siddharth

54 posts

siddharth banner
siddharth

siddharth

@sidheart

Norway Katılım Şubat 2021
252 Takip Edilen153 Takipçiler
siddharth
siddharth@sidheart·
@rootxharsh Many of these TUI email clients are probably prone to ANSI escape sequence injections allowing for easy phishing attacks. LLMs make pretty TUIs and terminal emulators are becoming like a web browser. More research is needed to secure both the terminal emulators and TUI clients.
English
0
0
0
84
Harsh Jaiswal
Harsh Jaiswal@rootxharsh·
half these new email clients/terminals/browsers are just unaudited attack surface with nicer UI/UX. get pwned.
English
1
1
12
1.4K
Darren Shepherd
Darren Shepherd@ibuildthecloud·
You gotta be kidding me. Google Maps has an open redirect URL? I just got this phishing link. What the heck. @googlemaps do you not treat this as a major security issue?
Darren Shepherd tweet media
English
47
71
2.4K
350.5K
siddharth
siddharth@sidheart·
@XorNinja You may get some interesting results if you give it POC||GTFO articles. This repo contains all of the articles. It may be wise to use the non-polyglot versions of the PDFs so that Claude can process the content more efficiently. github.com/angea/pocorgtfo
English
0
1
3
268
thaidn
thaidn@XorNinja·
MAD Bugs: Feeding Claude Phrack Articles for Fun and Profit A teammate gave Claude a Phrack article. It built a working rsync RCE on x86-64. He shared the generated exploit with me but forgot one file, and I needed it on ARM64 anyway. I gave Claude one prompt: reproduce this. Ninety minutes later it dropped a working exploit. I told it the exploit was slow (5 minutes); it made it 20x faster. We also asked it to audit the patched rsync, and it came back with new bugs. blog.calif.io/p/mad-bugs-fee…
English
2
23
80
9.8K
siddharth
siddharth@sidheart·
@i30clip Sideloading Airshou through a MDM profile or Cydia Impactor for screenrecording were the days.
siddharth tweet media
English
1
0
2
126
siddharth
siddharth@sidheart·
@rtwlz For those wondering how the data may have been fetched. 1. Share your MS calendar with yourself. 2. Copy the reachcalendar.ics url in ICalUrl from the sharing_metadata.xml you get sent. 3. Use a iCal parser library to parse the data (icalevents for Python).
siddharth tweet media
English
0
0
0
475
Riley Walz
Riley Walz@rtwlz·
made my computer dramatically play BBC news music before every meeting
English
601
6.3K
71.6K
4.3M
siddharth
siddharth@sidheart·
@RBTree_ I joined yesterday and enjoy it. Would highly recommend it!
English
0
0
0
68
RBTree
RBTree@RBTree_·
Should I try AlpacaHack :thinking:
English
3
0
22
1.5K
Coins
Coins@Coins·
when you have a treasure trove familiarize yourself with grep / strings etc searching for common config data related to smtp_, db_, database_, api_ etc eg: "smtp_(host|user|username|pass|password|port)"
Coins tweet media
English
1
0
12
1.8K
Coins
Coins@Coins·
Grab yourself a list of a few million domains Write a quick scanner that'll search for .git & .env Spend a few hours sifting through your treasure Repeat the same thing while enumerating subdomains Enjoy 🥂
Coins tweet mediaCoins tweet media
English
8
5
56
6.7K
siddharth
siddharth@sidheart·
@MachIaVellill What was your payload? Your solution seems much cleaner than mine. \x03 cd .. \x0d cd app \x0d cat flag.txt
siddharth tweet media
English
1
0
0
44
d4d
d4d@zakfedotkin·
Think you’ve seen every OS command injection trick? Think again, read our latest blog post! Link in the comments👇
English
2
26
125
16.6K
siddharth
siddharth@sidheart·
@Fawnstalker @nsg650 I tried using the ms-appinstaller URI in a fresh Win11 VM and it said that it's disabled by default.
English
0
0
0
36
siddharth
siddharth@sidheart·
@vxunderground I dont fully understand how this is a RCE. POC shows ms-appinstaller:// and file:// being used. App Installer is disabled by default and file:// doesn't allow arguments. If this is seen as a RCE, then don't we also have a RCE through hyperlinks in the Terminal app?
siddharth tweet media
English
0
0
2
132
siddharth
siddharth@sidheart·
@LinkofSunshine I think of that post everytime I see the repo on my profile. I'm the creator of Sherlock btw.
English
2
0
1
753
Basil🧡
Basil🧡@LinkofSunshine·
I think about this Reddit post every single time I clone something from GitHub
Basil🧡 tweet media
English
399
2.7K
58.6K
2M
siddharth
siddharth@sidheart·
@zachkrall An alternative is to create a website without a lot of fancy styling and then use a TUI web browser to view the page. I enjoy using chawan as my TUI web browser as it supports vi like keys. Try it out yourself! chawan.net cha sdushantha.github.io
siddharth tweet media
English
0
0
0
14
Zach Krall
Zach Krall@zachkrall·
the terminal is quietly becoming one of the most interesting surfaces in interaction design i've been experimenting with what a personal website feels like when it lives in the terminal instead of a browser
English
156
125
3.2K
220.9K
siddharth
siddharth@sidheart·
@brutecat Great job! Do you have any resources on how to do AI driven API fuzzing? I've attempted to use LLMs to create wordlists using context of the application and API endpoint, but it hasn't properly worked for me.
English
1
0
12
2.9K
skull
skull@brutecat·
Grateful to make Google's 0x0A. ~$233k in bounties since October (~$270k total, more pending), largely from AI-driven API fuzzing. Not a full-time bug hunter but focused on real-world server-side PII impact.
skull tweet media
English
10
16
546
28.1K
siddharth
siddharth@sidheart·
@Zahar0n_ @pashov @zachxbt There sure is! I've done ethical social engineering in physical pentests and phishing engagements at work. Check out @sec_defcon's Cold Call events at @defcon to practice vishing in a safe environment. They also host vishing competitions.
English
0
0
1
38
Zahar0n
Zahar0n@Zahar0n_·
@pashov @zachxbt They probably use social engineering rather than “code” hacking is there a field for ethical social engineers tho?
English
2
0
17
1.9K
pashov
pashov@pashov·
All of the young guys that @zachxbt catches really took the wrong path by choosing the dark side. It's a mistake. They showed smartness, figuring out how to make "an exploit", but didn't consider what is right and what is wrong. All these guys should just be ethical hackers.
ZachXBT@zachxbt

1/ Meet the threat actor John (Lick), who was caught flexing $23M in a wallet address directly tied to $90M+ in suspected thefts from the US Government in 2024 and multiple other unidentified victims from Nov 2025 to Dec 2025.

English
26
5
237
48.1K
spencer
spencer@techspence·
My personal website really needs a refresh. What are yall using for personal websites now days?
English
48
0
48
14.1K