Jester0x01 Profile Banner
Jester Profile
Jester

@Jester0x01

Followers
1K
Following
15K
Media
441
Statuses
3K

To my rabbit, whom I follow.

Joined October 2019
Don't wanna be here? Send us removal request.
@OpenAI
OpenAI
3 years
We're launching the OpenAI Bug Bounty Program — earn cash awards for finding & responsibly reporting security vulnerabilities.
Tweet card summary image
openai.com
This initiative is essential to our commitment to develop safe and advanced AI. As we create technology and services that are secure, reliable, and trustworthy, we need your help.
612
1K
5K
@M_haggis
The Haag™
3 years
Introducing the Living Off The Land Drivers (LOLDrivers) project, a crucial resource that consolidates vulnerable and malicious drivers in one place to streamline research and analysis. https://t.co/jf0t0DyAx1 LOLDrivers enhances awareness of driver-related security risks and
loldrivers.io
24
581
1K
@0xDesigner
0xDesigner
3 years
Probably the best thing you'll see today. In 2017, a group of developers hilariously competed for who could create worst volume control interface in the world. The results 🧵 1/22
1K
42K
169K
@garethheyes
Gareth Heyes \u2028
3 years
Cascade of duty: Modern web. A 3D shooter written in just HTML/CSS absolutely no JavaScript! https://t.co/Xj7hZGArFc
11
22
138
@Jester0x01
Jester
3 years
Tbh, I have never tried or found these issues. So, I don't know validity of it. I don't even how know this works behind the scene. But these issues sound to me exactly like "Disable the js and you can access the html loaded content that have client-side js protection on it"
0
0
1
@Jester0x01
Jester
3 years
@LiveOverflow
LiveOverflow 🔴
3 years
There is no such thing as an "auth bypass by editing http RESPONSE". The only thing you might do is tricking the client UI to think you are authenticated. This could lead to easy identification of completely missing auth on endpoints, but you didn't bypass auth.
1
0
2
@pdiscoveryio
ProjectDiscovery
3 years
Introducing AIx, A simple CLI tool for interacting with Large Language Models (LLM) APIs! With AIx, you can easily query OpenAI's LLM APIs to ask about anything and get the answers straight to your CLI. GitHub Project - https://t.co/XGGgzTPbEo #AI #LLM #CLI #OpenAI #Opensource
6
54
189
@yappare
yappare
3 years
https://t.co/MbfO3XJinp is still the best SQLi reference for me.
0
140
311
@Jester0x01
Jester
3 years
RIP
0
0
5
@realArcherL
N/A
3 years
Hey everyone, I am graduating this May, and I am looking for #AppSec opportunities. If you are hiring, more than happy to interview :)
0
1
1
@sama
Sam Altman
3 years
We offer no explanation as to why [anything works except] divine benevolence.
242
311
3K
@codewhitesec
CODE WHITE GmbH
3 years
Even though JMX exploitation is well understood, @mwulftange and @qtc_de found new universal exploitation techniques & one of them allows to gain instant Remote Code Execution using TemplatesImpl (which is now implemented in #beanshooter)
codewhitesec.blogspot.com
0
75
169
@Jester0x01
Jester
3 years
You can stop wayback archive from scraping your website if you add "Ia_archiver" in your /robots.txt. 🙄
2
29
136
@thatabdou
abdou
3 years
24
348
4K
@plopz0r
Alain M.
3 years
A quick writeup on how I was able to exploit Fortinet's heap overflow (CVE-2022-42475) :
1
76
187
@Jester0x01
Jester
3 years
Lessgo
0
0
0
@sama
Sam Altman
3 years
here is GPT-4, our most capable and aligned model yet. it is available today in our API (with a waitlist) and in ChatGPT+. https://t.co/2ZFC36xqAJ it is still flawed, still limited, and it still seems more impressive on first use than it does after you spend more time with it.
Tweet card summary image
openai.com
We’ve created GPT-4, the latest milestone in OpenAI’s effort in scaling up deep learning. GPT-4 is a large multimodal model (accepting image and text inputs, emitting text outputs) that, while less...
974
4K
20K
@Jester0x01
Jester
3 years
After consulting with Hackerone support, I found out traigers can hack on their company's bb program if the customer company allows it. I am not sure if company gave permission to that employee but one thing I am sure is, these cases are not extremely rare.
0
0
1
@Jester0x01
Jester
3 years
FUN FACT: Last year I saw a company triager (not Hackerone's) who was also hacking on same bb program. He commented on my every bug report as a triager but he was also no. 1 in leaderboard of that bb program with huge point difference.
@irsdl
Soroush Dalili
3 years
@CoreyD97 Side question, can a triager report bugs in the same programme or it’s forbidden for some time after? I think if a reporter knows that the triager has no interest but also can earn more points/money by accepting an actual issue then they would feel much better.
1
0
0