to try out what people promise me will work 😃 I wanted to know if Claude gets useful when it can read your full HackerOne history. So I built an MCP server that syncs your reports to local database and wrote up how I actually use it.
English
3
0
7
1.2K