Ruben V Piña (@ruben_v_pina) 's Twitter Profile
Ruben V Piña

@ruben_v_pina

0xcafe

ID: 14619251

linkhttp://nzt-48.org calendar_today01-05-2008 20:33:30

579 Tweet

1,1K Followers

230 Following

‌Renwa (@renwax23) 's Twitter Profile Photo

CVE-2025-30466: Safari <18.4 UXSS to bypass Same-Origin Policy with CVSS of Critical 9.8 🔴 ;) support.apple.com/en-us/122379#:…

Masato Kinugawa (@kinugawamasato) 's Twitter Profile Photo

<meta http-equiv="refresh" content="0;url='//example.com'@x.com/'"> Chrome redirects to x.com, Safari and Firefox redirect to example.com.

NullSecX (@nullsecurityx) 's Twitter Profile Photo

'"--><svg/onload=top[30]()>${{4*9}}<script>+alert?.``</script> •top[30]() → Triggers XSS without using the word alert •alert?.\`` → Optional chaining + template literal stealthy JS excution •--><svg> → Breaks out of HTML comments •${{4*9}} → SSTI,CSTI #BugBounty

shubs (@infosec_au) 's Twitter Profile Photo

I hope everyone got some rest after DownUnderCTF this weekend. My colleague hashkitten wrote up a blog post on a novel technique for SQL Injection in PDO's prepared statements, required to exploit the “legendary” challenge, which only got one solve: slcyber.io/assetnote-secu…

Kévin GERVOT (Mizu) (@kevin_mizu) 's Twitter Profile Photo

I'm happy to release a script gadgets wiki inspired by the work of Sebastian Lekies, koto, and Eduardo Vela in their Black Hat USA 2017 talk! 🔥 The goal is to provide quick access to gadgets that help bypass HTML sanitizers and CSPs 👇 gmsgadget.com 1/4

I'm happy to release a script gadgets wiki inspired by the work of <a href="/slekies/">Sebastian Lekies</a>, <a href="/kkotowicz/">koto</a>, and <a href="/sirdarckcat/">Eduardo Vela</a> in their Black Hat USA 2017 talk! 🔥

The goal is to provide quick access to gadgets that help bypass HTML sanitizers and CSPs 👇

gmsgadget.com

1/4
PortSwigger (@portswigger) 's Twitter Profile Photo

🚨New Black Hat research released: Over $200k in bounties earned in just two weeks. Join the movement to kill HTTP/1.1 today ⬇️ 🔍PortSwigger’s James Kettle (James Kettle) introduces two new classes of HTTP desync attacks capable of compromising credentials on tens of millions of

🚨New Black Hat research released: Over $200k in bounties earned in just two weeks. Join the movement to kill HTTP/1.1 today ⬇️

🔍PortSwigger’s James Kettle (<a href="/albinowax/">James Kettle</a>) introduces two new classes of HTTP desync attacks capable of compromising credentials on tens of millions of
Web Security Academy (@websecacademy) 's Twitter Profile Photo

🚨New Black Hat research released: Over $200k in bounties earned in just two weeks. Join the movement to kill HTTP/1.1 today ⬇️ 🔍PortSwigger’s James Kettle (James Kettle) introduces two new classes of HTTP desync attacks capable of compromising credentials on tens of millions of

🚨New Black Hat research released: Over $200k in bounties earned in just two weeks. Join the movement to kill HTTP/1.1 today ⬇️

🔍PortSwigger’s James Kettle (<a href="/albinowax/">James Kettle</a>) introduces two new classes of HTTP desync attacks capable of compromising credentials on tens of millions of
James Kettle (@albinowax) 's Twitter Profile Photo

ActiveScan++ can now detect multiple advanced unicode exploits just dropped at #BHUSA including confusables, codepoint overflows, case-conversion and combining diacritics! Thanks to researchers Ryan Barnett (B0N3) @ hackersummercamp & Angel Hacker for contributing this awesome update.

ActiveScan++ can now detect multiple advanced unicode exploits just dropped at #BHUSA including confusables, codepoint overflows, case-conversion and combining diacritics! Thanks to researchers <a href="/ryancbarnett/">Ryan Barnett (B0N3) @ hackersummercamp</a>  &amp; <a href="/4ng3lhacker/">Angel Hacker</a> for contributing this awesome update.
James Kettle (@albinowax) 's Twitter Profile Photo

Watch HTTP/1.1 Must Die live today at 1630 PST! - In person at #defcon33 track 1, main stage - Remote livestream free on YouTube (link below) Enjoy!

Watch HTTP/1.1 Must Die live today at 1630 PST!
- In person at #defcon33 track 1, main stage
- Remote livestream free on YouTube (link below) 
Enjoy!
Web Security Academy (@websecacademy) 's Twitter Profile Photo

Moving to upstream HTTP/2 slams the door on desync attacks. Binary framing eliminates the ambiguity HTTP/1.1 suffers from, reducing exploitability. In this blog, James Kettle, Director of Research at PortSwigger, outlines a clear case for replacing HTTP/1.1 with HTTP/2 to prevent

Moving to upstream HTTP/2 slams the door on desync attacks.

Binary framing eliminates the ambiguity HTTP/1.1 suffers from, reducing exploitability.

In this blog, <a href="/albinowax/">James Kettle</a>, Director of Research at PortSwigger, outlines a clear case for replacing HTTP/1.1 with HTTP/2 to prevent
Orange Tsai  🍊 (@orange_8361) 's Twitter Profile Photo

Thanks PortSwigger and Bug Bounty Village for this awesome event — and also to my DEVCORE buddies for standing on stage to collect the trophy for me! A little follow-up article on this research is coming soon... stay tuned! 🤘

Thanks <a href="/PortSwigger/">PortSwigger</a> and <a href="/BugBountyDEFCON/">Bug Bounty Village</a> for this awesome event — and also to my <a href="/d3vc0r3/">DEVCORE</a> buddies for standing on stage to collect the trophy for me!

A little follow-up article on this research is coming soon... stay tuned! 🤘
BSides Querétaro (@bsidesqueretaro) 's Twitter Profile Photo

Que ardan las redes sociales Se libera el prerregistro en punto de 13:37 PM hora de #Queretaro #BSides #BSidesQueretaro #Ciberseguridad ATT, Agente 👽. (Sin ésto no podrán acceder a los boletos) 👹

Que ardan las redes sociales
Se libera el prerregistro en punto de 13:37 PM hora de 
#Queretaro
#BSides #BSidesQueretaro #Ciberseguridad 
ATT, Agente 👽. 
(Sin ésto no podrán acceder a los boletos) 👹
Web Security Academy (@websecacademy) 's Twitter Profile Photo

How they hacked 24 million websites... by accident! 😮 A simple investigation into a redirect bug turned into one of the largest accidental website compromises James Kettle has ever seen. Security researcher groeneappel ⵣ found an H2.0 desync on a Heroku-hosted site behind

How they hacked 24 million websites... by accident! 😮

A simple investigation into a redirect bug turned into one of the largest accidental website compromises <a href="/albinowax/">James Kettle</a> has ever seen.

Security researcher <a href="/wannesnice/">groeneappel ⵣ</a> found an H2.0 desync on a Heroku-hosted site behind