André Baptista
@0xacb
Followers
18K
Following
8K
Media
110
Statuses
1K
Hacker grinding for L1gh7 and Fr33dφm, straight outta the cosmic realm. Co-founder @ethiack
Multiverse of Hacking
Joined April 2013
If you still haven't: set up a JS file monitor to send you notifications via Telegram or Slack every time your target app JavaScript gets updated, a great way to stay on top of updates 👾 https://t.co/2EMAXp2ZzP There's also a fork with Discord support:
github.com
a javascript change monitoring tool for bugbounties - GitHub - seczq/jsmon: a javascript change monitoring tool for bugbounties
1
9
123
Following cybersecurity stocks ? AI Cybersecurity Stocks to Watch and the Race for $234 billion Market by 2032 There is a lot of money on the table for both sides and leading cybersecurity stocks like @Cycurion (NASDAQ: $CYCU), Crowdstrike Holdings ( NASDAQ: $CRWD),Check Point
0
2
2
If you found a package.json file in the wild, you might find some internal packages vulnerable to a dependency confusion attack 👀 Check for it quicker using this cool new tool by JSMon: https://t.co/zjdmSzRfqy 👇
4
56
267
Your AI agent is powerful. But is it safe enough for production? @0xacb from Ethiack showed how to implement robust safety techniques like guardrails and LLM firewalls.
0
2
16
You can also use https://t.co/g4cVw8l9Xi to find potential new vectors 🥷
github.com
REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications - 0xacb/recollapse
0
1
17
Looking into a potential SSRF or OR but the server checks against a URL whitelist? Try the backslash trick! Due to a difference in URL specifications, some parsers will treat '\' the same as '/', while others will not. Here's an example payload:
1
6
83
Looking into a potential SSRF or OR but the server checks against a URL whitelist? Try the backslash trick! Due to a difference in URL specifications, some parsers will treat '\' the same as '/', while others will not. Here's an example payload:
github.com
REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications - 0xacb/recollapse
4
23
167
Tomorrow I'll be speaking at @lisbonai_! We're building faster than ever with AI. But are we building securely? I'll show how agents can perform penetration testing and introduce Hackian: an autonomous agent that identifies vulnerabilities before attackers do. See you there:
0
2
42
As attack surfaces grow exponentially, driven by AI-accelerated development and increasing technical debt, security must scale accordingly. We've been intensely focused on building the future of security, and our Co-founder, André Baptista (@0xacb) is pulling back the curtain on
0
2
9
Just had an amazing time working with @ShopifyEng in Toronto 🍁 Thanks @Hacker0x01 for organizing such an incredible event and bringing awesome researchers together. #togetherwehitharder #h1416 #shopify #hacking #goleafs
1
2
84
The BsidesLisbon CTF Qualifiers are officially closed! Huge congrats to the Top 10 teams who will be moving on to the intense onsite finals. See the final rankings on the scoreboard here👉 https://t.co/wegj3fRIfR
0
1
1
If you found a dangling DNS record, you might be able to take control of it 👀 Be sure to check https://t.co/GzWbYJAT0o, which has an extensive list of vulnerable services and guides on how to claim them.
github.com
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records. - EdOverflow/can-i-take-over-xyz
2
4
62
Here's a quick little hacking tip that's landed me some interesting bugs. When you see an ID parameter, give it a little manual fuzz and see what happens: - Positive integer - Negative integer - Decimal points - Letters - Symbols - Really big number - 0 (Yeah, this one dumped
4
38
303
I found out that you can use "ftp::" to convert a limited Dom Clobering situation into a full CSPT. Then, while talking about it with @LooseSecurity, he found that we can also use "https::" This can be used to prevent URL parsing of href, allowing us to hit other endpoints
7
54
302
Modern websites use a lot of intermediary servers - caches, load balancers, proxies, and so on. You can try to send the 'Max-Forwards' header with your request to limit the amount of servers it will reach. It's defined in HTTP specs primarily for TRACE and OPTIONS methods,
1
27
234
0
3
2
Prototype pollution is often missed. Here's how to find it. Prototype pollution is a powerful client-side vulnerability that can lead to XSS. The main requirements to exploit it are: - Unsafe parsing of user-controlled objects (via URL parameters, JSON, postMessages, etc.) - A
2
29
171
As a homage to the work of @Blaklis_, our Security Researcher @softpoison_ debuts his first research post on reverse engineering a critical unauthenticated RCE in Magento (SessionReaper) CVE-2025-54236 at @SLCyberSec:
slcyber.io
Magento is still one of the most popular e-commerce solutions in use on the internet, estimated to be running on more than 130,000 websites. It is also offered as an enterprise offering by Adobe...
7
45
185
Proud to announce that @ethiack will host this year’s #BSidesLisbon CTF! Test your offensive security skills in realistic challenges and compete against top hackers. 🗓️ Quals start Friday, 9PM Register now 👉 https://t.co/wa8XoYsT06
#CTF #Cybersecurity #OffensiveSecurity
0
6
11
Recon tip: Run xnl-h4ck3r's waymore on the target you're testing. It searches for URLs from multiple sources, the Wayback Machine, Common Crawl, URLScan and more. It also provides a lot of options to filter your results. Check it out here 👇 https://t.co/Npto8caKYR
github.com
Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X! - xnl-h4ck3r/waymore
4
31
170