Daniel Púa

3K posts

Daniel Púa banner
Daniel Púa

Daniel Púa

@devploit

Security Researcher · Head of Security @Freepik · CTF Player 🇪🇸 · @hackandbeers Málaga · Real-world infosec, no hype.

Málaga, Spain 加入时间 Nisan 2016
875 关注2.9K 粉丝
Daniel Púa 已转推
Yunus Emre Öztaş
Yunus Emre Öztaş@ynsmroztas·
On non-rooted devices, critical data should never be left openly in the `/shared_prefs` file; it should either be moved to a secure area or kept encrypted in a sandbox. Failure to do so can pose serious risks (especially for financial applications). For Android applications, I strongly recommend learning about Frida or hooking techniques. @intigriti #bugbountytip #bugbountytips #infosec #recon #android
Yunus Emre Öztaş tweet media
English
3
9
100
6.6K
Daniel Púa 已转推
Nate
Nate@nnwakelam·
geohot.github.io//blog/jekyll/u… This is a really good read. I like how this guy brings a lot of what he speaks on back to this idea of “creating more value than you consume”.
English
6
37
212
27.8K
Daniel Púa 已转推
slonser
slonser@slonser_·
I didn't really want to get involved in the discussion about the "death of CTF" because of AI. But the conversations on Twitter keep going, so I'll express my thoughts in this thread. For those too lazy to read — CTF will live on. For the rest, I suggest reading the thread below.
English
4
39
226
26.1K
Daniel Púa 已转推
Hackviser
Hackviser@hackviserr·
Top FFUF Commands 🚀 Ready to fuzz faster? ffuf is the go-to tool for modern web reconnaissance, and this cheat sheet has the top commands you need. Uncover hidden directories, fuzz parameters, and discover subdomains with incredible speed. ⭐️ Save this post! It's a must-have for any web pentest or bug bounty hunt. 👇 What's your favorite wordlist for fuzzing? Share it below!
Hackviser tweet media
English
2
44
167
5.5K
Daniel Púa 已转推
LiveOverflow 🔴
LiveOverflow 🔴@LiveOverflow·
CTF for the post LLM era: deploy real up-to-date open source projects and put flag in /flag.txt
English
7
18
425
27.7K
Daniel Púa 已转推
Intigriti
Intigriti@intigriti·
Hitting 403/401 errors during testing? 🧐 Nomore403 by @devploit is an advanced bypass tool that automates several different techniques to get past access restrictions, from header manipulation to HTTP method tampering! The tool also features auto-calibration, concurrent scanning, and customizable payloads! 😎 Check it out! 👇 🔗 github.com/devploit/nomor…
Intigriti tweet media
English
1
39
235
10.2K
Daniel Púa 已转推
André Baptista
André Baptista@0xacb·
Tired of hitting 403 errors during your security testing?  NoMore403 by @devploit automates bypass techniques to get past those pesky restrictions.  Try it at 👇 github.com/devploit/nomor…
English
3
45
242
10.3K
Daniel Púa 已转推
Behi
Behi@Behi_Sec·
This is one of the most informative writeups I've come across on Prompt Injection: aikido.dev/blog/promptpwn…
English
2
57
297
16.1K
Daniel Púa 已转推
Shakquraa | Cybersecurity
Shakquraa | Cybersecurity@shakquraa·
🐞If you hunt modern web apps, this guide is worth your time. A deep dive into Next.js security testing covering real attack surfaces — SSRF, XSS, CSTI/SSTI, cache issues, data leaks, and more — with a mindset tailored for bug hunters and pentesters. Frameworks evolve fast, and so do their flaws. Understanding how Next.js handles rendering, routing, APIs, and caching can open doors to impactful findings. Great work by @daoud_youssef — definitely adding this to my testing workflow. 🔥deepstrike.io/blog/nextjs-se… #BugBounty #AppSec #WebSecurity #Pentesting #NextJS #CyberSecurity #SecurityResearch
English
2
75
354
16.7K
Daniel Púa 已转推
Melvyn • Builder
Melvyn • Builder@melvynx·
PRO Tips with Claude Code: The "deny" list overrides `bypassPermissions` So you can basically enable bypassPermissions and then deny every command you're afraid AI can do Simple and safe
Melvyn • Builder tweet media
English
37
62
955
115.1K
Daniel Púa 已转推
mrinank
mrinank@MrinankSharma·
Today is my last day at Anthropic. I resigned. Here is the letter I shared with my colleagues, explaining my decision.
mrinank tweet mediamrinank tweet media
English
2.5K
5K
35.6K
15M
Daniel Púa 已转推
Zack Korman
Zack Korman@ZackKorman·
New OpenClaw vulnerability: If you talk to your bot via iMessage, the allowlist might not protect you at all. Allowlist matches phone numbers, but many telecoms don’t enforce number ownership. On those networks, anyone can spoof an allowed number and message your bot.
Zack Korman tweet media
English
11
22
129
22.3K
Daniel Púa 已转推
max
max@maxbittker·
racing Opus 4.6 against 4.5 to max out a Runescape account
English
233
247
5.1K
1.4M