|
wtm@offensi.com
@
wtm_offensi
The Netherlands
|
|
Security researcher. My opinions are those of my employer.
|
|
|
45
Tweetovi
|
265
Pratim
|
1.389
Osobe koje vas prate
|
| Tweetovi |
| wtm@offensi.com proslijedio/la je tweet | ||
|
Google Vulnerability Reward Program (VRP)
@GoogleVRP
|
30. sij |
|
2019 has been a record-breaking year on lots of fronts - thanks to you all! Keep up your awesome discoveries.
security.googleblog.com/2020/01/vulner…
|
||
|
|
||
|
wtm@offensi.com
@wtm_offensi
|
25. sij |
|
Congrats Ezequiel! Hope you have fun there
|
||
|
|
||
| wtm@offensi.com proslijedio/la je tweet | ||
|
James Kettle
@albinowax
|
12. pro |
|
We're looking to hire a web vulnerability researcher to join @garethheyes and I on the @Burp_Suite research team, and share their knowledge with the community via @WebSecAcademy
portswigger.net/careers/web-vu…
|
||
|
|
||
| wtm@offensi.com proslijedio/la je tweet | ||
|
LiveOverflow 🔴
@LiveOverflow
|
18. pro |
|
Today’s episode is about a typical race condition with file paths.
Haxember #18
File Path Race Condition & How To Prevent It youtu.be/5g137gsB9Wk
|
||
|
|
||
|
wtm@offensi.com
@wtm_offensi
|
17. pro |
|
I've received some great feedback after @LiveOverflow published a video about one of my Google Cloud Shell bugs. That's why i've decided to publish a series of posts on my blog: offensi.com/2019/12/16/4-g…. Thanks to @GoogleVRP for a year filled with fun!
|
||
|
|
||
|
wtm@offensi.com
@wtm_offensi
|
11. pro |
|
You are a gentleman!
|
||
|
|
||
| wtm@offensi.com proslijedio/la je tweet | ||
|
Guido Vranken
@GuidoVranken
|
10. pro |
|
Because Squid maintainers and the Internet Bug Bounty are completely unresponsive, I've decided to publish the patch for the Squid remote buffer overflow, so people can patch ahead of an official release, whenever that may happen.
github.com/squid-cache/sq…
|
||
|
|
||
|
wtm@offensi.com
@wtm_offensi
|
21. stu |
|
Thanks for the fun event @GoogleVRP!
|
||
|
|
||
| wtm@offensi.com proslijedio/la je tweet | ||
|
Google Vulnerability Reward Program (VRP)
@GoogleVRP
|
21. stu |
|
CTF players, bug hunters and students descended onto London to play, hack and learn. Congrats to @pastenctf for winning - again! :) #googlectf #initg pic.twitter.com/9UyiFG7ngb
|
||
|
|
||
| wtm@offensi.com proslijedio/la je tweet | ||
|
Jun Kokatsu
@shhnjk
|
19. stu |
|
I presented about Site Isolation in Google's event called #bugSWAT🙂 / "The world of Site Isolation and compromised renderer"
Slide: speakerdeck.com/shhnjk/the-wor…
Video: youtu.be/ppW_soCb6wM
|
||
|
|
||
| wtm@offensi.com proslijedio/la je tweet | ||
|
Antti Tikkanen
@anttitikkanen
|
28. lis |
|
My team at Google is hiring for a threat intel role focused on crimeware and botnets. Some RE experience preferred, and willingness to relocate to Zurich (no remote, sorry). DM’s open!
|
||
|
|
||
| wtm@offensi.com proslijedio/la je tweet | ||
|
the_storm
@the_st0rm
|
4. lis |
|
Another bug with no CVE attached that was/is being exploited in the wild. The bug was fixed in Feb 2018. Had there been a CVE maybe would have been prioritised correctly by OEMs twitter.com/maddiestone/st…
|
||
|
|
||
| wtm@offensi.com proslijedio/la je tweet | ||
|
Eduardo Vela
@sirdarckcat
|
1. lis |
|
Thanks for working with us @LiveOverflow :-). We are huge fans and hope we can do more of this in the future! 1/n twitter.com/LiveOverflow/s…
|
||
|
|
||
|
wtm@offensi.com
@wtm_offensi
|
3. lis |
|
Many thanks @the_st0rm, it's online: github.com/offensi/CTF-ch… Thoughts/comments are more than welcome!
|
||
|
|
||
|
wtm@offensi.com
@wtm_offensi
|
3. lis |
|
CTF-players wanted! See github.com/offensi/CTF-ch… for details.
This CTF challenge is an attempt to unite the skills of bounty hunters and CTF-players. Inspired by @the_st0rm and @sirdarckcat #CTF #ctfplayer
|
||
|
|
||
|
wtm@offensi.com
@wtm_offensi
|
2. lis |
|
2. @the_st0rm @LiveOverflow
I will post a binary online that i'm struggling with later today. Perhaps both worlds can collaborate if us bug bounty hunters create small CTF challenges out of the problems we run into.
|
||
|
|
||
|
wtm@offensi.com
@wtm_offensi
|
2. lis |
|
1. Thank you @the_st0rm ! I have always admired CTF players for their massieve in depth knowledge of a specific area. Perhaps we can bring bounty hunters and CTF players together to pack a more powerful punch :)
|
||
|
|
||
|
wtm@offensi.com
@wtm_offensi
|
2. lis |
|
Hey @TheHairyJ, thanks for the RT and positive words! I don't know the exact ratio of valid vs. invalid reports (perhaps @sirdarckcat can eleborate on that :)), i only know it's bad :) It would make work more fun for everyone involved if we could change that
|
||
|
|
||
|
wtm@offensi.com
@wtm_offensi
|
1. lis |
|
|
||
|
|
||
| wtm@offensi.com proslijedio/la je tweet | ||
|
Sebastian Lekies
@slekies
|
18. ruj |
|
The security scanner engineering team @Google is growing! If you have both, security and software engineering experience, and are interested in a full time position reach out to me via PM. The position is based in Zurich. Remote work is not possible. Please RT.
|
||
|
|
||