Patrik Fehrenbach (@itsecurityguard) 's Twitter Profile
Patrik Fehrenbach

@itsecurityguard

rɪsˈpɒnsəbl dɪsˈkləʊʒə
wss.sh
huntdb.com

ID: 1089376824

linkhttps://blog.wss.sh calendar_today14-01-2013 15:51:37

4,4K Tweet

30,30K Followers

282 Following

zhero; (@zhero___) 's Twitter Profile Photo

the research paper is out: Next.js and the corrupt middleware: the authorizing artifact result of a collaboration with inzo that led to CVE-2025-29927 (9.1-critical) zhero-web-sec.github.io/research-and-t… enjoy the read!

the research paper is out:

Next.js and the corrupt middleware: the authorizing artifact

result of a collaboration with <a href="/inzo____/">inzo</a> that led to CVE-2025-29927 (9.1-critical)

zhero-web-sec.github.io/research-and-t…

enjoy the read!
Nir Ohfeld (@nirohfeld) 's Twitter Profile Photo

We (+sagitz Ronen Shustin Hillai Ben-Sasson) found a series of unauthenticated RCEs in core @KubernetesIO project "Ingress-NGINX". The impact? From zero permissions ➡️ to complete cluster takeover 🤯 This is the story of #IngressNightmare 🧵⬇️

We (+<a href="/sagitz_/">sagitz</a> <a href="/ronenshh/">Ronen Shustin</a> <a href="/hillai/">Hillai Ben-Sasson</a>) found a series of unauthenticated RCEs in core @KubernetesIO project "Ingress-NGINX".

The impact?

From zero permissions ➡️ to complete cluster takeover 🤯

This is the story of #IngressNightmare 🧵⬇️
Patrik Fehrenbach (@itsecurityguard) 's Twitter Profile Photo

Welp, I guess the rumors are true... With the new HackerOne "research" subscription you can buy yourself into prioritised triage and private programs 😡

Welp, I guess the rumors are true...

With the new HackerOne "research" subscription you can buy yourself into prioritised triage and private programs 😡
Patrik Fehrenbach (@itsecurityguard) 's Twitter Profile Photo

MITRE’s CVE funding just dried up because the US can’t get its paperwork in order. Maybe global cybersecurity shouldn’t depend on one country’s clown show. Just a thought.

Abdullah Al-Sultani (@abdulahhusam) 's Twitter Profile Photo

📷 Just released ProKZee v0.0.1! My new cross-platform tool for HTTP/HTTPS traffic interception features a modern UI and powerful analysis capabilities. Perfect for developers and security researchers. Check it out: github.com/al-sultani/pro… #infosec #bugbounty #bug_bounty

📷 Just released ProKZee v0.0.1! 

My new cross-platform tool for HTTP/HTTPS traffic interception features a modern UI and powerful analysis capabilities. Perfect for developers and security researchers. Check it out: 
github.com/al-sultani/pro… 

#infosec #bugbounty #bug_bounty
­Mathias Karlsson (@avlidienbrunn) 's Twitter Profile Photo

I made a tool to help test archive (zip/tar) extraction bugs (synk working directory into archive, add path traversals, links, permissions, etc): github.com/avlidienbrunn/…

ZachXBT (@zachxbt) 's Twitter Profile Photo

1/ In late 2023 a former Yuga Labs security researcher was stopped at the airport after law enforcement mistakenly linked them to a $1.1M phishing theft from a Bored Ape owner. Here’s an investigation into where the stolen funds went and who’s actually responsible.

1/ In late 2023 a former Yuga Labs security researcher was stopped at the airport after law enforcement mistakenly linked them to a $1.1M phishing theft from a Bored Ape owner. 

Here’s an investigation into where the stolen funds went and who’s actually responsible.
Patrik Fehrenbach (@itsecurityguard) 's Twitter Profile Photo

Happy Pride Month! Celebrating all the courage it takes to live your truth and love openly. God is love, and whoever lives in love lives in God, and God in them.' - 1 John 4:16 ❣️

RET2 Systems (@ret2systems) 's Twitter Profile Photo

What does it take to hack a Sonos Era 300 for Pwn2Own? Take a look at our process of adapting existing research, establishing a foothold, and exploiting media parsers for unauthenticated RCE over the network🔥👇 blog.ret2.io/2025/06/11/pwn…

What does it take to hack a <a href="/Sonos/">Sonos</a> Era 300 for Pwn2Own? 

Take a look at our process of adapting existing research, establishing a foothold, and exploiting media parsers for unauthenticated RCE over the network🔥👇

blog.ret2.io/2025/06/11/pwn…
shubs (@infosec_au) 's Twitter Profile Photo

How do we turn bad SSRF (blind) into good SSRF (full response)? The Assetnote Security Research team at Searchlight Cyber used a novel technique involving HTTP redirect loops and incremental status codes that leaked the full HTTP resp. It may work elsewhere! slcyber.io/assetnote-secu…

How do we turn bad SSRF (blind) into good SSRF (full response)? The <a href="/assetnote/">Assetnote</a> Security Research team at <a href="/SLCyberSec/">Searchlight Cyber</a> used a novel technique involving HTTP redirect loops and incremental status codes that leaked the full HTTP resp. It may work elsewhere! slcyber.io/assetnote-secu…