shubs (@infosec_au) 's Twitter Profile
shubs

@infosec_au

Co-founder, security researcher. Building an attack surface management platform, @assetnote

ID: 1674598830

linkhttps://assetnote.io calendar_today16-08-2013 02:55:36

4,4K Tweet

54,54K Followers

1,1K Following

sean (@seanyeoh) 's Twitter Profile Photo

I'm so proud of shubs and Michael Gianarakis for making this journey possible. Without them at the helm, none of this would have happened. Congrats to the team and best of luck keeping the dream alive

Michael Gianarakis (@mgianarakis) 's Twitter Profile Photo

It feels like only yesterday meeting with shubs at his apartment in Brisbane and riffing on the core ideas that would become Assetnote . I still remember the moment when we coined the phrase “attack surface management” back in 2018. To go from that point to seeing that

Daniel Grzelak (@dagrz) 's Twitter Profile Photo

How do hackers and security researchers enumerate resources inside AWS accounts? With awesome wordlists, that's how. Wordlists are at the heart of Awseye, which is an OSINT tool that has found almost 3.2 million AWS resources. Making good wordlists is surprisingly hard.

James Kettle (@albinowax) 's Twitter Profile Photo

This is a great infoleak exploit chain targeting YouTube by skull. Love the use of a DoS flaw to make the attack stealthier! brutecat.com/articles/leaki…

Searchlight Cyber (@slcybersec) 's Twitter Profile Photo

.Assetnote, now a Searchlight Cyber company, has published the discovery of a new critical vulnerability in the Palo Alto Networks management interface, PAN-OS. slcyber.io/blog/nginx-apa…

shubs (@infosec_au) 's Twitter Profile Photo

When researching Palo Alto PAN-OS, Assetnote's Security Research team discovered an authentication bypass due to flaws in its architecture. Our team digs a lot deeper than surface-level CVEs; this research is an example. slcyber.io/blog/nginx-apa…

When researching Palo Alto PAN-OS, <a href="/assetnote/">Assetnote</a>'s Security Research team discovered an authentication bypass due to flaws in its architecture. Our team digs a lot deeper than surface-level CVEs; this research is an example. slcyber.io/blog/nginx-apa…
spaceraccoon | Eugene Lim (@spaceraccoonsec) 's Twitter Profile Photo

Writing a technical book is only a small fraction of the work. You still need: 1. Technical review 2. General editing 3. Copy editing 4. Cover designing 5. Proof reading <— I am here “From Day Zero to Zero Day” is a way better book thanks to the amazing team at No Starch Press and I

Writing a technical book is only a small fraction of the work. You still need:

1. Technical review
2. General editing
3. Copy editing
4. Cover designing
5. Proof reading &lt;— I am here

“From Day Zero to Zero Day” is a way better book thanks to the amazing team at <a href="/nostarch/">No Starch Press</a> and I
Victor Fresk0 (@hacefresko) 's Twitter Profile Photo

Good news! I've uploaded a new post about the most complex and beautiful vulnerability I've ever found, involving patching and uploading deprecated .jar libraries to get RCE on a big target. It's a very technical post, but I hope you like it ! :) hacefresko.com/posts/rce-on-s…

Lupin (@0xlupin) 's Twitter Profile Photo

Depi is breaking barriers in Software Supply Chain Security. We expose hidden vulnerabilities before they become breaches, no passive defense here. Get ready to disrupt the norm 🤟

shubs (@infosec_au) 's Twitter Profile Photo

Really enjoyed reading about the temporary file upload trick to load an arbitrary SQLite extension in this deserialization gadget for Rails: elttam.com/blog/rails-sql…

shubs (@infosec_au) 's Twitter Profile Photo

The security research team at Assetnote reported a critical pre-auth RCE vulnerability affecting Sitecore XP 10.4 late last year. We continue to protect our customers from 0day vulnerabilities long before patches arrive. Read the blog here: slcyber.io/blog/sitecore-…

The security research team at <a href="/assetnote/">Assetnote</a> reported a critical pre-auth RCE vulnerability affecting Sitecore XP 10.4 late last year. We continue to protect our customers from 0day vulnerabilities long before patches arrive. Read the blog here: slcyber.io/blog/sitecore-…
shubs (@infosec_au) 's Twitter Profile Photo

Are you in Australia and want to work as a security researcher full time, remotely? Want to work with extremely passionate and capable security researchers? Come work with me, and apply for our Security Researcher role at Searchlight Cyber: searchlight.bamboohr.com/careers/187

spaceraccoon | Eugene Lim (@spaceraccoonsec) 's Twitter Profile Photo

Why hack one device, when you can hack a million of them? My latest blogpost based on my NULLCON talk explores hacking smart weighing machines and health devices by hijacking their user-device association flows. spaceraccoon.dev/pwning-million…

shubs (@infosec_au) 's Twitter Profile Photo

We recently looked deeper at the authentication bypass vulnerability in Next.js (CVE-2025-29927) and discovered some intelligent and comprehensive ways to check for the vulnerability. Read more in our blog post: slcyber.io/assetnote-secu…

We recently looked deeper at the authentication bypass vulnerability in Next.js (CVE-2025-29927) and discovered some intelligent and comprehensive ways to check for the vulnerability. Read more in our blog post: slcyber.io/assetnote-secu…
Lupin (@0xlupin) 's Twitter Profile Photo

The article is out ! 🤟 Title: We hacked Google’s A.I Gemini and leaked its source code (at least some part) We worked on this with Justin Gardner and I'm so excited this is finally out ;) Link in the thread 🧵

The article is out ! 🤟

Title: We hacked Google’s A.I Gemini and leaked its source code (at least some part) 

We worked on this with <a href="/Rhynorater/">Justin Gardner</a> and I'm so excited this is finally out ;)

Link in the thread đź§µ
shubs (@infosec_au) 's Twitter Profile Photo

IT support software is often exposed on the ext. internet. Auditing the code of Halo ITSM, we found a sink that led to a critical pre-authentication SQLi. We reflect on how loose typing led to this vuln when compared to the rest of the codebase. Read more: slcyber.io/assetnote-secu…