ahsentekd's profile picture. security software engineer

Ahsen

@ahsentekd

security software engineer

Ahsen 님이 재게시함

@ahsentekd dünyanın en güzel üçlüsü. #2012

numanturle's tweet image. @ahsentekd 
dünyanın en güzel üçlüsü.
#2012

Ahsen 님이 재게시함

CORNFLAKE.V3 malware spotted in an access-as-a-service operation using the ClickFix technique. 🥣 UNC5518 uses fake CAPTCHA pages for access, which UNC5774 then leverages to deploy the CORNFLAKE.V3. Learn more: bit.ly/4mZ64a3

Mandiant's tweet image. CORNFLAKE.V3 malware spotted in an access-as-a-service operation using the ClickFix technique. 🥣

UNC5518 uses fake CAPTCHA pages for access, which UNC5774 then leverages to deploy the CORNFLAKE.V3.

Learn more: bit.ly/4mZ64a3

Ahsen 님이 재게시함

TTMO Meetup 6'dan kareler... Sunumları için Celil Ünüver(@celilunuver), Utku Çorbacı(@rhotav), Yusuf İşlek(@_nnaci) ve Ahsen Tekdemir'e(@ahsentekd); güzel katılım için TTMO üyelerine çok teşekkürler. Sponsorlarımız: Forestall, Secrove ve Hexflow

__TTMO__'s tweet image. TTMO Meetup 6'dan kareler...

Sunumları için Celil Ünüver(@celilunuver), Utku Çorbacı(@rhotav), Yusuf İşlek(@_nnaci) ve Ahsen Tekdemir'e(@ahsentekd); güzel katılım için TTMO üyelerine çok teşekkürler. 

Sponsorlarımız: Forestall, Secrove ve Hexflow
__TTMO__'s tweet image. TTMO Meetup 6'dan kareler...

Sunumları için Celil Ünüver(@celilunuver), Utku Çorbacı(@rhotav), Yusuf İşlek(@_nnaci) ve Ahsen Tekdemir'e(@ahsentekd); güzel katılım için TTMO üyelerine çok teşekkürler. 

Sponsorlarımız: Forestall, Secrove ve Hexflow
__TTMO__'s tweet image. TTMO Meetup 6'dan kareler...

Sunumları için Celil Ünüver(@celilunuver), Utku Çorbacı(@rhotav), Yusuf İşlek(@_nnaci) ve Ahsen Tekdemir'e(@ahsentekd); güzel katılım için TTMO üyelerine çok teşekkürler. 

Sponsorlarımız: Forestall, Secrove ve Hexflow
__TTMO__'s tweet image. TTMO Meetup 6'dan kareler...

Sunumları için Celil Ünüver(@celilunuver), Utku Çorbacı(@rhotav), Yusuf İşlek(@_nnaci) ve Ahsen Tekdemir'e(@ahsentekd); güzel katılım için TTMO üyelerine çok teşekkürler. 

Sponsorlarımız: Forestall, Secrove ve Hexflow

Ahsen 님이 재게시함

🔥 Tersine mühendisler, 6. toplantıya koşun! Yusuf İşlek, Ahsen Tekdemir, Celil Ünüver ve Utku Çorbacı ile, 16 Ağustos, İzmir'de. RT == MOV PC, 0x41414141414141

__TTMO__'s tweet image. 🔥 Tersine mühendisler, 6. toplantıya koşun!

Yusuf İşlek, Ahsen Tekdemir, Celil Ünüver ve Utku Çorbacı ile,

16 Ağustos, İzmir'de.

RT == MOV PC, 0x41414141414141

Ahsen 님이 재게시함

🚨 RubyGems & PyPI under attack: 🔸 60 fake RubyGems stole social media logins (275K+ downloads) 🔸 PyPI fakes hijacked crypto staking wallets Both hide credential-stealing code in legit-looking packages. Details → thehackernews.com/2025/08/rubyge…


Ahsen 님이 재게시함

New release of pytest-examples github.com/pydantic/pytes… now supports calling a function or coroutine within the example code. I'd love to rename the package so people can actually find and use it, but I can't think of a good name that's easier to search for.


Ahsen 님이 재게시함

LLMs as vulnerability hunters? Yup. Our Vulnhuntr tool from @ProtectAICorp uses Claude to scan Python code for 0days. 🤯 Check out the NoHat talk for the full story from @DanHMcInerney & @byt3bl33d3r. 👇 hubs.ly/Q02Xqxkv0

huntr_ai's tweet card. No Hat 2024 - M. Salvati & D. McInerney - LLMs for Vulnerability...

youtube.com

YouTube

No Hat 2024 - M. Salvati & D. McInerney - LLMs for Vulnerability...


Ahsen 님이 재게시함

Say hello to the Polyglot Payload. The complete payload for the XSS Polyglot Challengev2 is now available on the xss.report platform. Source: web.archive.org/web/2019061711… Thanks @filedescriptor and crlf #xss #polyglot #polyglotxss

XssReport's tweet image. Say hello to the Polyglot Payload.
The complete payload for the XSS Polyglot Challengev2 is now available on the xss.report platform. 

Source: web.archive.org/web/2019061711… 

Thanks @filedescriptor and crlf 
#xss #polyglot #polyglotxss

Ahsen 님이 재게시함

In collaboration with @rizasabuncu , we promptly identified and reported a vulnerability in iOS and macOS to Apple’s security team. This vulnerability had the potential to allow unauthorized access to user activities or browsing history, even when the device was in lockdown or…

numanturle's tweet image. In collaboration with @rizasabuncu , we promptly identified and reported a vulnerability in iOS and macOS to Apple’s security team. This vulnerability had the potential to allow unauthorized access to user activities or browsing history, even when the device was in lockdown or…

Ahsen 님이 재게시함

🐍💥Python 3.13.0 has been released! 🎉 This is the first version with 🧵experimental GIL-free mode, an experimental JIT compiler🔧, a slick new REPL 🖌️ and many new cool features! And it's faster, smarter, and more colorful than ever! 🚀 Get it here: python.org/downloads/rele…


Ahsen 님이 재게시함

Can your current tools cache 10,000 SBOMs transitive dependents in 30 seconds? Minefield can.


Ahsen 님이 재게시함

トルコのおじさんあまりにかっこよくてスケッチしてしまった 描いてみるとあらためてわかるんですけど姿勢の美しさがすごいわ

sakakir's tweet image. トルコのおじさんあまりにかっこよくてスケッチしてしまった 描いてみるとあらためてわかるんですけど姿勢の美しさがすごいわ

Ahsen 님이 재게시함

🚨Alert🚨CVE-2024-21413 Microsoft Outlook RCE Flaw POC Released 📊219.8K+ Services are found on the Hunter.how 🔗Hunter:hunter.how/list?searchVal… Dorks 👇👇👇 Hunter:product.name="Outlook Web App" FOFA: app="Microsoft-Outlook" Shodan:http.component:"outlook…


Ahsen 님이 재게시함

Safetest is a new UI testing library that combines Playwright, Jest/Vitest, and React for an E2E testing solution for applications and component testing. It works with multiple UI libraries and test runners and provides powerful reporting capabilities. netflixtechblog.com/introducing-sa…


Ahsen 님이 재게시함

If you are using form data, upgrade python-multipart to 0.0.7 as soon as possible to fix a ReDoS vulnerability. 🔒 If you install fastapi[all], just upgrade to 0.109.1 🤓 You can read more in the security advisory: github.com/tiangolo/fasta…


Ahsen 님이 재게시함

There's some new #Python syntax being debated in PEP 736 – Shorthand syntax for keyword arguments at invocation What do you think?

driscollis's tweet image. There's some new #Python syntax being debated in PEP 736 – Shorthand syntax for keyword arguments at invocation

What do you think?

Ahsen 님이 재게시함

GitLab CVE-2023-7028 POC user[email][][email protected]&user[email][][email protected] - PWNED


Loading...

Something went wrong.


Something went wrong.