0xacb Profile Banner
André Baptista Profile
André Baptista

@0xacb

Followers
18K
Following
8K
Media
110
Statuses
1K

Hacker grinding for L1gh7 and Fr33dφm, straight outta the cosmic realm. Co-founder @ethiack

Multiverse of Hacking
Joined April 2013
Don't wanna be here? Send us removal request.
@0xacb
André Baptista
1 year
We won the MVH title at #h1702 🔥 @NahamSec @ajxchapman
32
15
474
@0xacb
André Baptista
20 hours
If you still haven't: set up a JS file monitor to send you notifications via Telegram or Slack every time your target app JavaScript gets updated, a great way to stay on top of updates 👾 https://t.co/2EMAXp2ZzP There's also a fork with Discord support:
Tweet card summary image
github.com
a javascript change monitoring tool for bugbounties - GitHub - seczq/jsmon: a javascript change monitoring tool for bugbounties
1
9
123
@0xacb
André Baptista
2 days
Also, if you are part of a security team and want to check for this kind of stuff, there's a really awesome product by Lupin & Holmes @0xLupin :
0
1
9
@InvestorIdeas
InvestorIdeas.com
2 days
Following cybersecurity stocks ? AI Cybersecurity Stocks to Watch and the Race for $234 billion Market by 2032 There is a lot of money on the table for both sides and leading cybersecurity stocks like @Cycurion (NASDAQ: $CYCU), Crowdstrike Holdings ( NASDAQ: $CRWD),Check Point
0
2
2
@0xacb
André Baptista
2 days
If you found a package.json file in the wild, you might find some internal packages vulnerable to a dependency confusion attack 👀 Check for it quicker using this cool new tool by JSMon: https://t.co/zjdmSzRfqy 👇
4
56
267
@lisbonai_
Lisbon AI
4 days
Your AI agent is powerful. But is it safe enough for production? @0xacb from Ethiack showed how to implement robust safety techniques like guardrails and LLM firewalls.
0
2
16
@0xacb
André Baptista
4 days
Looking into a potential SSRF or OR but the server checks against a URL whitelist? Try the backslash trick! Due to a difference in URL specifications, some parsers will treat '\' the same as '/', while others will not. Here's an example payload:
1
6
83
@0xacb
André Baptista
4 days
Looking into a potential SSRF or OR but the server checks against a URL whitelist? Try the backslash trick! Due to a difference in URL specifications, some parsers will treat '\' the same as '/', while others will not. Here's an example payload:
Tweet card summary image
github.com
REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications - 0xacb/recollapse
4
23
167
@0xacb
André Baptista
5 days
Tomorrow I'll be speaking at @lisbonai_! We're building faster than ever with AI. But are we building securely? I'll show how agents can perform penetration testing and introduce Hackian: an autonomous agent that identifies vulnerabilities before attackers do. See you there:
0
2
42
@ethiack
Ethiack
5 days
As attack surfaces grow exponentially, driven by AI-accelerated development and increasing technical debt, security must scale accordingly. We've been intensely focused on building the future of security, and our Co-founder, André Baptista (@0xacb) is pulling back the curtain on
0
2
9
@0xacb
André Baptista
9 days
Just had an amazing time working with @ShopifyEng in Toronto 🍁 Thanks @Hacker0x01 for organizing such an incredible event and bringing awesome researchers together. #togetherwehitharder #h1416 #shopify #hacking #goleafs
1
2
84
@ethiack
Ethiack
10 days
The BsidesLisbon CTF Qualifiers are officially closed! Huge congrats to the Top 10 teams who will be moving on to the intense onsite finals. See the final rankings on the scoreboard here👉 https://t.co/wegj3fRIfR
0
1
1
@0xacb
André Baptista
10 days
If you found a dangling DNS record, you might be able to take control of it 👀 Be sure to check https://t.co/GzWbYJAT0o, which has an extensive list of vulnerable services and guides on how to claim them.
Tweet card summary image
github.com
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records. - EdOverflow/can-i-take-over-xyz
2
4
62
@0xacb
André Baptista
11 days
Here's a quick little hacking tip that's landed me some interesting bugs. When you see an ID parameter, give it a little manual fuzz and see what happens: - Positive integer - Negative integer - Decimal points - Letters - Symbols - Really big number - 0 (Yeah, this one dumped
4
38
303
@castilho101
castilho
12 days
I found out that you can use "ftp::" to convert a limited Dom Clobering situation into a full CSPT. Then, while talking about it with @LooseSecurity, he found that we can also use "https::" This can be used to prevent URL parsing of href, allowing us to hit other endpoints
7
54
302
@0xacb
André Baptista
12 days
Modern websites use a lot of intermediary servers - caches, load balancers, proxies, and so on. You can try to send the 'Max-Forwards' header with your request to limit the amount of servers it will reach. It's defined in HTTP specs primarily for TRACE and OPTIONS methods,
1
27
234
@ethiack
Ethiack
14 days
🚨@BsidesLisbon CTF Quals starts now! 🔓Join at:  https://t.co/O4ZWIHQLz5 #CTF #BSidesLisbon
0
3
2
@0xacb
André Baptista
15 days
Prototype pollution is often missed. Here's how to find it. Prototype pollution is a powerful client-side vulnerability that can lead to XSS. The main requirements to exploit it are: - Unsafe parsing of user-controlled objects (via URL parameters, JSON, postMessages, etc.) - A
2
29
171
@infosec_au
shubs
17 days
As a homage to the work of @Blaklis_, our Security Researcher @softpoison_ debuts his first research post on reverse engineering a critical unauthenticated RCE in Magento (SessionReaper) CVE-2025-54236 at @SLCyberSec:
Tweet card summary image
slcyber.io
Magento is still one of the most popular e-commerce solutions in use on the internet, estimated to be running on more than 130,000 websites. It is also offered as an enterprise offering by Adobe...
7
45
185
@Bsideslisbon
BSidesLisbon
17 days
Proud to announce that @ethiack will host this year’s #BSidesLisbon CTF! Test your offensive security skills in realistic challenges and compete against top hackers. 🗓️ Quals start Friday, 9PM Register now 👉 https://t.co/wa8XoYsT06 #CTF #Cybersecurity #OffensiveSecurity
0
6
11
@0xacb
André Baptista
17 days
Recon tip: Run xnl-h4ck3r's waymore on the target you're testing. It searches for URLs from multiple sources, the Wayback Machine, Common Crawl, URLScan and more. It also provides a lot of options to filter your results. Check it out here 👇 https://t.co/Npto8caKYR
Tweet card summary image
github.com
Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X! - xnl-h4ck3r/waymore
4
31
170