breno_css

130 posts

breno_css

breno_css

@breno_css

Katılım Nisan 2020
437 Takip Edilen137 Takipçiler
breno_css retweetledi
James Kettle
James Kettle@albinowax·
CVSS' Attack Complexity metric is the bane of bug bounty hunters: "you tried really hard to find that bug, so we'll pay you less".
James Kettle tweet media
English
18
17
318
26.2K
breno_css retweetledi
corvo
corvo@pqcorvo·
A comunidade de Bug Bounty Brasileira está fazendo um evento GRATUITO e trazendo gringo para palestrar. Você de São Paulo ou q pode está nessa data em SP simplesmente VÁ nesse evento. #Bolhasec Maiores detalhes aqui neste tweet.
Alex Moshkov@amoshkov

🟥 Positive Hack Talks → São Paulo 🇧🇷 Dec 10th, 2025 🗣️ Speakers — submit papers (flights/hotel covered). CFP link in thread 👇 💻 Cybersecurity community — join our most community-driven event. ➡️ phtalks.ptsecurity.com/saopaulo Free · 8 talks · limited spots #PHTalks

Português
0
7
69
6.2K
breno_css retweetledi
Mente Binária (ONG)
Mente Binária (ONG)@mentebinaria·
🚀 Orgulho nacional! 🇧🇷 Parabenizamos todos os envolvidos por essa conquista histórica! Vocês levaram o nome do Brasil ao topo e mostraram que nossa comunidade de CTF está cada vez mais forte e preparada para desafios globais! 🔗 Assista o vídeo em youtube.com/watch?v=5Yt3HG…
YouTube video
YouTube
Mente Binária (ONG) tweet media
Português
2
7
41
1.4K
breno_css retweetledi
bugcrowd
bugcrowd@Bugcrowd·
Where there’s bug bounty, there’s #Bugcrowd. 😉✨ We’re honored to have supported the @BugBountyBr at H2HC in #Brazil, big thanks to @bsysop! Seeing the hacker community come together with such passion was nothing short of amazing (as always). 🥲 Huge thanks to the organizers, sponsors, and everyone who joined—you made it unforgettable! 🎉💚
bugcrowd tweet mediabugcrowd tweet mediabugcrowd tweet mediabugcrowd tweet media
English
0
12
32
5.7K
breno_css retweetledi
OtterSec
OtterSec@osec_io·
NEW blog post: Netfilter Universal Root 1-day Our latest blog dives deep into the state of Linux kernel security and the open-source patch-gap, exploring how we monitored new bug fixes and achieved 0day-like capabilities by exploiting a 1-day vulnerability. Read more here →
0xTen@_0xTen

Earlier this year, I used a 1day to exploit the kernelCTF VRP LTS instance. I then used the same bug to write a universal exploit that worked against up-to-date mainstream distros for approximately 2 months. osec.io/blog/2024-11-2…

English
1
8
48
5.3K
breno_css retweetledi
Luan Herrera
Luan Herrera@lbherrera_·
Seeing that Pwn2Win isn't happening this year, here's an unreleased beginner-level XSS challenge I created for it (shouldn't be too difficult). lbherrera.me/challenge
English
3
13
47
4.9K
breno_css
breno_css@breno_css·
@jobertabma I think it's cool, but I would put this in a mutual-only (the first reporter can see the name of the person who took dup and the dup see the name of the first reporter) and also as an optional flag and only allow to be shared if both sides have this enabled(just like WhatsApp)
English
0
0
0
79
Jobert Abma
Jobert Abma@jobertabma·
Hackers, do you have any concerns if we’d show your username + collaborator usernames of your report when someone submits a duplicate? Today we’re only showing severity and submission timestamp.
SergioΩhm@SergioFrami

@archyxsec @jobertabma I’m lately thinking that allowing a hacker to know who was the first in report the issue allows a discussion among hackers that can really help in less mediation cases open, as I could know first hand by another researcher if we have reported the same.

English
40
4
96
23.4K
breno_css retweetledi
HackerOne
HackerOne@Hacker0x01·
The results are in!🥇 Congratulations to these 32 teams who will move on to the Group Round of the 2024 #AmbassadorWorldCup! 🙌 The next round kicks off at the end of August! Stay tuned for the latest info, and read more about the AWC here. bit.ly/3SwGbkV
HackerOne tweet media
English
44
53
303
186.2K
breno_css retweetledi
Luan Herrera
Luan Herrera@lbherrera_·
Decided to give my childhood game a try now that they relaunched Habbo's 2005 version back again, oops! (It was already reported and fixed).
English
9
13
201
47.2K
breno_css retweetledi
Luan Herrera
Luan Herrera@lbherrera_·
"Additionally we set Attack Complexity to High because the attack depends on the victim being authenticated in their default browser" - Shopify
English
6
2
46
7.4K
breno_css retweetledi
cloud
cloud@cloud11665·
casual CSS injection on github using the math mode
cloud tweet media
English
158
398
5.8K
802.3K