Sreeram KL

2.1K posts

Sreeram KL banner
Sreeram KL

Sreeram KL

@kl_sree

Infosec enthusiast! | @googlevrp fan boy 😍 | CTF @thehackerscrew1 | Web Security

Republic of India Katılım Ocak 2018
922 Takip Edilen2.5K Takipçiler
Sreeram KL retweetledi
inspector-ambitious
inspector-ambitious@inspector_amb·
My first memory corruption report. Believe it or not, I didn't use AI to find the vulnerability or to write the exploit. I used it only to learn faster. Took me 5 months. It will be my last, starting new projects...
inspector-ambitious tweet media
English
45
61
2.3K
62K
Sreeram KL retweetledi
OmerAF
OmerAF@omer_asfu·
The takeaway: If you don't account for how your cloud provider handles resources internally, you aren't really in control of your data. Big thanks to the @GoogleVRP team for the quick patches. Read the full breakdown here: focalsecurity.io/blog/kicking-t…
English
1
10
26
1.5K
Sreeram KL retweetledi
NDevTK
NDevTK@ndevtk·
The first version of APIClient has been released chromewebstore.google.com/detail/api-sec… it supports API learning with key tracking based on usage and Google/Swagger discovery documents plus XSS finding also replacement for postLogger extension. It's not perfect, create GitHub issues :)
English
0
3
14
1.1K
Sreeram KL retweetledi
André Baptista
André Baptista@0xacb·
Race conditions in OAuth flows can still happen in custom implementations. Here's how to find it: During the token exchange, the server is supposed to treat an authorization code as single-use. If you race the token endpoint by sending parallel requests with the same code simultaneously, vulnerable implementations may issue multiple valid access tokens and some won't properly revoke all of them. Tools like Turbo Intruder or even a simple multi-threaded script sending concurrent requests to the callback URL with different tokens may trigger it. Further reading here: blog.avuln.com/article/4
English
7
38
257
14.5K
Sreeram KL retweetledi
Michael Dalton
Michael Dalton@michaeldaltonau·
I'm excited to finally publish the writeup for my first @GoogleVRP vulnerability, leaking phone numbers and other sensitive information of Google Support customers (rewarded with a $14k bounty). michaeldalton.au/posts/hacking-…
English
4
25
176
8K
Sreeram KL retweetledi
GMO Flatt Security Inc.
GMO Flatt Security Inc.@flatt_sec_en·
We've published a new blog post by RyotaK @ryotkak ! He exploited a directory deletion race condition in Google Cloud's Looker, leading to full RCE and K8s privilege escalation. Read the technical details here: flatt.tech/research/posts…
English
1
31
114
31.5K
Sreeram KL retweetledi
Lupin
Lupin@0xLupin·
WE DID IT ! WE RAISED $5.9M PRE-SEED 🥳🎉🎉
English
77
39
420
38.5K
Sreeram KL retweetledi
Xclow3n
Xclow3n@xclow3n·
Spent a week testing AI for vulnerability research. 14 confirmed bugs in 20 min on one target. 5% hit rate on a hardened one. Same AI, same setup. 4 approaches, what worked, what failed, why target selection matters more than model sophistication. xclow3n.github.io/post/7
Xclow3n tweet media
English
5
85
436
32.5K
Sreeram KL retweetledi
André Baptista
André Baptista@0xacb·
Fascinating account takeover chain discovered in Facebook mobile app by @samm0uda Multiple vulnerabilities combined: * Predictable random numbers * XSS in the JavaScript SDK * Frame protection bypass * Login CSRF One malicious link = full account compromise Meta paid a $66k bounty for this one. ysamm.com/uncategorized/…
English
2
19
167
7.5K
Sreeram KL retweetledi
Critical Thinking - Bug Bounty Podcast
If you're running AI agents for hacking/research (you should), one of the coolest tips we got from dawgyg is to make them log what failed too. Brain dump it every few minutes to a file, everything it tried, everything that didn't work. Without it, agents loop back into the same dead ends and you won't notice until you've wasted a ton of time. If the agent cracks something and you only see the result, you've got nothing for next time. Also: never let them delete files. For Chrome specifically, dawgyg only uses Gemini because it's the only model with enough context window to trace a code path across hundreds of files without losing state. RCA that used to take 1-2 hours manually now takes about 2 minutes with AI help.
English
1
16
159
8K
Sreeram KL retweetledi
Patrik Grobshäuser
Patrik Grobshäuser@ITSecurityguard·
Added 3,600+ publicly disclosed HackerOne reports that paid a bounty to the MCP. 👇 github.com/PatrikFehrenba… This should help Claude to decide where to focus on, what attack surface was looked at before, and where new vulnerabilities could be 👀 (in theory 😏)
English
12
78
491
43K
Sreeram KL retweetledi
Joseph Thacker
Joseph Thacker@rez0__·
alright guys, @Rhynorater made me do it. we break down everything you need to know about claude code skills for hacking in the episode that drops next week on the @ctbbpodcast. you're gonna love it.
English
21
18
316
18.2K
Sreeram KL retweetledi
Dhiraj
Dhiraj@RandomDhiraj·
Here’s my write-up on a code execution in Google Gemini CLI. @dhiraj_mishra/code-execution-in-google-gemini-4e5909ec167d" target="_blank" rel="nofollow noopener">medium.com/@dhiraj_mishra#infosec
Dhiraj tweet media
English
0
8
75
4K