devploit's profile picture. Head of Security @Freepik · CTF Player 🇪🇸 (@ripp3rsCTF / SFPE) · @hackandbeers Málaga Organizer · Sharing real-world infosec, no hype. Opinions my own.

Daniel Púa | @[email protected]

@devploit

Head of Security @Freepik · CTF Player 🇪🇸 (@ripp3rsCTF / SFPE) · @hackandbeers Málaga Organizer · Sharing real-world infosec, no hype. Opinions my own.

Закреплено

DEFCON Quals 2025 - Memory Bank CTF Challenge Writeup - devploit blog.0xdev.eu/posts/defcon-q…


Daniel Púa | @[email protected] сделал(а) репост

rep+: A Lightweight Alternative to Burp Suite for Quick Browser Testing bscript.substack.com/p/rep-a-lightw…


Daniel Púa | @[email protected] сделал(а) репост

A security-first MCP server empowering AI agents to orchestrate Ghidra, Radare2, and YARA for automated reverse engineering. github.com/sjkim1127/Reve…


Daniel Púa | @[email protected] сделал(а) репост

i just Updated my XSS article: added some cleaner, more effective one-liners and integrated DalFox one-liners that support extra options. Check it out. infosecwriteups.com/find-xss-vulne…


Daniel Púa | @[email protected] сделал(а) репост

I started learning some cheat/anticheat stuff some time ago and wrote some rust code that might be interesting,so today I am making it public uwudrv:A Windows kernel driver + bootkit to support usermode processes trying to read/write other processes memory github.com/segura2010/uwu…


Daniel Púa | @[email protected] сделал(а) репост

Successfully adding an entire feature with a single prompt feels like a getting a headshot in counterstrike. Got a nice update to Turbo Intruder coming soon!


Daniel Púa | @[email protected] сделал(а) репост
h43z's tweet image.

Daniel Púa | @[email protected] сделал(а) репост

Paper edition

pepeluxx's tweet image. Paper edition

Daniel Púa | @[email protected] сделал(а) репост

It's been great to see people 'enjoying' the 0CL @WebSecAcademy lab! Tune in this Friday at 11AM PT to watch me livestream the solution with @offby1security - registration link below 👇

albinowax's tweet image. It's been great to see people 'enjoying' the 0CL @WebSecAcademy lab! Tune in this Friday at 11AM PT to watch me livestream the solution with @offby1security - registration link below 👇

Daniel Púa | @[email protected] сделал(а) репост

Tildar a @Cloudflare de pirata, con o sin comillas, es una vergüenza. @el_pais debéis corregir ese despropósito


Daniel Púa | @[email protected] сделал(а) репост

ActiveScan++ can now detect multiple advanced unicode exploits just dropped at #BHUSA including confusables, codepoint overflows, case-conversion and combining diacritics! Thanks to researchers @ryancbarnett & @4ng3lhacker for contributing this awesome update.

albinowax's tweet image. ActiveScan++ can now detect multiple advanced unicode exploits just dropped at #BHUSA including confusables, codepoint overflows, case-conversion and combining diacritics! Thanks to researchers @ryancbarnett  & @4ng3lhacker for contributing this awesome update.

Daniel Púa | @[email protected] сделал(а) репост

We should split programming courses in two. In one of them you learn to code and it’s forbidden to use AI. In the other one you have to build an ambicious project in a way that guarantees that you use AI. We need people who know how to code and people who know how to build


Daniel Púa | @[email protected] сделал(а) репост

the more ambitious you are, the harder it is to feel proud of anything you’ve done


Daniel Púa | @[email protected] сделал(а) репост

The "S" in Vibe Coding stands for Security.


Daniel Púa | @[email protected] сделал(а) репост

There seem to be two types of engineers. Those who want to solve the problem and those who want to understand the problem. What type are you?


Daniel Púa | @[email protected] сделал(а) репост

i OnLy UsE yOu To DoWnLoAd ChRoMe


Daniel Púa | @[email protected] сделал(а) репост
elhackernet's tweet image.

Daniel Púa | @[email protected] сделал(а) репост

Active Scan++ just got sharper - we’ve added new checks for OS command injection, powered by our latest ASCII Control Characters research. Install via Extensions -> BApp Store

zakfedotkin's tweet image. Active Scan++ just got sharper - we’ve added new checks for OS command injection, powered by our latest ASCII Control Characters research. Install via Extensions -> BApp Store

Daniel Púa | @[email protected] сделал(а) репост

Ese 48% no sabe convertir un Word a PDF.

LOL

wokebusters's tweet image. LOL


Daniel Púa | @[email protected] сделал(а) репост
igor_os777's tweet image.

Daniel Púa | @[email protected] сделал(а) репост

Super excited to share reconftw_ai 🎉 A new tool that reads reconftw results and uses a local LLM (Ollama) to generate actionable reports: bughunter, executive, or brief. It’s lightweight, fast, and helps turn raw recon into insights. Give it a spin! github.com/six2dez/reconf…

Six2dez1's tweet image. Super excited to share reconftw_ai 🎉
A new tool that reads reconftw results and uses a local LLM (Ollama) to generate actionable reports: bughunter, executive, or brief.
It’s lightweight, fast, and helps turn raw recon into insights.
Give it a spin!
github.com/six2dez/reconf…

Loading...

Something went wrong.


Something went wrong.