Mindless (@mindlaess_) 's Twitter Profile
Mindless

@mindlaess_

Cyber security enthusiast, CTF player, hacker wannabe. Currently penetration tester @ Shielder s.p.a.

ID: 1435623944351059979

calendar_today08-09-2021 15:20:43

26 Tweet

41 Followers

72 Following

5pider (@c5pider) 's Twitter Profile Photo

An amazing talk was given by Rad in his OnlyMalware (discord.gg/onlymalware) discord server. check it out. youtube.com/watch?v=L9SI-Pโ€ฆ

pwnthem0le (@pwnthem0le) 's Twitter Profile Photo

๐Ÿ—“๏ธSave the date!๐Ÿ—“๏ธ m0leCon 2023 will take place on December 2nd at Politecnico di Torino More info coming soon! m0lecon.it

๐Ÿ—“๏ธSave the date!๐Ÿ—“๏ธ

m0leCon 2023 will take place on December 2nd at Politecnico di Torino

More info coming soon!

m0lecon.it
smaury (@smaury92) 's Twitter Profile Photo

A vulnerability I've reported to Google VRP (Google Bug Hunters) was recently made public. TL;DR: Chrome implements credentialless iframes which should have a dedicated ephemeral cookie jar - I've found a way to break outside of it using ServiceWorkers to access long lived cookies.

Shielder (@shieldersec) 's Twitter Profile Photo

"Never stop learning" - with this in mind, we couldn't have missed such a great opportunity! If you are attending these amazing training sessions too, make sure to meet our very own teammates: TheZero ๐Ÿ‰ on BlueSky, Petar Jr. Pranic, and @madt1m_, to talk about IT shenanigans!

Petar Jr. Pranic (@ipslav) 's Twitter Profile Photo

My first research and tool are finally out. If you want to deep dive into some CLR internals and understand how we can abuse it to blend-in within its own logic go check it out. Hope you'll enjoy the read. ipslav.github.io/2023-12-12-letโ€ฆ

Shielder (@shieldersec) 's Twitter Profile Photo

๐ŸŽ‰ Cheers hackers! ๐ŸŽŠ As we bid farewell to 2023, let's celebrate together! ๐ŸŽ Like, follow, and retweet for a chance to WIN a โ‚ฌ30 coupon for swag.shielder.com! ๐Ÿ† 3 winners will be selected by EOY! #giveaways #swag

Shielder (@shieldersec) 's Twitter Profile Photo

During a recent Red Team Assessment TheZero ๐Ÿ‰ on BlueSky and smaury discovered a vulnerability in PostgreSQL's #PgAdmin which in the worst case allows unauthenticated attackers to run arbitrary server-side code. Check out the #RCE advisory and patch now! shielder.com/advisories/pgaโ€ฆ

Shielder (@shieldersec) 's Twitter Profile Photo

Back in December 2023 our researchers TheZero ๐Ÿ‰ on BlueSky Pit and Mindless performed an audit sponsored by Amazon Web Services and facilitated by OSTIF Official on boost. It resulted in 7 findings and 15 new fuzzers. The report is now public, check the details here: shielder.com/blog/2024/05/bโ€ฆ

Mindless (@mindlaess_) 's Twitter Profile Photo

The advisories about my first CVEs are finally public, big thanks to all the seniors that assisted me during the research!

TheSAS2025 (@thesascon) 's Twitter Profile Photo

๐ŸŽ With many #macOS security mechanisms at work, one might wonder how malware manages to bypass them. Get ready for a deep dive into macOS security architecture and novel evasion techniques during Pietro Tirenna's (Pit) talk at #TheSAS2024. ๐Ÿš€ Secure your seat:

๐ŸŽ With many #macOS security mechanisms at work, one might wonder how malware manages to bypass them.  Get ready for a deep dive into macOS security architecture and novel evasion techniques during Pietro Tirenna's (<a href="/suidpit/">Pit</a>) talk at #TheSAS2024.
 
๐Ÿš€ Secure your seat:
Shielder (@shieldersec) 's Twitter Profile Photo

Our very own Pit will present his novel #macOS research at TheSAS2025 - if you want to learn more about the macOS sandbox and how to escape it make sure to be in Bali ๐Ÿ๏ธ from Oct 22 to Oct 25 at #TheSAS2024

Shielder (@shieldersec) 's Twitter Profile Photo

Attending TheSAS2025 in the beautiful Bali๐Ÿ๏ธ? Make sure not to miss Pit's talk about his novel research on the macOS ๐ŸŽ sandbox and how to bypass it. ๐Ÿ—“๏ธ Wednesday, October 23 - 15:10

Attending <a href="/TheSAScon/">TheSAS2025</a> in the beautiful Bali๐Ÿ๏ธ?
Make sure not to miss <a href="/suidpit/">Pit</a>'s talk about his novel research on the macOS ๐ŸŽ sandbox and how to bypass it.
๐Ÿ—“๏ธ Wednesday, October 23 - 15:10
Shielder (@shieldersec) 's Twitter Profile Photo

๐Ÿšจ New Open Source Audit Alert! ๐Ÿšจ Shielder, with OSTIF Official & CNCF, audited Karmada: ๐Ÿ” 6 issues found (1 high, 1 medium, 2 low, 2 info) โœ”๏ธ Most fixed, others planned. ๐Ÿ—ฃ๏ธ to Pit and TheZero ๐Ÿ‰ on BlueSky Full details in the blog post! shielder.com/blog/2025/01/kโ€ฆ

TumpiCon (@tumpiconit) 's Twitter Profile Photo

Hey hackers! Weโ€™ve started sending out the first invites โ€” check your inbox! ๐Ÿ‘€ Didnโ€™t get one? Take the fast track and submit a talk!

Shielder (@shieldersec) 's Twitter Profile Photo

Last week Apple released MacOS 13.4 which contains a fix for a vulnerability Pit exploited to escape the Sandbox. Update now and stay tuned for the technical details! Ref: support.apple.com/en-us/122373

Last week <a href="/Apple/">Apple</a> released MacOS 13.4 which contains a fix for a vulnerability <a href="/suidpit/">Pit</a> exploited to escape the Sandbox. 
Update now and stay tuned for the technical details!
Ref: support.apple.com/en-us/122373