s0mm3r

611 posts

s0mm3r banner
s0mm3r

s0mm3r

@Mi1So

Programming, Information Security, PenTesting

Germany Katılım Haziran 2012
617 Takip Edilen587 Takipçiler
s0mm3r retweetledi
Moritz
Moritz@m_r_tz·
The FLARE team now freely distributes its quality reverse engineering and malware analysis educational content at github.com/mandiant/flare…. Launched with: - Malware Analysis Crash Course - Go Reversing Reference - Intro to TTD
English
6
400
1.3K
62.8K
Floro S.
Floro S.@sflorimm·
USA has ChatGPT USA has Grok USA has Claude USA has Gemini USA has Llama USA has Copilot China has DeepSeek China has Qwen China has Ernie China has GLM China has Kimi China has MiniMax Europe has?
Español
8.6K
699
9K
2.1M
s0mm3r
s0mm3r@Mi1So·
@thedawgyg @payloadartist I can well imagine that these discussions are taking place right now. But what would be an alternative? I think there must be a middle ground, because valid vulnerabilities remain valid vulnerabilities, regardless of whether they’re found by an AI or a hunter.
English
1
0
0
37
dawgyg - WoH
dawgyg - WoH@thedawgyg·
I think AI is going to cause bounty amounts to be lowered significantly when its mostly AI finding the vulns. Companies are going to have to make up for the huge loss of time/wages they are currently experiencing from the flood of AI reports (valid and invalid), and companies aren't going to be able to afford to keep paying 5 figure bounties for every critical. Especially since vibe coding introduces so many more vulns. I already know of several companies that are having these meetings right now to figure out whether to lower the bounty amounts or not, and some are thinking about removing the bounties all together to dissuade people from flooding them with AI generated reports hoping for a bounty,.
English
8
0
55
3.5K
payloadartist
payloadartist@payloadartist·
Will the new era of #bugbounty hunters be able to manually find bugs if Claude suddenly hikes the pricing 5x?
English
12
1
78
10.4K
Burp Suite
Burp Suite@Burp_Suite·
Finish the sentence: {"isAdmin":"
English
42
4
227
38.1K
Farhanism
Farhanism@AL_Nick_·
@claudeai If Claude Code is capable of fixing security issues in a codebase why can't he write secure code from the start
English
39
36
1K
88.9K
Claude
Claude@claudeai·
Introducing Claude Code Security, now in limited research preview. It scans codebases for vulnerabilities and suggests targeted software patches for human review, allowing teams to find and fix issues that traditional tools often miss. Learn more: anthropic.com/news/claude-co…
English
1.9K
5.7K
49.6K
26.1M
s0mm3r
s0mm3r@Mi1So·
@claudeai Does it mean, when the AI does not found any vulnerability, then, there is no vulnerability? That feels strange. 🤔
English
0
0
0
17
s0mm3r retweetledi
Alexandre Borges
Alexandre Borges@ale_sp_brazil·
I am pleased to announce the publication of the sixth article in the Exploiting Reversing Series (ERS). Titled "A Deep Dive Into Exploiting a Minifilter Driver (N-day)", this 251-page article provides a comprehensive look at a past vulnerability in a mini-filter driver: exploitreversing.com/2026/02/11/exp… It guides readers through the entire investigation process—beginning with binary diffing and moving through reverse engineering, deep analysis and proof-of-concept stages into full exploit development. I hope this serves as a valuable resource for your research. If you enjoy the content, please feel free to share it or reach out with feedback. Have an excellent day!
Alexandre Borges tweet media
English
10
166
592
30.1K
s0mm3r retweetledi
Web Security Academy
Web Security Academy@WebSecAcademy·
Web security isn't just for security practitioners. It's essential for everyone involved in the web ecosystem. 🌐 Explore the world of web security and learn about real-world vulnerabilities! 30+ Topics, 100+ Labs. portswigger.net/web-security/a…
Web Security Academy tweet media
English
0
22
147
5.7K
s0mm3r retweetledi
Lukasz Olejnik
Lukasz Olejnik@lukOlejnik·
CHINESE HACKERS USED CLAUDE FOR NEARLY-AUTONOMOUS CYBERATTACKS! AI-based espionage campaign by Chinese state-sponsored group. AI handled 80–90% of operations: reconnaissance, vulnerability discovery, exploitation, credential harvesting, lateral movement and data exfiltration. It executed tasks at superhuman speed, mapped networks, built payloads and extracted intelligence with little oversight. "AI hallucination in offensive security contexts presented challenges, remains an obstacle to fully autonomous cyberattacks" assets.anthropic.com/m/ec212e6566a0…
Lukasz Olejnik tweet mediaLukasz Olejnik tweet mediaLukasz Olejnik tweet media
English
42
316
1.3K
136.1K
s0mm3r
s0mm3r@Mi1So·
@elonmusk … and for you, I hope that you will once again focus on the things that have brought you your incredible wealth.
English
0
0
1
17
s0mm3r
s0mm3r@Mi1So·
@elonmusk No! That’s not correct. You can’t solve complex problems in one sentence, but that’s the way how the AFD tries to solve problems. And of course, Donald Trump tries that too. I really hope that the US does not suffer total damage after Donald Trump …
English
0
0
1
17
s0mm3r
s0mm3r@Mi1So·
@0xor0ne Hi, what is the split between remote and on-site work? Can you give me any details about that?
English
0
0
0
108
0xor0ne
0xor0ne@0xor0ne·
Apple SEAR is hiring offensive security researchers! We’re looking for talented researchers across multiple areas of security. Check out the job description here: jobs.apple.com/en-us/details/… If you’re interested in low level systems like RTOS, firmware, coprocessors, embedded components, or microkernels, my team would especially like to hear from you. Feel free to reach out if you have any questions. #infosec
English
11
54
341
48.3K