adibou

173 posts

adibou

adibou

@adibousec

hacking things

Katılım Kasım 2022
480 Takip Edilen453 Takipçiler
adibou retweetledi
Max Yaremchuk
Max Yaremchuk@0xw2w·
We have a rare opportunity to observe a bold move by Xiaomi's bug bounty program. After several internal discussions and a meeting with the board of directors, a Chinese conglomerate finalized the increase in the low-severity bounty range from $1 to $1-$2.
Max Yaremchuk tweet media
English
19
32
654
40.3K
adibou retweetledi
GMO Flatt Security Inc.
GMO Flatt Security Inc.@flatt_sec_en·
We've published a new blog post by RyotaK @ryotkak ! He exploited a directory deletion race condition in Google Cloud's Looker, leading to full RCE and K8s privilege escalation. Read the technical details here: flatt.tech/research/posts…
English
1
29
109
29.2K
adibou retweetledi
Anthropic
Anthropic@AnthropicAI·
We partnered with Mozilla to test Claude's ability to find security vulnerabilities in Firefox. Opus 4.6 found 22 vulnerabilities in just two weeks. Of these, 14 were high-severity, representing a fifth of all high-severity bugs Mozilla remediated in 2025.
Anthropic tweet media
English
485
1.4K
15.1K
3.2M
adibou retweetledi
N0xi0us
N0xi0us@_N0xi0us_·
Today I discovered that scammers are poisoning Google AI Overviews to display malicious data. While searching for an airline support phone number, the AI-generated result surfaced a scam number operated by fraudsters. Don't be lazy and double check the results 🫡
N0xi0us tweet media
English
6
23
135
21.2K
adibou retweetledi
Critical Thinking - Bug Bounty Podcast
New research just dropped by @alien2exe on hijacking OAuth popups via predictable window. open() targets. The chain uses iframe name collision forcing the auth flow into a controlled context, eventually linking an attacker-controlled addon to leak workspace PII and config data lab.ctbb.show/research/can-a…
English
0
31
132
6.4K
adibou retweetledi
Starstrike AI
Starstrike AI@StarstrikeAI·
Data Exfiltration in Google Gemini via... phone call? Link in comments:
Starstrike AI tweet media
English
3
14
61
15.3K
adibou retweetledi
Kirill Firsov
Kirill Firsov@k_firsov·
@FearsOff @Cloudflare This write‑up tells the story of how traffic aimed at that certificate path could reach origins behind Cloudflare even when the rest of the application was blocked by customer rules. Enjoy the reading here fearsoff.org/research/cloud…
English
0
52
229
49.1K
adibou retweetledi
Yuval Avrahami
Yuval Avrahami@yuvalavra·
We hacked the AWS JavaScript SDK, a core library powering the entire @AWScloud ecosystem - including the AWS Console itself 🤯 How did we do it? Just two missing characters was all it took. This is the story of #CodeBreach 🧵👇
Yuval Avrahami tweet media
English
160
857
7.5K
1.3M
adibou retweetledi
RyotaK
RyotaK@ryotkak·
I wrote an article about 8 vulnerabilities in Claude Code that allowed me to bypass the permission model and execute arbitrary commands!
GMO Flatt Security Inc.@flatt_sec_en

We've published a new blog post by RyotaK @ryotkak He discovered 8 methods to bypass safety mechanisms in Claude Code, leading to arbitrary command execution. We recommend updating to v1.0.93 or later to fix this vulnerability (CVE-2025-66032). flatt.tech/research/posts…

English
7
31
251
24.3K
adibou retweetledi
adibou
adibou@adibousec·
onelifeitsworthanattempt.png
adibou tweet media
English
0
1
5
709
adibou retweetledi
Worty
Worty@_Worty·
Quite a long work to get the exploit working and the article ready, but here it is ! Our pre-auth RCE in Livewire v3 (CVE-2025-54068) with @_remsio_ is live ! Enjoy the read :)
Synacktiv@Synacktiv

🚨 RCE in #Livewire (CVE-2025-54068)! Our specialists uncovered a critical flaw allowing remote code execution without the APP_KEY, exploiting Livewire’s hydration mechanism + PHP’s loose typing. 🔗 Patch now! (v3.6.4+) synacktiv.com/en/publication…

English
8
22
124
18.9K
adibou retweetledi
Justin Skycak
Justin Skycak@justinskycak·
@livewithnoregrt Achieving your dreams is a race against time. Time forces convergence, and premature convergence kills dreams. This is hard to understand when you’re young, before you know the wrath of time or the meaning of convergence. It's typically understood in hindsight, and with regret.
English
2
41
441
20.2K
adibou retweetledi
watchTowr
watchTowr@watchtowrcyber·
Today, we’re releasing watchTowr Labs’ @chudyPB’s BlackHat .NET research, owning Barracuda, Ivanti and more solutions. Enjoy the read as Piotr explains a new .NET Framework primitive, used to achieve pre- and post-auth RCE on numerous enterprise appliances. labs.watchtowr.com/soapwn-pwning-…
English
3
108
370
87.3K
adibou retweetledi
Anthropic
Anthropic@AnthropicAI·
We believe this is the first documented case of a large-scale AI cyberattack executed without substantial human intervention. It has significant implications for cybersecurity in the age of AI agents. Read more: anthropic.com/news/disruptin…
English
331
2.5K
12K
7.7M
adibou retweetledi
Blaklis
Blaklis@Blaklis_·
Whoever that promises you their tool, their course or whatever will make you make big bucks is lying. Learn, work hard on your skills, understand the things. There is no other magic in the field. Don't listen those that are saying otherwise #bugbounty
English
4
17
177
7.9K
adibou retweetledi
Dirk-jan
Dirk-jan@_dirkjan·
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…
English
140
900
3.2K
471.5K
adibou retweetledi
Kévin GERVOT (Mizu)
Kévin GERVOT (Mizu)@kevin_mizu·
I'm happy to release a script gadgets wiki inspired by the work of @slekies, @kkotowicz, and @sirdarckcat in their Black Hat USA 2017 talk! 🔥 The goal is to provide quick access to gadgets that help bypass HTML sanitizers and CSPs 👇 gmsgadget.com 1/4
Kévin GERVOT (Mizu) tweet media
English
12
170
456
41.5K
adibou retweetledi
0x999 🇮🇱
0x999 🇮🇱@_0x999·
New blog post is up: How I leaked the IP addresses of Brave's Tor window and Chrome VPN extension users--plus, a new Popunder technique and connect-src CSP directive bypass. Read more @ 0x999.net/blog/leaking-i…
English
5
21
90
8.3K
adibou
adibou@adibousec·
@Geluchat gg! you gonna smash it, 100% ;)
English
0
0
1
217
Geluchat
Geluchat@Geluchat·
Today was my last day as a pentester at Bsecure, and it feels a bit surreal. After a three-year journey of hunting on the side, I’m finally ready to go all-in as a full-time bug bounty hunter. To celebrate this milestone, I've written an article sharing the full story. It’s a transparent look at the path that got me here: the wins, the lessons, the real financial numbers, and my honest advice for anyone considering this adventure. You can read all about my journey from pentester to full-time hunter here: gelu.chat/posts/from-pen…
Geluchat tweet media
English
29
71
372
33.7K