Daniel Púa | @[email protected]
@devploit
Head of Security @Freepik · CTF Player 🇪🇸 (@ripp3rsCTF / SFPE) · @hackandbeers Málaga Organizer · Sharing real-world infosec, no hype. Opinions my own.
You might like
DEFCON Quals 2025 - Memory Bank CTF Challenge Writeup - devploit blog.0xdev.eu/posts/defcon-q…
rep+: A Lightweight Alternative to Burp Suite for Quick Browser Testing bscript.substack.com/p/rep-a-lightw…
A security-first MCP server empowering AI agents to orchestrate Ghidra, Radare2, and YARA for automated reverse engineering. github.com/sjkim1127/Reve…
i just Updated my XSS article: added some cleaner, more effective one-liners and integrated DalFox one-liners that support extra options. Check it out. infosecwriteups.com/find-xss-vulne…
I started learning some cheat/anticheat stuff some time ago and wrote some rust code that might be interesting,so today I am making it public uwudrv:A Windows kernel driver + bootkit to support usermode processes trying to read/write other processes memory github.com/segura2010/uwu…
Successfully adding an entire feature with a single prompt feels like a getting a headshot in counterstrike. Got a nice update to Turbo Intruder coming soon!
It's been great to see people 'enjoying' the 0CL @WebSecAcademy lab! Tune in this Friday at 11AM PT to watch me livestream the solution with @offby1security - registration link below 👇
Tildar a @Cloudflare de pirata, con o sin comillas, es una vergüenza. @el_pais debéis corregir ese despropósito
ActiveScan++ can now detect multiple advanced unicode exploits just dropped at #BHUSA including confusables, codepoint overflows, case-conversion and combining diacritics! Thanks to researchers @ryancbarnett & @4ng3lhacker for contributing this awesome update.
We should split programming courses in two. In one of them you learn to code and it’s forbidden to use AI. In the other one you have to build an ambicious project in a way that guarantees that you use AI. We need people who know how to code and people who know how to build
the more ambitious you are, the harder it is to feel proud of anything you’ve done
The "S" in Vibe Coding stands for Security.
There seem to be two types of engineers. Those who want to solve the problem and those who want to understand the problem. What type are you?
Active Scan++ just got sharper - we’ve added new checks for OS command injection, powered by our latest ASCII Control Characters research. Install via Extensions -> BApp Store
Super excited to share reconftw_ai 🎉 A new tool that reads reconftw results and uses a local LLM (Ollama) to generate actionable reports: bughunter, executive, or brief. It’s lightweight, fast, and helps turn raw recon into insights. Give it a spin! github.com/six2dez/reconf…
United States Trends
- 1. Giannis 55.5K posts
- 2. Tosin 62.7K posts
- 3. Spotify 1.53M posts
- 4. Leeds 95.6K posts
- 5. Bucks 35.9K posts
- 6. Maresca 48.4K posts
- 7. Milwaukee 16.8K posts
- 8. Danny Phantom 6,210 posts
- 9. #WhyIChime 1,953 posts
- 10. Mark Andrews 1,651 posts
- 11. Wirtz 34.8K posts
- 12. Isaiah Likely N/A
- 13. Sunderland 45K posts
- 14. Delap 17K posts
- 15. Purple 53.1K posts
- 16. Poison Ivy 1,680 posts
- 17. Steve Cropper N/A
- 18. Chiesa 12.3K posts
- 19. Jack Smith 38.2K posts
- 20. Cedric Mullins N/A
You might like
-
Alfonso Muñoz, Phd
@mindcrypt -
BitUp Alicante Ciberseguridad
@bitupalicante -
Honey_SEC
@Honey_SEC -
Eduardo Sánchez
@eduSatoe -
Sec/Admln Cybersecurity Conference
@secadm1n -
Antonio Sanz
@antoniosanzalc -
Raul Renales | EA4ITQ
@RaulRenales -
Nacho Brihuega
@n4xh4ck5 -
cr0hn
@ggdaniel -
Víctor García
@takito1812 -
Hackron
@Hackr0n -
Luis Vacas de Santos
@CyberVaca_ -
Cloureiro80
@cloureiro80 -
h-c0n
@h_c0n -
Joel GM
@JoelGMSec
Something went wrong.
Something went wrong.