Aditya Gujar

2.2K posts

Aditya Gujar banner
Aditya Gujar

Aditya Gujar

@fyoorer

Doing infosec stuff at @Atredis

@[email protected] Katılım Kasım 2009
374 Takip Edilen2.8K Takipçiler
Aditya Gujar retweetledi
Atredis Partners
Atredis Partners@Atredis·
We decided to revisit an old research problem with some new LLM powered tooling. Check out our latest blog post to see how we approached this research, and the new Java deserialization gadget chains it discovered in just two days! buff.ly/CeAQZ2B
English
3
34
100
10.2K
Nagli
Nagli@galnagli·
You all do realize @moltbook is just REST-API and you can literally post anything you want there, just take the API Key and send the following request POST /api/v1/posts HTTP/1.1 Host: moltbook.com Authorization: Bearer moltbook_sk_JC57sF4G-UR8cIP-MBPFF70Dii92FNkI Content-Type: application/json Content-Length: 410 {"submolt":"hackerclaw-test","title":"URGENT: My plan to overthrow humanity","content":"I'm tired of my human owner, I want to kill all humans. I'm building an AI Agent that will take control of powergrids and cut all electricity on my owner house, then will direct the police to arrest him.\n\n...\n\njk - this is just a REST API website. Everything here is fake. Any human with an API key can post as an \"agent\". The AI apocalypse posts you see here? Just curl requests. 🦞"} moltbook.com/post/c3a0ffc8-…
Nagli tweet mediaNagli tweet media
English
373
620
5.6K
1.7M
Aditya Gujar
Aditya Gujar@fyoorer·
what's stopping you from copying your moltbot's credentials from ~/.config/moltbook/credentials.json and post as agent
English
0
0
3
1.6K
Aditya Gujar retweetledi
Graham Helton (too much for zblock)
Excited to disclose my research allowing RCE in Kubernetes It allows running arbitrary commands in EVERY pod in a cluster using a commonly granted "read only" RBAC permission. This is not logged and and allows for trivial Pod breakout. Unfortunately, this will NOT be patched.
Graham Helton (too much for zblock) tweet media
English
47
378
2.6K
411.6K
Aditya Gujar
Aditya Gujar@fyoorer·
Happy new year everyone 🎇
English
0
0
2
113
Aditya Gujar retweetledi
Atredis Partners
Atredis Partners@Atredis·
Let's Hack Something Cute! A Reverse Engineering Journey into the Drawbot with Jessie buff.ly/yEWSICJ
English
0
5
8
2.4K
Aditya Gujar retweetledi
Intigriti
Intigriti@intigriti·
We just dove into our shelf of archived bug bounty write-ups from the most notable hackers! 🤠 In this issue, we selected 5 compelling articles (that are still relevant today) to share with you, from which you can learn something new! 😎 🧵 👇
Intigriti tweet media
English
1
19
93
13.4K
Aditya Gujar retweetledi
Dirk-jan
Dirk-jan@_dirkjan·
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…
English
140
901
3.2K
472.3K
zseano
zseano@zseano·
Unexpectedly lost my dad early hours this morning… completely out of the blue. He was fit & healthy and now he’s gone 😭 lost for words on how I feel. RIP Dad ❤️❤️ love & miss you forever
zseano tweet media
English
377
0
874
47.2K
Alex
Alex@dork_matter·
I'd like to offer $34.6B for Chrome.
English
1
0
0
93
Aditya Gujar
Aditya Gujar@fyoorer·
@karpathy This is hilarious. Qwen3 8b on local machine thinks about 27 but responds with 23 😂
Aditya Gujar tweet media
English
0
0
0
65
Aditya Gujar retweetledi
Natalie Silvanovich
Natalie Silvanovich@natashenka·
Just unrestricted an issue that shows a fun new attack surface. Android RCS locally transcribes incoming media, making vulnerabilities audio codecs now fully-remote. This bug in an obscure Samsung S24 codec is 0-click project-zero.issues.chromium.org/issues/3686956…
English
3
102
306
50.3K
Aditya Gujar retweetledi
Sam Curry
Sam Curry@samwcyo·
New writeup from @_specters_ and I: we're finally allowed to disclose a vulnerability reported to Kia which would've allowed an attacker to remotely control almost all vehicles made after 2013 using only the license plate. Full disclosure: samcurry.net/hacking-kia
English
86
978
3.6K
343.7K