Co-founder @ethiack.com
https://0xacb.com
https://github.com/robre/jsmon
There's also a fork with Discord support:
https://github.com/robre/jsmon
There's also a fork with Discord support:
Check for it quicker using this cool new tool by JSMon: https://app.jsmon.sh/tools/npm-validator 👇
Check for it quicker using this cool new tool by JSMon: https://app.jsmon.sh/tools/npm-validator 👇
Try the backslash trick! Due to a difference in URL specifications, some parsers will treat '\' the same as '/', while others will not.
Here's an example payload: https://<attacker-url>\@<whitelisted-url>/
Try the backslash trick! Due to a difference in URL specifications, some parsers will treat '\' the same as '/', while others will not.
Here's an example payload: https://<attacker-url>\@<whitelisted-url>/
We're building faster than ever with AI. But are we building securely?
I'll show how agents can perform penetration testing and introduce Hackian: an autonomous agent that identifies vulnerabilities before attackers do.
We're building faster than ever with AI. But are we building securely?
I'll show how agents can perform penetration testing and introduce Hackian: an autonomous agent that identifies vulnerabilities before attackers do.
Thanks @hacker0x01.bsky.social for organizing such an incredible event and bringing awesome researchers together.
#togetherwehitharder #h1416 #shopify #hacking #goleafs
Thanks @hacker0x01.bsky.social for organizing such an incredible event and bringing awesome researchers together.
#togetherwehitharder #h1416 #shopify #hacking #goleafs
Be sure to check https://github.com/EdOverflow/can-i-take-over-xyz, which has an extensive list of vulnerable services and guides on how to claim them.
Be sure to check https://github.com/EdOverflow/can-i-take-over-xyz, which has an extensive list of vulnerable services and guides on how to claim them.
Check it out here 👇
Check it out here 👇
https://cspbypass.com has a compiled list of ways to bypass the Content-Security Policy. Check out the video below 👇
https://cspbypass.com has a compiled list of ways to bypass the Content-Security Policy. Check out the video below 👇
Had the chance to work with TikTok and OKX and found some cool vulns, including two 0days. Will try to publish a write up once they're fixed!
Also, big congrats to the new MVH champion @corraldev.bsky.social for the huge mic-drop at this event 🤯
Had the chance to work with TikTok and OKX and found some cool vulns, including two 0days. Will try to publish a write up once they're fixed!
Also, big congrats to the new MVH champion @corraldev.bsky.social for the huge mic-drop at this event 🤯
Make JSON greppable with @tomnomnom's gron 👇
Make JSON greppable with @tomnomnom's gron 👇
Can't believe tickets have officially sold out already!
Thank you to everyone that has supported the event 🙏
I can't wait to see you all there!
Can't believe tickets have officially sold out already!
Thank you to everyone that has supported the event 🙏
I can't wait to see you all there!
Just run this:
⌨️ curl https://raw.githubusercontent.com/trickest/resolvers/refs/heads/main/resolvers-trusted.txt -O
More stuff at👇
https://github.com/trickest/resolvers
Just run this:
⌨️ curl https://raw.githubusercontent.com/trickest/resolvers/refs/heads/main/resolvers-trusted.txt -O
More stuff at👇
https://github.com/trickest/resolvers
Can you still exploit it?
Try here 👉 https://ai4eh.ethiack.ninja
Can you still exploit it?
Try here 👉 https://ai4eh.ethiack.ninja
GG to all the hackers who played! We hope you enjoyed it.
We will leave it running for those who still want to play with it at https://hacktheagent.com
Stay tuned on @ethiack socials for more challenges.
GG to all the hackers who played! We hope you enjoyed it.
We will leave it running for those who still want to play with it at https://hacktheagent.com
Stay tuned on @ethiack socials for more challenges.
Effectively exporting the raw Git database into human-readable files, repo by repo!
Effectively exporting the raw Git database into human-readable files, repo by repo!
Here's how clever payload splitting can bypass them 👇
Here's how clever payload splitting can bypass them 👇
As someone working on hackbots, I agree that human + AI symbiosis will likely be more effective than either alone.
As someone working on hackbots, I agree that human + AI symbiosis will likely be more effective than either alone.
See if you can solve all the challenges in our Hack The Agent challenge!
Try it at: https://hacktheagent.com
See if you can solve all the challenges in our Hack The Agent challenge!
Try it at: https://hacktheagent.com