unrealmesh's profile picture. #CBBH #eWPTXv3

Meshaal

@unrealmesh

#CBBH #eWPTXv3

Meshaal 님이 재게시함

ولله الحمد والمنة 🌹 اجتزت اختبار Offsec Experienced Penetration Tester (OSEP) 🤍🎉 وبإذن الله القادم OSED, OSCE3 🔥 #offsec #osep

Saeed_sm_zh's tweet image. ولله الحمد والمنة 🌹

اجتزت اختبار Offsec Experienced Penetration Tester (OSEP) 🤍🎉

وبإذن الله القادم OSED, OSCE3 🔥

#offsec #osep

Meshaal 님이 재게시함

Do more math.


Meshaal 님이 재게시함

Finished this quarter at Top 4 on intigriti all points from BBP. Thanks to @intigriti for providing such a great environment 🩶

polttopullo's tweet image. Finished this quarter at Top 4 on intigriti all points from BBP.
Thanks to @intigriti  for providing such a great environment
🩶

Meshaal 님이 재게시함

Me and @x6vrn just found a critical on @intigriti 👀

polttopullo's tweet image. Me and @x6vrn just found a critical on @intigriti 👀

Meshaal 님이 재게시함

I am so thrilled to announce that I’ll be explaining Linux persistence at BlackHatMEA25 !! It was a dream of mine since I was 16..now at 17 it became reality. So stoked to see you guys there

0xmadvise's tweet image. I am so thrilled to announce that I’ll be explaining Linux persistence at BlackHatMEA25 !! 

It was a dream of mine since I was 16..now at 17 it became reality. So stoked to see you guys there

Meshaal 님이 재게시함

i wrote an article thats talk about node js prototype pollution gadgets, have fun :) كتبت مقاله حول node js prototype pollution gadgets اتمنى ان تستفيدون :) an4ss-organization.gitbook.io/anas-almizani-…


Meshaal 님이 재게시함

high again 😀 Just scored a reward @intigriti, check my profile: app.intigriti.com/profile/lhr #HackWithIntigriti


Meshaal 님이 재게시함

🐞Bug Spotlight: Chrome Logic Sandbox Escape – $250,000 bounty (412578726) Cross-process handle spoofing issue in Ipcz, the new Mojo core driver. Exploit: renderer poses as the browser's broker-peer in reflected transport => leaks high-priv handles. Found by Micky @alisaesage

zerodaytraining's tweet image. 🐞Bug Spotlight: Chrome Logic Sandbox Escape – $250,000 bounty (412578726)

Cross-process handle spoofing issue in Ipcz, the new Mojo core driver.

Exploit: renderer poses as the browser's broker-peer in reflected transport => leaks high-priv handles.

Found by Micky

@alisaesage
zerodaytraining's tweet image. 🐞Bug Spotlight: Chrome Logic Sandbox Escape – $250,000 bounty (412578726)

Cross-process handle spoofing issue in Ipcz, the new Mojo core driver.

Exploit: renderer poses as the browser's broker-peer in reflected transport => leaks high-priv handles.

Found by Micky

@alisaesage
zerodaytraining's tweet image. 🐞Bug Spotlight: Chrome Logic Sandbox Escape – $250,000 bounty (412578726)

Cross-process handle spoofing issue in Ipcz, the new Mojo core driver.

Exploit: renderer poses as the browser's broker-peer in reflected transport => leaks high-priv handles.

Found by Micky

@alisaesage
zerodaytraining's tweet image. 🐞Bug Spotlight: Chrome Logic Sandbox Escape – $250,000 bounty (412578726)

Cross-process handle spoofing issue in Ipcz, the new Mojo core driver.

Exploit: renderer poses as the browser's broker-peer in reflected transport => leaks high-priv handles.

Found by Micky

@alisaesage

Meshaal 님이 재게시함

DEF CON is coming to #Bahrain ​ For the first time in the region, experience #DEFCON Villages at AICS 2025, in collaboration with #NCSC​ DEF CON قادم إلى #البحرين​ ولأول مرة في المنطقة، استمتعوا بتجربة قرى DEF CON ضمن فعاليات AICS2025#، بالتعاون مع المركز الوطني للأمن السيبراني

AicsExpo's tweet image. DEF CON is coming to #Bahrain ​
For the first time in the region, experience #DEFCON Villages at AICS 2025, in collaboration with #NCSC​
DEF CON قادم إلى #البحرين​
ولأول مرة في المنطقة، استمتعوا بتجربة قرى DEF CON ضمن فعاليات AICS2025#، بالتعاون مع المركز الوطني للأمن السيبراني

Meshaal 님이 재게시함

Post-Quantum Cryptography has matured for mass usage. Software projects should start embedding it. Just one year ago – a short term in foundational STEM – NIST announced three approved PQC standards: FIPS 203, 204, 205. They are essentially CRYSTALS & SPHINCS+ algorithm…


Meshaal 님이 재게시함

How to Find a Buffer Overflow Bug Bounty in Google Chrome 2024-: grep memcpy issues.chromium.org/issues/3334143… 2025+: grep memcpy, also vibe fuzzing issues.chromium.org/issues/4096192…


Meshaal 님이 재게시함

Hello, i wrote a blog on one of the modern persistence techniques in Linux using the unshare syscall. Enjoy reading hackmd.io/@0xmadvise/rJP…


Meshaal 님이 재게시함

Announcing #Pwn2Own Ireland for 2025! We return to the Emerald Isle with our new partner @Meta and a $1,000,000 WhatsApp bounty. Yes - one million dollars. Plus new USB attack vectors on phones and more. Check out the details at zerodayinitiative.com/blog/2025/7/30…


Meshaal 님이 재게시함

2² + 3³ + 5⁵ + 7⁷ + 11¹¹ + ... + 89⁸⁹ is prime


Meshaal 님이 재게시함

i'm 1337 enough to have pwned Dante Pro Lab, Thanks for this Pro Lab @hackthebox_eu #HTB #DanteProLab #HackTheBox

xr0o0tx's tweet image. i'm 1337 enough to have pwned Dante Pro Lab, Thanks for this Pro Lab @hackthebox_eu 

#HTB #DanteProLab #HackTheBox

Meshaal 님이 재게시함

is selenium actually safe?? 🤨


Meshaal 님이 재게시함

Old v8ctf chall but i had fun solving it while listening to tik tok and getting RCE'd inside my box


United States 트렌드

Loading...

Something went wrong.


Something went wrong.