unrealmesh's profile picture. #CBBH #eWPTXv3

Meshaal

@unrealmesh

#CBBH #eWPTXv3

Meshaal 已轉發

if you retweet this you'll find a zero day in 24 hours (trust me this spell works)


Meshaal 已轉發

Altered Security Diwali Giveaway! Win FREE access to: • 1 CRTP seat • 1 CARTP seat How to participate: • Like • Comment & tag your Red Team buddies! • Repost Winners will be randomly announced on October 25, 2025 Our Diwali offers are already live - up to 25% OFF on Red…

AlteredSecurity's tweet image. Altered Security Diwali Giveaway!

Win FREE access to:
• 1 CRTP seat
• 1 CARTP seat

How to participate:
• Like
• Comment & tag your Red Team buddies!
• Repost

Winners will be randomly announced on October 25, 2025

Our Diwali offers are already live - up to 25% OFF on Red…

Meshaal 已轉發

ولله الحمد والمنة 🌹 اجتزت اختبار Offsec Experienced Penetration Tester (OSEP) 🤍🎉 وبإذن الله القادم OSED, OSCE3 🔥 #offsec #osep

Saeed_sm_zh's tweet image. ولله الحمد والمنة 🌹

اجتزت اختبار Offsec Experienced Penetration Tester (OSEP) 🤍🎉

وبإذن الله القادم OSED, OSCE3 🔥

#offsec #osep

Meshaal 已轉發

Do more math.


Meshaal 已轉發

Finished this quarter at Top 4 on intigriti all points from BBP. Thanks to @intigriti for providing such a great environment 🩶

polttopullo's tweet image. Finished this quarter at Top 4 on intigriti all points from BBP.
Thanks to @intigriti  for providing such a great environment
🩶

Meshaal 已轉發

Me and @x6vrn just found a critical on @intigriti 👀

polttopullo's tweet image. Me and @x6vrn just found a critical on @intigriti 👀

Meshaal 已轉發

i wrote an article thats talk about node js prototype pollution gadgets, have fun :) كتبت مقاله حول node js prototype pollution gadgets اتمنى ان تستفيدون :) an4ss-organization.gitbook.io/anas-almizani-…


Meshaal 已轉發

🐞Bug Spotlight: Chrome Logic Sandbox Escape – $250,000 bounty (412578726) Cross-process handle spoofing issue in Ipcz, the new Mojo core driver. Exploit: renderer poses as the browser's broker-peer in reflected transport => leaks high-priv handles. Found by Micky @alisaesage

zerodaytraining's tweet image. 🐞Bug Spotlight: Chrome Logic Sandbox Escape – $250,000 bounty (412578726)

Cross-process handle spoofing issue in Ipcz, the new Mojo core driver.

Exploit: renderer poses as the browser's broker-peer in reflected transport => leaks high-priv handles.

Found by Micky

@alisaesage
zerodaytraining's tweet image. 🐞Bug Spotlight: Chrome Logic Sandbox Escape – $250,000 bounty (412578726)

Cross-process handle spoofing issue in Ipcz, the new Mojo core driver.

Exploit: renderer poses as the browser's broker-peer in reflected transport => leaks high-priv handles.

Found by Micky

@alisaesage
zerodaytraining's tweet image. 🐞Bug Spotlight: Chrome Logic Sandbox Escape – $250,000 bounty (412578726)

Cross-process handle spoofing issue in Ipcz, the new Mojo core driver.

Exploit: renderer poses as the browser's broker-peer in reflected transport => leaks high-priv handles.

Found by Micky

@alisaesage
zerodaytraining's tweet image. 🐞Bug Spotlight: Chrome Logic Sandbox Escape – $250,000 bounty (412578726)

Cross-process handle spoofing issue in Ipcz, the new Mojo core driver.

Exploit: renderer poses as the browser's broker-peer in reflected transport => leaks high-priv handles.

Found by Micky

@alisaesage

Meshaal 已轉發

DEF CON is coming to #Bahrain ​ For the first time in the region, experience #DEFCON Villages at AICS 2025, in collaboration with #NCSC​ DEF CON قادم إلى #البحرين​ ولأول مرة في المنطقة، استمتعوا بتجربة قرى DEF CON ضمن فعاليات AICS2025#، بالتعاون مع المركز الوطني للأمن السيبراني

AicsExpo's tweet image. DEF CON is coming to #Bahrain ​
For the first time in the region, experience #DEFCON Villages at AICS 2025, in collaboration with #NCSC​
DEF CON قادم إلى #البحرين​
ولأول مرة في المنطقة، استمتعوا بتجربة قرى DEF CON ضمن فعاليات AICS2025#، بالتعاون مع المركز الوطني للأمن السيبراني

Meshaal 已轉發

Post-Quantum Cryptography has matured for mass usage. Software projects should start embedding it. Just one year ago – a short term in foundational STEM – NIST announced three approved PQC standards: FIPS 203, 204, 205. They are essentially CRYSTALS & SPHINCS+ algorithm…


Meshaal 已轉發

How to Find a Buffer Overflow Bug Bounty in Google Chrome 2024-: grep memcpy issues.chromium.org/issues/3334143… 2025+: grep memcpy, also vibe fuzzing issues.chromium.org/issues/4096192…


Meshaal 已轉發

Hello, i wrote a blog on one of the modern persistence techniques in Linux using the unshare syscall. Enjoy reading hackmd.io/@0xmadvise/rJP…


Meshaal 已轉發

Announcing #Pwn2Own Ireland for 2025! We return to the Emerald Isle with our new partner @Meta and a $1,000,000 WhatsApp bounty. Yes - one million dollars. Plus new USB attack vectors on phones and more. Check out the details at zerodayinitiative.com/blog/2025/7/30…


Meshaal 已轉發

2² + 3³ + 5⁵ + 7⁷ + 11¹¹ + ... + 89⁸⁹ is prime


Meshaal 已轉發

i'm 1337 enough to have pwned Dante Pro Lab, Thanks for this Pro Lab @hackthebox_eu #HTB #DanteProLab #HackTheBox

xr0o0tx's tweet image. i'm 1337 enough to have pwned Dante Pro Lab, Thanks for this Pro Lab @hackthebox_eu 

#HTB #DanteProLab #HackTheBox

Meshaal 已轉發

is selenium actually safe?? 🤨


United States 趨勢

Loading...

Something went wrong.


Something went wrong.