@yabeow Profile picture

gIA Bui

@yabeow

Hacker @ https://t.co/SWjSiEaOeG | My opinions are my own

Joined January 2016
Similar User
starlabs photo

@starlabs_sg

VCSLab photo

@vcslab

Janggggg photo

@testanull

jkana101 photo

@jkana101

Đào Trọng Nghĩa photo

@nghiadt1098

Thach Nguyen Hoang 🇻🇳 photo

@hi_im_d4rkn3ss

l0cpd photo

@l0cpd

Lê Hữu Quang Linh 🇻🇳 photo

@linhlhq

Nguyen The Duc photo

@ducnt_

Harry Ha photo

@cookiehanhoan

Thái Vũ photo

@thaivd98

Trung Le (con cá nhỏ) photo

@c0nc4nh0

LamScun photo

@LamScun

Akai 🇻🇳 photo

@KMA_Akai

Quang Vo photo

@mr_r3bot

gIA Bui Reposted

Wormable Substack XSS: blog.calif.io/p/wormable-sub… It must have been years since the last time a wormable XSS was found in a major social media website. This beautiful type confusion XSS attack vector is a gift that keeps on giving. But most of all, @samykamkar is our hero!

Type confusion attacks in ProseMirror editors blog.calif.io/p/type-confusi…



gIA Bui Reposted

We analyzed a LockBit v3 variant, and rediscovered a bug that allows us to decrypt some data without paying the ransom. We also found a design flaw that may cause permanent data loss. This is a joint work with @cPeterr Enjoy! blog.calif.io/p/dissecting-l…


gIA Bui Reposted

Our founder went to the White House meeting the National Security Council to discuss cybersecurity for Vietnam. Report: blog.calif.io/p/a-trip-to-th…


gIA Bui Reposted

Trust but verify

Tweet Image 1

gIA Bui Reposted

Painful. This needs to be punished harder. It decreases the trust in platforms like H1 and in the long run could hurt opportunities for serious reporters hackerone.com/reports/2298307


gIA Bui Reposted

Internet Bug Bounty disclosed a bug submitted by @_tint0: hackerone.com/reports/2326194 - Bounty: $4,660 #hackerone #bugbounty

Tweet Image 1

gIA Bui Reposted

New blog post: in a recent engagement, we turned a simple XSRF in Argo CD to a shell with cluster admin privileges. No fix is available. We recommend hosting Argo CD on an isolated domain. Details: blog.calif.io/p/argo-cd-csrf


gIA Bui Reposted

Slides of our talk at AI Day 2023 on improving AI safety with red teaming: drive.google.com/file/d/1hfxDzA… These fascinating topics are new to us. What we knew came from helping AI clients red-team and defend their products and infra. Hope to learn more from everyone! CC @lcamtuf


gIA Bui Reposted

A little good news to share! And we're still hiring: * Offensive Security Engineer: offsec.calif.io * Software Engineer: docs.google.com/document/d/1CK…

Tweet Image 1

gIA Bui Reposted

Please share with the best hackers you know! We’ll reward USD 2,000 in cash for each person you refer that is accepted and stays with us for 6+ months.

Pretty cool testimonial from @AnthropicAI If you're into hacking AI models, we're hiring! docs.google.com/document/d/1SJ…

Tweet Image 1


gIA Bui Reposted

Calif US Offsite Summer 2023

Tweet Image 1

gIA Bui Reposted

In a recent engagement, we encountered a target running CraftCMS, and discovered a Remote Code Execution vulnerability that allowed us to compromise the target. blog.calif.io/p/craftcms-rce CC @yeuchimse


gIA Bui Reposted

RED ALERT: Calif hackers are en route to the US. Keep tight of your money, bitcoins, or AI model weights!

Tweet Image 1

gIA Bui Reposted

After we published a PoC for CVE-2023-38646, Metabase contacted us asking for the full payload. Today they confirmed that we actually found a new vulnerability: github.com/metabase/metab…

Oops! So we accidently dropped a 0day github.com/metabase/metab…



gIA Bui Reposted

My hacker team @calif_io is rapidly expanding, recently adding a winner of multiple Pwn2Own awards, a bug bounty hunter in Top 10 of Bugcrowd's All-Time Leaderboard, and an ex-Cloudflare system engineer that may have crashed some parts of the Internet :) calif.io/company


Loading...

Something went wrong.


Something went wrong.