Mantas Sabeckis

1.3K posts

Mantas Sabeckis banner
Mantas Sabeckis

Mantas Sabeckis

@ott3rly

Bug Bounty Hunger

https://ott3rly.com Katılım Kasım 2016
364 Takip Edilen5.7K Takipçiler
Mantas Sabeckis retweetledi
box turtle / shai-huturtle
box turtle / shai-huturtle@xploitrsturtle2·
Github knew for hours, they delayed telling you and they wont be honest in the future. what an amazing run, its been an honor to play around with the cats over the past few months. #teamPCP #github
box turtle / shai-huturtle tweet media
English
61
235
1.7K
262.8K
Mantas Sabeckis
Mantas Sabeckis@ott3rly·
AI Slop Report Programs DDoS Era
Lietuvių
0
0
0
282
Mantas Sabeckis retweetledi
Karthik
Karthik@karthikponna19·
POV : USING CLAUDE OPUS 4.7 TO JUST RENAME A VARIABLE
English
150
1.3K
21.6K
797.5K
Mantas Sabeckis retweetledi
Joseph Thacker
Joseph Thacker@rez0__·
I got a CVE for LFI in Adobe Magento! Back in Jan, the team at @AutonomousCyber's let me give them targets for their hackbot FUZZ-E to look at. It also found 2x zero days in Angular, which I'll post on later. With 1 run overnight, it found vulns in wildly hardened projects.
Joseph Thacker tweet media
English
9
16
215
10.7K
Mantas Sabeckis retweetledi
sui ☄️
sui ☄️@birdabo·
never deleting this app 💀 bro is gonna wake up with -$300k
sui ☄️ tweet media
English
218
959
34.1K
3.1M
TESS
TESS@ArmanSameer95·
5.5 > 4.7
2
0
9
1.1K
Mantas Sabeckis retweetledi
FuzzingLabs
FuzzingLabs@FuzzingLabs·
We got the email too. We had a working RCE on Oracle Autonomous AI Database ready to demonstrate live at #Pwn2Own Berlin next week. ZDI confirmed they're at maximum capacity and can't add extra contest days. AI is now generating offensive capability faster than the institutions built to process it can keep up. We'll be in Berlin May 14-16 regardless. The conversations there will be really interesting!
FuzzingLabs tweet media
International Cyber Digest@IntCyberDigest

‼️🚨 Pwn2Own Berlin 2026 just hit a wall. For the first time in 19-years, ZDI rejected dozens of working zero-day RCE submissions because organizers ran out of contest slots. Rejected hackers are now going public with PoC demos and direct vendor disclosures, breaking Pwn2Own's usual secrecy. ▪️ AI surfaces a massive wave of 0-day RCEs. ▪️ Submissions overwhelm ZDI past max capacity. ▪️ Slots run out. Researchers with working chains get rejected. ▪️ "Revenge disclosures" begin. ← we are here. Confirmed casualties so far: ▪️ @xchglabs : 86 vulnerabilities prepared (PyTorch, NVIDIA, Linux KVM, Oracle, Docker, Ollama, Chroma, LiteLLM, llama.cpp). All rejected. Now reporting directly to vendors with writeups dropping as patches land. ▪️ @ggwhyp : full-chain Firefox RCE on Windows. Rejected. Publicly demoed (HTML page → cmd.exe → calc.exe). Responsibly disclosed to Mozilla. ▪️ @yunsu_dev : working RCE chain, rejected. Submitting elsewhere. ▪️ @ryotkak : tried to register for 3+ weeks. ZDI confirmed "at maximum capacity, can't add extra contest days." Considered canceling flight and hotel. ▪️ @anzuukino2802 : Claude Code RCE PoC. Rejected. ▪️ @desckimh : 0-day RCEs in Ollama and LM Studio. Rejected. Reported impact: a community-estimated 150+ researchers tried to register. Accepted contestants are now being warned about collisions. Rejected vulnerabilities going to bug bounty programs may trigger pre-event patches that invalidate the work of those who got in. ZDI has not publicly addressed the capacity issue. The event still runs May 14-16 in Berlin.

English
3
36
241
44.4K
Mantas Sabeckis retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 Pwn2Own Berlin 2026 just hit a wall. For the first time in 19-years, ZDI rejected dozens of working zero-day RCE submissions because organizers ran out of contest slots. Rejected hackers are now going public with PoC demos and direct vendor disclosures, breaking Pwn2Own's usual secrecy. ▪️ AI surfaces a massive wave of 0-day RCEs. ▪️ Submissions overwhelm ZDI past max capacity. ▪️ Slots run out. Researchers with working chains get rejected. ▪️ "Revenge disclosures" begin. ← we are here. Confirmed casualties so far: ▪️ @xchglabs : 86 vulnerabilities prepared (PyTorch, NVIDIA, Linux KVM, Oracle, Docker, Ollama, Chroma, LiteLLM, llama.cpp). All rejected. Now reporting directly to vendors with writeups dropping as patches land. ▪️ @ggwhyp : full-chain Firefox RCE on Windows. Rejected. Publicly demoed (HTML page → cmd.exe → calc.exe). Responsibly disclosed to Mozilla. ▪️ @yunsu_dev : working RCE chain, rejected. Submitting elsewhere. ▪️ @ryotkak : tried to register for 3+ weeks. ZDI confirmed "at maximum capacity, can't add extra contest days." Considered canceling flight and hotel. ▪️ @anzuukino2802 : Claude Code RCE PoC. Rejected. ▪️ @desckimh : 0-day RCEs in Ollama and LM Studio. Rejected. Reported impact: a community-estimated 150+ researchers tried to register. Accepted contestants are now being warned about collisions. Rejected vulnerabilities going to bug bounty programs may trigger pre-event patches that invalidate the work of those who got in. ZDI has not publicly addressed the capacity issue. The event still runs May 14-16 in Berlin.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
31
385
1.5K
410.4K
Mantas Sabeckis
Mantas Sabeckis@ott3rly·
@guilnx Well different people will use it differently. Depends on your workflows. I dont have one solution for all, but can only point to right direction - try building your own ai framework and use /goal as short prompt to follow your framework workflows
English
0
0
0
13
Mantas Sabeckis
Mantas Sabeckis@ott3rly·
Left codex overnight + half day with /goal on. Still going. Reports ready to review. It still needs human, but I love the idea that its working while I am away
Mantas Sabeckis tweet media
English
2
0
19
1.3K
Mantas Sabeckis retweetledi
Tib3rius
Tib3rius@0xTib3rius·
You can now pay Anthropic for Claude Code, and use Claude Code to hack Anthropic, and get paid by Anthropic for bugs its own product finds in itself. We live in wild times.
Anthropic@AnthropicAI

Our security bug bounty program is now public on HackerOne. We've run the program privately within the security research community, and their findings have strengthened our products. Now anyone can report vulnerabilities and get rewarded. Read more: hackerone.com/anthropic

English
19
41
444
35.7K
Mantas Sabeckis retweetledi
Samay
Samay@Samaytwt·
Relax guys i got the solution.
Samay tweet media
English
72
8
259
10.1K
Mantas Sabeckis retweetledi
LonelySloth
LonelySloth@lonelysloth_sec·
Why does Anthropic need a Bug Bounty? Why not just point Mythos at their own stuff?
English
115
108
3.5K
147.4K
Mantas Sabeckis retweetledi
zseano
zseano@zseano·
Would not be surprised if AI testing becomes a new Hackerone platform standard that companies opt in or out of 🧐 Get caught using AI? Bye bye bounty. Interesting times ahead for the industry
zseano tweet media
English
18
12
222
15.1K