ch

511 posts

ch banner
ch

ch

@chybeta

open to bug bounty collaboration @HackenProof Security Researcher Just dm https://t.co/VVU1OV5yz6

Tham gia Ağustos 2017
4.7K Đang theo dõi14.3K Người theo dõi
Tweet ghim
ch
ch@chybeta·
19.4.13 - 24.4.13
ch tweet media
1
0
11
16.1K
ch đã retweet
Anthropic
Anthropic@AnthropicAI·
New on the Anthropic Engineering Blog: How we use a multi-agent harness to push Claude further in frontend design and long-running autonomous software engineering. Read more: anthropic.com/engineering/ha…
English
311
923
6.7K
1.7M
ch đã retweet
Y4tacker
Y4tacker@Y4tacker·
#CVE-2025-67303 ComfyUI-Manager Remote Code Execution 突然想起来我还有推特昨晚用我的Agent 10分钟分析的,之后的RCE就是CVE-2024-21574利用的复活
Y4tacker tweet mediaY4tacker tweet media
中文
2
7
84
9.8K
ch
ch@chybeta·
@pyn3rd - 这是靶场吧
中文
1
0
4
7.7K
pyn3rd
pyn3rd@pyn3rd·
#CVE-2025-55182: Remote Code Execution in React Server Components via a Unicode-based WAF bypass
pyn3rd tweet media
English
4
52
434
115.3K
ch
ch@chybeta·
“看看 etherscan都要收费”😂
Cos(余弦)😶‍🌫️@evilcos

万万没想到我们第一时间出手帮忙 Venus 大户 @KuanSun1990 跟进调查被盗事件,第一时间就给其指明了 Venus 风控必要性,风控后,然后我们协助他把被黑根本原因调查出来,他却在自己的群聊里全面诋毁我们“毫无作用,纯坑,看看 etherscan 都要收费,还有脸要赏金要致谢”。 现在的伦敦时间你 @KuanSun1990 可能还没醒,你醒了,来给个交代,否则我们会让大家知道什么是现实版的农夫与蛇,什么是两面三刀(你看看你和我私聊的嘴脸吧,你是如何诋毁其他帮你的角色的)。就你这样的人,以后谁还敢出手帮你。 本来我已经和你说了这次可以不要赏金,既然你如此踩我们(但这几天推文又都又在公开致谢我们…包括你历史上第一次被盗,你写的真的是声泪俱下,感动了很多人,包括我),这次的赏金我肯定要,你受益于我们,为什么我不能要赏金?我给谁做公益,也不可能给你这种人做公益。

中文
0
0
5
4K
ch
ch@chybeta·
@maru_49940 橘,a9了还这么努力
中文
0
0
1
604
小橘
小橘@maru_49940·
比较遗憾的是 $cards 没人赚到,昨晚发到2个群的时候120m,尴尬的是没什么人理我,就自己看了看报告研究了一下想着睡醒找位置买,没想到横了这么久睡醒就启动没给到上车机会。 说到底还是不相信自己,因为前段时间自己研究了nonos吃了rug亏了很多。不过 $cards 和 $nonos 不一样的是 $cards 是名牌创始人+名牌vc。 继续努力,我会慢慢变强。
0xNoNo🦇@0xNoNo_1

如果不是早上小橘老师 @maru_49940 发的 $cards 的投研,或许卖飞了 $huch 以后,我就算看到him喊单,也不会再买回来了,有人说我发早上的群聊截图装逼,我在评论him和群里研讨追高是同时,大概市值在5m左右,用手机太不方便了,我已经出本了,剩下的放着了。另外,如果真的想要装逼,其实我想说的是, $huch 我们群车300k🤣🤣🤣🤣

中文
17
2
41
23K
ch đã retweet
Sam Altman
Sam Altman@sama·
gpt-oss is out! we made an open model that performs at the level of o4-mini and runs on a high-end laptop (WTF!!) (and a smaller one that runs on a phone). super proud of the team; big triumph of technology.
English
1.6K
3.8K
45.3K
4.3M
ch đã retweet
dbugs
dbugs@ptdbugs·
1/4 dbugs LIVE dbugs.ptsecurity.com — vulnerabilities’ home See trends, discover more, read AI summaries, have all references at hand, and your profile with all your CVEs and CVSS score on a leaderboard. ⬇️ See thread: what’s live + what’s next ⬇️
dbugs tweet media
English
3
41
123
47.5K
ch đã retweet
l33tdawg
l33tdawg@l33tdawg·
After 9 months+ of cranking, cursing, and cursoring, and drawing on over 20 years experience running #HITB's Call for Papers, I bring you CFP Directory - a single system to make it easier for speakers to submit and organizers to connect and curate talks: cfp.directory
English
6
36
72
19.5K
Jobert Abma
Jobert Abma@jobertabma·
Hey hackers! We're running a beta for Hai for Hackers, our AI security agent. If you're interested, please reply with your HackerOne username (we will probably limit to ~100 hackers for now). After it's been enabled, you can start using it by clicking the Hai button in the top right corner of the app. It’s free to use (with a limited daily budget for now). It is like any other AI you’ve interacted with, with the added benefit that it has access to a whole bunch of HackerOne data, like reports and programs. We’re shipping improvements to Hai almost every day. Here are some neat use cases: - “take all the learnings from STÖK, jhaddix, and nahamsec's recon strategy and build one for me!” - “write a python script for a typical recon process” - “i need an XSS payload that doesn’t use single or double quotes” - “my XXE payload doesn't call back to my server, what could go wrong?” - “write a response for report #133337” The beta also comes with Hai Plays for you, which allows you to build your own security agents in HackerOne. You can create them at hackerone.com/settings/hai_p…. Some of the cool use cases we’ve seen so far are: - write reports with minimal input from you (efficiency++!) - convert reports into blogposts with a single prompt - AI mentor to give feedback about your communication and increase the likelihood of a reward In the background we’ve been working on agentic behavior, which we expect will soon come to Hai for Hackers as well. These AI agents can act like your hacking buddy and hack alongside you. We’ll keep you in the loop on our progress.
Jobert Abma tweet media
English
293
36
242
53.6K
ch đã retweet
Cos(余弦)😶‍🌫️
很好,这次我也是受害者了...被 @getAlby 偷走 0.00174788 BTC($191.96)。能偷是因为这是 Alby 的托管账号。我是很震惊的,因为这鬼协议我必然是不知情的... 我猜是不是会给我发邮件通知,果然 2025/5/1 给我发了个: Updates to our Terms of Service – Please Review 我在邮件正文底部发现了这个“偷窃协议”: An inactivity fee will apply to legacy Alby Accounts with a shared wallet created in 2023 or earlier, if there has been no account activity for 12 consecutive months. 然后我这笔 BTC 在 2025/5/26 被偷走了... 开眼界了...🤯😵‍💫😱
Cos(余弦)😶‍🌫️ tweet mediaCos(余弦)😶‍🌫️ tweet mediaCos(余弦)😶‍🌫️ tweet media
Cos(余弦)😶‍🌫️@evilcos

去中心化新定义:你的钱包不活跃,我就让钱离你而去了哦

中文
165
49
338
320.7K
Lam
Lam@LamIsRealGoat·
@diamondhandjs 现在回去还真找不到工作了🥲
中文
2
0
4
2.9K
小橘
小橘@maru_49940·
自从少用名牌地址后,浇起来再也没有压力了🫤
中文
2
0
6
1.1K
ch
ch@chybeta·
ch tweet media
ZXX
1
0
53
4.3K
ch
ch@chybeta·
@ParamJani21 My case is just a special case In most cases, it is difficult to chain the two
English
2
0
2
585
Param Jani
Param Jani@ParamJani21·
@chybeta Guide me please...I found SSRF but not know How to chain it to cache poisoning...! Please assist me...!
English
1
0
1
581
ch
ch@chybeta·
SSRF + Cache Poisoning + Stored XSS = Account Takeover
ch tweet media
English
13
12
338
18.4K
小橘
小橘@maru_49940·
how to earn 1000u per day except pvp cause pvp is tired🥲
English
2
0
3
1.1K