devvbankx

12.1K posts

devvbankx banner
devvbankx

devvbankx

@devs_lyfe

I post what I want. @grok Father | Student @WGU ‘28 Cybersecurity and Information Assurance.

Within เข้าร่วม Ağustos 2019
2.3K กำลังติดตาม1.1K ผู้ติดตาม
ทวีตที่ปักหมุด
devvbankx
devvbankx@devs_lyfe·
🔥$ whoami? Hey, I’m Devin (@devs_lyfe). I’m a dad first. A WGU Cybersecurity & Information Assurance student (class of ‘28). And deep down, a multipotentialite who just can’t stop ideating.My mind bounces between AI, security, information flows, code, and whatever random obsession lights me up — always stitching together dots that others miss. Quick note: “Devs” isn’t short for developer. It’s literally my name.I used to feel scattered. Now I’m learning to embrace this eclectic side of me as my strength.If you’re wired the same way, drop “MULTIPOTENTIALITE 📷 and tell me one wild idea you’re obsessed with right now. I’d genuinely love to hear it. 📷#Multipotentialite #EclecticMind🔥 What Am I?Hey, I’m Devin (@devs_lyfe
English
0
0
2
177
devvbankx
devvbankx@devs_lyfe·
@ahmtbrt07 @dump_tcp I’m still learning and improving, but I’m realizing I’m the exact same way. I think it’s the only way to find the one thing people miss
English
0
0
0
3
Ahmet Barut
Ahmet Barut@ahmtbrt07·
i'm not a dumb hacker, nor do I rely on scanners or just AI agents. I'm a manual hunter. I hack by reading and deeply analyzing API documentation, RFCs, and other system specification documents — like Google's Zanzibar. I previously hacked Tesla using my own unique methodology, and I believe I can achieve the same with Google now
English
2
1
2
93
trace37
trace37@trace37_labs·
It's Thursday... time for... WAF bypass of the week! Every major WAF — Cloudflare, AWS WAF, Akamai, Imperva — inspects the raw HTTP request body for attack signatures. Every JSON parser normalises escape sequences before handing data to the application. These two facts create a gap that’s been sitting in the JSON spec since 2006. The gap is one character: \/ labs.trace37.com/blog/json-esca…
trace37 tweet media
English
2
3
28
966
dawgyg - WoH
dawgyg - WoH@thedawgyg·
Bed time early tonight... 6am comes to fast when Ellys here and has to get up for school lol. Night all <3
English
3
0
18
871
devvbankx รีทวีตแล้ว
sin99xx
sin99xx@sin99xx·
I have some great research planned up for hunting apk bug bounty targets, I hope the research is unique nd not so well known🤪 See u soonnnnn after some triage
English
1
3
19
614
devvbankx รีทวีตแล้ว
conspiracybot
conspiracybot@conspiracyb0t·
Hypersonic weapons cannot be stopped!!
English
375
2.6K
18.5K
582.7K
dawgyg - WoH
dawgyg - WoH@thedawgyg·
3 weeks of complete radio silence since giving the Chrome team the RCE exploit... And people wonder why some choose to sell to exploit brokers instead lol
English
14
6
166
12.6K
devvbankx
devvbankx@devs_lyfe·
@infosec_fox code is being duplicated and the products are being stacked upon each other... there's a hoard in the market.. a space full of shit lol
English
0
0
0
38
INFOSEC F0X 🔥
INFOSEC F0X 🔥@infosec_fox·
Why is everyone vibe coding habbit trackers? So many habbit trackers.
English
12
1
11
946
devvbankx
devvbankx@devs_lyfe·
that for that price, nahhh. @CaidoIO's cool
dawgyg - WoH@thedawgyg

@PortSwigger is dead wrong for this one. Making a claim that allowing people to BYOK for AI does not do shit for your own AI policies, if anything it would make it easier for you to abide by them since you offload the responsibility to the user and not yourself. It may be time to start thinking of using something other than Burp if they are going to force you to use their shitty AI instead of something that works well.

English
0
0
0
30
devvbankx รีทวีตแล้ว
zack0x01
zack0x01@zack0x01_·
I see some vdp hackers , calling themselves:bug bounty hunters 😂 Where is the bounty!!
English
19
3
104
5.1K
devvbankx
devvbankx@devs_lyfe·
I only follow the Christ god placed in me. I believe in Jesus. He didn’t want a religion; but he taught of the spirit of god. All He is for you too brother. God bless. Christianity was corrupted from the start, but my Father In Heaven and all things remains straight and true. May our God bless us. Love you.
English
0
0
0
7
Alayyan
Alayyan@ihaveadreamanna·
@EthanLevins2 I have wondered for a long time how can Christians support their country when it is following satanic beliefs of domination and subjugation using mass murder and starvation? How can they support living unGodly lives?
English
1
0
2
91
Ethan Levins 🇺🇸
Ethan Levins 🇺🇸@EthanLevins2·
🚨 Israel is AGAIN spraying white phosphorus in Lebanon, which they have done for years against civilians. This causes cancer, birth defects, and an unlivable environment. They are preparing to ethnically cleanse southern Lebanon. This is an act of terrorism.
English
375
6.1K
11.5K
321.3K
devvbankx รีทวีตแล้ว
André Baptista
André Baptista@0xacb·
Super cool work by @s3bsrt HTTP trailers can be a blind spot. Proxies usually ignore them, but backend servers will happily merge them into the main headers, letting you sneak payloads right past security filters. Blog link 👇 sebsrt.xyz/blog/trailing-…
English
0
26
118
4.9K
devvbankx
devvbankx@devs_lyfe·
Thoughts?
devvbankx@devs_lyfe

I’m researching RSCs. ‘use server’ indicates server code that’s allowed in client side. the 'use server' directive marks server-side executable code (specifically Server Actions or Server Functions) that can be referenced and invoked from client-side code, without shipping the actual function body to the client. Server Components (the main RSC feature) are the default — no directive needed. They run exclusively on the server; their code never reaches the client bundle. The client receives only the rendered output (via the React Flight protocol — a streamed, serialized tree of JSON-like chunks representing elements, not code). • 'use server' is not for marking Server Components. It’s specifically for Server Actions (async functions that perform mutations or other server-side work). • These actions are allowed to be called from Client Components (marked with 'use client'), but the function implementation stays server-only. So more precisely: 'use server' indicates server-only functions that are callable (via RPC-like invocation) from client code. React/Next.js does not include the function’s source code in the client JS bundle. Instead: • During build (or dynamically), the framework replaces the imported function with a lightweight reference / proxy object. • This reference is typically a serialized identifier — often a string like a module ID + export name hash, or an encoded reference in the RSC payload format. • When invoked from the client: 1. React serializes arguments (must be JSON-serializable: primitives, objects, FormData, etc.; no functions, Dates need special handling, etc.). 2. Sends a POST request (usually to a special endpoint like /_next/actions/... in Next.js) with the reference ID + args. 3. Server receives it, looks up the real function by the ID, executes it, serializes the return value, and sends it back. 4. Client receives and resolves the promise. Just beginning. But I’m on to something

English
0
0
2
44
devvbankx
devvbankx@devs_lyfe·
For me, it would be understanding DAST, the scope in which this will be applied to, and ensuring effective dynamic control while maintaining a secure and stable solution. Choosing the right models, comparing benchmarks. Orchestration must be efficient and it only works like that with a great maestro.
English
0
0
1
11
SecInterviewHub
SecInterviewHub@sec_hub93028·
Interview Question 551: Your task is to combine AI/LLM based techniques with Dynamic Application Security Testing (DAST). What is your strategy/approach for getting the most effective results?
English
2
0
3
152