devploit's profile picture. Head of Security @Freepik · CTF Player 🇪🇸 (@ripp3rsCTF / SFPE) · @hackandbeers Málaga Organizer · Sharing real-world infosec, no hype. Opinions my own.

Daniel Púa | @[email protected]

@devploit

Head of Security @Freepik · CTF Player 🇪🇸 (@ripp3rsCTF / SFPE) · @hackandbeers Málaga Organizer · Sharing real-world infosec, no hype. Opinions my own.

Pinned

DEFCON Quals 2025 - Memory Bank CTF Challenge Writeup - devploit blog.0xdev.eu/posts/defcon-q…


Daniel Púa | @[email protected] reposted

rep+: A Lightweight Alternative to Burp Suite for Quick Browser Testing bscript.substack.com/p/rep-a-lightw…


Daniel Púa | @[email protected] reposted

A security-first MCP server empowering AI agents to orchestrate Ghidra, Radare2, and YARA for automated reverse engineering. github.com/sjkim1127/Reve…


Daniel Púa | @[email protected] reposted

i just Updated my XSS article: added some cleaner, more effective one-liners and integrated DalFox one-liners that support extra options. Check it out. infosecwriteups.com/find-xss-vulne…


Daniel Púa | @[email protected] reposted

I started learning some cheat/anticheat stuff some time ago and wrote some rust code that might be interesting,so today I am making it public uwudrv:A Windows kernel driver + bootkit to support usermode processes trying to read/write other processes memory github.com/segura2010/uwu…


Daniel Púa | @[email protected] reposted

Successfully adding an entire feature with a single prompt feels like a getting a headshot in counterstrike. Got a nice update to Turbo Intruder coming soon!


Daniel Púa | @[email protected] reposted
h43z's tweet image.

Daniel Púa | @[email protected] reposted

Paper edition

pepeluxx's tweet image. Paper edition

Daniel Púa | @[email protected] reposted

It's been great to see people 'enjoying' the 0CL @WebSecAcademy lab! Tune in this Friday at 11AM PT to watch me livestream the solution with @offby1security - registration link below 👇

albinowax's tweet image. It's been great to see people 'enjoying' the 0CL @WebSecAcademy lab! Tune in this Friday at 11AM PT to watch me livestream the solution with @offby1security - registration link below 👇

Daniel Púa | @[email protected] reposted

Tildar a @Cloudflare de pirata, con o sin comillas, es una vergüenza. @el_pais debéis corregir ese despropósito


Daniel Púa | @[email protected] reposted

ActiveScan++ can now detect multiple advanced unicode exploits just dropped at #BHUSA including confusables, codepoint overflows, case-conversion and combining diacritics! Thanks to researchers @ryancbarnett & @4ng3lhacker for contributing this awesome update.

albinowax's tweet image. ActiveScan++ can now detect multiple advanced unicode exploits just dropped at #BHUSA including confusables, codepoint overflows, case-conversion and combining diacritics! Thanks to researchers @ryancbarnett  & @4ng3lhacker for contributing this awesome update.

Daniel Púa | @[email protected] reposted

We should split programming courses in two. In one of them you learn to code and it’s forbidden to use AI. In the other one you have to build an ambicious project in a way that guarantees that you use AI. We need people who know how to code and people who know how to build


Daniel Púa | @[email protected] reposted

the more ambitious you are, the harder it is to feel proud of anything you’ve done


Daniel Púa | @[email protected] reposted

The "S" in Vibe Coding stands for Security.


Daniel Púa | @[email protected] reposted

There seem to be two types of engineers. Those who want to solve the problem and those who want to understand the problem. What type are you?


Daniel Púa | @[email protected] reposted

i OnLy UsE yOu To DoWnLoAd ChRoMe


Daniel Púa | @[email protected] reposted
elhackernet's tweet image.

Daniel Púa | @[email protected] reposted

Active Scan++ just got sharper - we’ve added new checks for OS command injection, powered by our latest ASCII Control Characters research. Install via Extensions -> BApp Store

zakfedotkin's tweet image. Active Scan++ just got sharper - we’ve added new checks for OS command injection, powered by our latest ASCII Control Characters research. Install via Extensions -> BApp Store

Daniel Púa | @[email protected] reposted

Ese 48% no sabe convertir un Word a PDF.

LOL

wokebusters's tweet image. LOL


Daniel Púa | @[email protected] reposted
igor_os777's tweet image.

Daniel Púa | @[email protected] reposted

Super excited to share reconftw_ai 🎉 A new tool that reads reconftw results and uses a local LLM (Ollama) to generate actionable reports: bughunter, executive, or brief. It’s lightweight, fast, and helps turn raw recon into insights. Give it a spin! github.com/six2dez/reconf…

Six2dez1's tweet image. Super excited to share reconftw_ai 🎉
A new tool that reads reconftw results and uses a local LLM (Ollama) to generate actionable reports: bughunter, executive, or brief.
It’s lightweight, fast, and helps turn raw recon into insights.
Give it a spin!
github.com/six2dez/reconf…

Loading...

Something went wrong.


Something went wrong.