@0xDiasS Profile picture

DiasS

@0xDiasS

CyberSec Boy | Founder of @P4Hacking

Similar User
R.B.C. photo

@G3tSyst3m

Dharmendra Lakhara photo

@rover_ninja

Gwyomarch photo

@Gwyomarch

ARioCosta photo

@ariocosta

Adrian Denkiewicz photo

@a_denkiewicz

Lizardqueen photo

@Lizardqueen954

castilho photo

@castilho101

Sérgio Pedro photo

@sergiopedro_99

w3th4nds photo

@w3th4nds

Francisco photo

@andr0idp4r4n0id

Bruno Mendes photo

@s3np41k1r1t0

GhostPwner photo

@ghostpwner

Nuno Mateus-Coelho photo

@nunomcoelho

Nuno Humberto photo

@_nunohumberto

Pedro Bernardo photo

@bl4ck_pwn

DiasS Reposted

While loop without an exit condition in real life 😅


Something like this yeah 😂😂

Web Security vs. Binary Exploitation



DiasS Reposted

1/5: There is a quick explanation about this payload for the people who are asking: Certainly, here's a more detailed tweet comment explaining the payload: This payload is an attempt to bypass WAF. It disguises 'echo' and uses '$IFS' to evade detection.


DiasS Reposted

All my current bug bounty knowledge is gone. Here's how I get it back and make $100k in the first year: First, I've got to learn the basics. For this, I will make sure I understand at a high level how the components I'm working with function. I'll need to understand...

Tweet Image 1

DiasS Reposted

Here is a meme that was shared by a group of disassembler enthusiasts.

Tweet Image 1

DiasS Reposted

The Security Reference Guide by @s0cm0nkeysec is an excellent, well-curated and well-organised repository of cybersecurity resources! 👇 s0cm0nkey.gitbook.io/s0cm0nkeys-sec…


DiasS Reposted

My talk is now available on youtube. Thanks @owasplisboa, for giving me the opportunity to share my experience. youtube.com/watch?v=l_ODT7…


DiasS Reposted

Finding 0-day vulnerabilities in apps using the Red Team approach redteamrecipe.com/Finding-0-day-… `if ($credential == 'password') {` Probably vulnerable to type juggling and should be `if ($credential === 'password') {` #redteam #redteamrecipe #appsec #codeql


DiasS Reposted

Analysis and exploitation of a buffer overflow vulnerability (CVE-2022-47949) in Nintendo games network code by @Pablomf6 github.com/PabloMK7/ENLBu… #cybersecurity

Tweet Image 1
Tweet Image 2
Tweet Image 3

DiasS Reposted

Excellent introduction to Linux kernel exploitation Series by @k3170Makan Debugging with QEMU: blog.k3170makan.com/2020/11/linux-… Stack Overflows: blog.k3170makan.com/2020/11/linux-… RIP control: blog.k3170makan.com/2021/01/linux-… #cybersecurity

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

DiasS Reposted

Great blog post for beginners on bitwise operations in C by Andrei Ciobanu andreinc.net/2023/02/01/dem… #infotech

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

DiasS Reposted
Tweet Image 1

DiasS Reposted

If you play CTFs with a fake TLD (like *.htb), you're probably used to typing siteisup.htb into firefox and getting a google search. Just learned you can add this key in about:config, and now it will stop searching! support.mozilla.org/en-US/question… I'm overly excited about this.

Tweet Image 1

That's how you do it, EASYYYY

Beginner hacking tutorials be like: 😶



Loading...

Something went wrong.


Something went wrong.