chebuya (@_chebuya) 's Twitter Profile
chebuya

@_chebuya

c2 enjoyer

ID: 1713029179607052288

linkhttps://blog.chebuya.com/ calendar_today14-10-2023 03:09:41

72 Tweet

2,2K Followers

379 Following

chebuya (@_chebuya) 's Twitter Profile Photo

How I discovered and exploited an unauthenticated SSRF in the Havoc C2 teamserver, allowing attackers to leak origin IPs of teamservers behind redirectors and much more! blog.chebuya.com/posts/server-s… github.com/chebuya/Havoc-…

chebuya (@_chebuya) 's Twitter Profile Photo

How I discovered and exploited an Unauthenticated RCE in BYOB (Build Your Own Botnet), an open-source post-exploitation framework for students, researchers and developers with close to 9k stars on GitHub! blog.chebuya.com/posts/unauthen… github.com/chebuya/exploi…

chebuya (@_chebuya) 's Twitter Profile Photo

Not very polite behavior from a "security researcher" and colleague who re-worded my writeup for the BYOB RCE and phrased the announcement like it was their own discovery. x.com/_chebuya/statu…

Not very polite behavior from a "security researcher" and colleague who re-worded my writeup for the BYOB RCE and phrased the announcement like it was their own discovery.
x.com/_chebuya/statu…
chebuya (@_chebuya) 's Twitter Profile Photo

Check out this tool I've been developing. It's like httpx, but instead of finding interesting web servers to hack on, it's for finding interesting code repositories to audit. In this example I am spidering the "command-and-control" topic and running semgrep on every

chebuya (@_chebuya) 's Twitter Profile Photo

I ran semgrep on every open source target in scope on HackerOne with my tool, SASTSweep, here's what that looks like Last teaser before tool release I promise

chebuya (@_chebuya) 's Twitter Profile Photo

Here is running SASTsweep against HackerOne open source targets It lets you open the semgrep finding in an HTML report, and from there you can open the affected section of code within GitHub/Github1s for further analysis Tool: github.com/chebuya/sastsw…

Clint Gibler (@clintgibler) 's Twitter Profile Photo

📚 tl;dr sec 255 🤖 Project Zero Bugs AI finds bug in SQLite ☁️ New OSS: CloudTail, SkyScalpel Permiso Security 🛣️ Auto-generate Terraform Secure Guardrails 📺 SANS Institute CloudSecNext Summit 2024 videos 🇨🇳 The TTPs Used to Neutralize China-Based Threats Sophos X-Ops 📊 Safer

Clint Gibler (@clintgibler) 's Twitter Profile Photo

🛠️ Sastsweep A tool designed for identifying vulnerabilities in open source codebases at scale It can gather and filter on key repo metrics such as popularity and project size, enabling targeted vulnerability research It automatically detects potential vulnerabilities using

bot59751939 👽🏴‍☠️ (@bot59751939) 's Twitter Profile Photo

This is the contest winner :) Ships with a 0day for Crafty controller. Huge thanks to chebuya. Today I'm announcing Black Mass Research Group. Our goal is to make interesting malware for public study. Please enjoy our first project! github.com/blackmassgroup…

chebuya (@_chebuya) 's Twitter Profile Photo

I have hereby been declared GIGACHAD for the Minecraft malware I wrote for the vx-underground JVM malware competition 🥰🥰 Do check out the Black Mass Research Group telegram as well! t.me/blackmassresea…

vx-underground (@vxunderground) 's Twitter Profile Photo

vx-underground Black Mass Research Group presents: Minegrief. tl;dr a computer worm that targets minecraft github.com/blackmassgroup…