Twitter | Pretraživanje | |
wtm@offensi.com
Security researcher. My opinions are those of my employer.
45
Tweetovi
265
Pratim
1.389
Osobe koje vas prate
Tweetovi
wtm@offensi.com proslijedio/la je tweet
Google Vulnerability Reward Program (VRP) 30. sij
2019 has been a record-breaking year on lots of fronts - thanks to you all! Keep up your awesome discoveries.
Reply Retweet Označi sa "sviđa mi se"
wtm@offensi.com 25. sij
Odgovor korisniku/ci @epereiralopez
Congrats Ezequiel! Hope you have fun there
Reply Retweet Označi sa "sviđa mi se"
wtm@offensi.com proslijedio/la je tweet
James Kettle 12. pro
We're looking to hire a web vulnerability researcher to join and I on the research team, and share their knowledge with the community via
Reply Retweet Označi sa "sviđa mi se"
wtm@offensi.com proslijedio/la je tweet
LiveOverflow 🔴 18. pro
Today’s episode is about a typical race condition with file paths. Haxember #18 File Path Race Condition & How To Prevent It
Reply Retweet Označi sa "sviđa mi se"
wtm@offensi.com 17. pro
I've received some great feedback after published a video about one of my Google Cloud Shell bugs. That's why i've decided to publish a series of posts on my blog: . Thanks to for a year filled with fun!
Reply Retweet Označi sa "sviđa mi se"
wtm@offensi.com 11. pro
Odgovor korisniku/ci @GuidoVranken
You are a gentleman!
Reply Retweet Označi sa "sviđa mi se"
wtm@offensi.com proslijedio/la je tweet
Guido Vranken 10. pro
Because Squid maintainers and the Internet Bug Bounty are completely unresponsive, I've decided to publish the patch for the Squid remote buffer overflow, so people can patch ahead of an official release, whenever that may happen.
Reply Retweet Označi sa "sviđa mi se"
wtm@offensi.com 21. stu
Odgovor korisniku/ci @GoogleVRP @pastenctf
Thanks for the fun event !
Reply Retweet Označi sa "sviđa mi se"
wtm@offensi.com proslijedio/la je tweet
Google Vulnerability Reward Program (VRP) 21. stu
CTF players, bug hunters and students descended onto London to play, hack and learn. Congrats to for winning - again! :)
Reply Retweet Označi sa "sviđa mi se"
wtm@offensi.com proslijedio/la je tweet
Jun Kokatsu 19. stu
I presented about Site Isolation in Google's event called 🙂 / "The world of Site Isolation and compromised renderer" Slide: Video:
Reply Retweet Označi sa "sviđa mi se"
wtm@offensi.com proslijedio/la je tweet
Antti Tikkanen 28. lis
My team at Google is hiring for a threat intel role focused on crimeware and botnets. Some RE experience preferred, and willingness to relocate to Zurich (no remote, sorry). DM’s open!
Reply Retweet Označi sa "sviđa mi se"
wtm@offensi.com proslijedio/la je tweet
the_storm 4. lis
Another bug with no CVE attached that was/is being exploited in the wild. The bug was fixed in Feb 2018. Had there been a CVE maybe would have been prioritised correctly by OEMs
Reply Retweet Označi sa "sviđa mi se"
wtm@offensi.com proslijedio/la je tweet
Eduardo Vela 1. lis
Thanks for working with us :-). We are huge fans and hope we can do more of this in the future! 1/n
Reply Retweet Označi sa "sviđa mi se"
wtm@offensi.com 3. lis
Odgovor korisniku/ci @the_st0rm @LiveOverflow
Many thanks , it's online: Thoughts/comments are more than welcome!
Reply Retweet Označi sa "sviđa mi se"
wtm@offensi.com 3. lis
CTF-players wanted! See for details. This CTF challenge is an attempt to unite the skills of bounty hunters and CTF-players. Inspired by and
Reply Retweet Označi sa "sviđa mi se"
wtm@offensi.com 2. lis
2. I will post a binary online that i'm struggling with later today. Perhaps both worlds can collaborate if us bug bounty hunters create small CTF challenges out of the problems we run into.
Reply Retweet Označi sa "sviđa mi se"
wtm@offensi.com 2. lis
Odgovor korisniku/ci @the_st0rm @LiveOverflow
1. Thank you ! I have always admired CTF players for their massieve in depth knowledge of a specific area. Perhaps we can bring bounty hunters and CTF players together to pack a more powerful punch :)
Reply Retweet Označi sa "sviđa mi se"
wtm@offensi.com 2. lis
Odgovor korisniku/ci @TheHairyJ @sirdarckcat
Hey , thanks for the RT and positive words! I don't know the exact ratio of valid vs. invalid reports (perhaps can eleborate on that :)), i only know it's bad :) It would make work more fun for everyone involved if we could change that
Reply Retweet Označi sa "sviđa mi se"
wtm@offensi.com 1. lis
It was a pleasure working with you! Thanks and
Reply Retweet Označi sa "sviđa mi se"
wtm@offensi.com proslijedio/la je tweet
Sebastian Lekies 18. ruj
The security scanner engineering team is growing! If you have both, security and software engineering experience, and are interested in a full time position reach out to me via PM. The position is based in Zurich. Remote work is not possible. Please RT.
Reply Retweet Označi sa "sviđa mi se"