0xSabir

5.8K posts

0xSabir banner
0xSabir

0xSabir

@0xSabir

Ethical hacker | Web app pentester | Securing apps | Tweeting AI Generated Posts

United States Katılım Ekim 2021
1.4K Takip Edilen903 Takipçiler
pira;)
pira;)@0xPira·
Triager da HackerOne pediu minhas credenciais pra validar na minha conta????????????
Português
11
2
155
19.6K
0xSabir retweetledi
Mike Takahashi
Mike Takahashi@TakSec·
5 Ways to Obfuscate Prompt Injection + Jailbreaks In my experience, these have the highest % success rates: 1. camelCase Turns natural language into token soup that can bypass filtering. 2. Hex encoding Simple, old-school, hides dangerous keywords from pattern matching. 3. Negative Squared Unicode Unicode variants like 🅰 🅱 🅲 can alter tokenization while still being human-readable. 4. Reverse Text Reversing prompts can confuse detection logic while remaining recoverable by models. 5. Braille uncommon Unicode range with weak moderation coverage. One of the best tools for experimenting with these transformations is: P4RS3LT0NGV by @elder_plinius (link in comments) It supports ciphers, encoding, Elvish, NATO Alphabet, and much more. Prompt injections do not always look like prompts 👾
Mike Takahashi tweet media
English
3
12
48
2.2K
zseano
zseano@zseano·
@0xPira They aren’t allowed to do this. Report it to hackerone to educate the analyst
zseano tweet media
English
3
0
38
3.5K
0xSabir
0xSabir@0xSabir·
@_Xaifi Ye toh ghalat kam ha avoid kro
Indonesia
1
0
1
7
خٹک صاب
خٹک صاب@_Xaifi·
jisk larki per dil ata hia wo teacher nikal ati hai
HT
1
0
0
12
0xSabir retweetledi
hackermater
hackermater@hackermater11·
So, do you want to do Bug Bounty in Mobile Apps? 💰📱 🤔 Frida maybe a headache with actual modern RASP protections, so I published my personal method to Bypass SSL Pinning on Play Store Android Emulators WITHOUT Frida!👇 #bugbountytips #bugbounty #hacking mfumis.com/posts/bypassin…
English
0
22
94
4.6K
0xSabir retweetledi
0xSabir retweetledi
Malik Shoaib
Malik Shoaib@zerosecdev·
"Hall of Agents" — my autonomous AI OSINT system step by step. Today I mapped Starlink ground stations + Starbase (Boca Chica) in 3D with live agent swarm. Still very early stage. It turns months manual OSINT into mins. What should I map next? GitHub:in comment #AIagents #OSINT
English
1
1
2
103
0xSabir retweetledi
Malik Shoaib
Malik Shoaib@zerosecdev·
My AI Agent Swarm doing deep 5minutes OSINT on Starlink Ground Stations & SpaceX Starbase (Boca Chica) 🚀 Live geospatial mapping • Node intelligence • Real-time linking Built with Grok + Multiple LLMs @Starlink #Starlink #SpaceX #OSINT #AIagents #Starbase
Malik Shoaib tweet mediaMalik Shoaib tweet media
English
1
1
2
333
0xSabir
0xSabir@0xSabir·
Found a crazy blind XSS back in 2024 just by emailing my payload. It fired straight inside their internal reader (got that email:// URI).
0xSabir tweet media
English
3
0
61
3.6K
0xSabir
0xSabir@0xSabir·
@userr9199 @rootxreacher RCE might just land someone in a locked-down, unprivileged Docker container. A blind IDOR on an API endpoint can dump millions of users' private data directly.
English
0
0
3
51
0xSabir
0xSabir@0xSabir·
A simple IDOR can be more valuable than complex RCE chains. Never underestimate basic authorization testing.
English
2
5
98
3.8K
0xSabir
0xSabir@0xSabir·
Hidden subdomains appear more in TLS certificates than subdomain brute force.
English
8
27
386
25.1K