_q5ca Profile Banner
Q5Ca Profile
Q5Ca

@_q5ca

Followers
935
Following
3K
Media
17
Statuses
234

Chief Remote Work Officer at @u0Kplusplus

Vietnam
Joined November 2017
Don't wanna be here? Send us removal request.
@_q5ca
Q5Ca
1 month
@vudq16 Slide: Recording:
0
1
12
@_q5ca
Q5Ca
1 month
Just a quick reminder: Copilot on ( is not on scope for bounty 🥲.
Tweet media one
1
0
12
@_q5ca
Q5Ca
2 months
Congrats @_l0gg! You did the thing I thought was impossible. Hard work pays off 💪.
@thezdi
Trend Zero Day Initiative
2 months
Confirmed!! Dinh Ho Anh Khoa (@_l0gg) of Viettel Cyber Security combined an auth bypass and an insecure deserialization bug to exploit #Microsoft SharePoint. He earns $100,000 and 10 Master of Pwn points. #Pwn2Own #P2OBerlin
Tweet media one
Tweet media two
0
0
7
@_q5ca
Q5Ca
2 months
Happy to share that my colleague @vudq16 and I will be speaking at PHDays in Moscow 🇷🇺 next week, May 24th. I’ll share a story from one of our red team projects, with techniques to maximize stealth during the operation. Hope to make new connections there:D.
5
4
48
@_q5ca
Q5Ca
2 years
RT @thezdi: That's a wrap on #Pwn2Own Toronto 2023! We awarded $1,038,250 for 58 unique 0-days during the event. Congratulations to Team Vi….
0
41
0
@_q5ca
Q5Ca
2 years
Tweet media one
0
2
0
@_q5ca
Q5Ca
2 years
RT @llm_sec: * People ask LLMs to write code.* LLMs recommend imports that don't actually exist.* Attackers work out what these imports' na….
0
2K
0
@_q5ca
Q5Ca
2 years
RT @bbbb: @PeckShieldAlert @peckshield @SlowMist_Team @BlockSecTeam @cz_binance and @0xblvck_ pointed out the exploit block 26864890 has on….
0
2
0
@_q5ca
Q5Ca
2 years
RT @thezdi: Success! dungdm (@_piers2) of Team Viettel (@vcslab) used an uninitialized variable and a UAF bug to exploit Oracle VirtualBox.….
0
10
0
@_q5ca
Q5Ca
2 years
RT @thezdi: Success! @hoangnx99, @rskvp93, and @_q5ca from Team Viettel (@vcslab) used a 2-bug chain in their attempt against Microsoft Tea….
0
12
0
@_q5ca
Q5Ca
2 years
RT @thezdi: Success! @testanull of @starlabs_sg was able to execute a 2-bug chain on Microsoft SharePoint. They earn $100,000 and 10 Master….
0
47
0
@_q5ca
Q5Ca
2 years
RT @vcslab: Now we are back with 2 entries. Come on!.
Tweet media one
0
7
0
@_q5ca
Q5Ca
2 years
RT @1nf0s3cpt: Good works 👍. @BlockSecTeam successfully blocked an attack to rescue 2,906 ETH. Then the attacker l….
0
5
0
@_q5ca
Q5Ca
2 years
RT @vcslab: Oracle EBS Unauth RCE #CVE-2022-21587 analysis from our researchers @vudq16 @_q5ca @hoangnx99
0
40
0
@_q5ca
Q5Ca
2 years
RT @pashovkrum: This might be the best compilation of critical issues/exploits from 2022, with explanations. If you want to do good as an a….
0
39
0
@_q5ca
Q5Ca
3 years
@rskvp93
Pham Khanh
3 years
I learned a lot about internal Powershell working when I go through TabShell bug #CVE-2022-41076. Here is the detail And a few problems still there and may be need more investigation. with @_q5ca, @hoangnx99.
0
0
5
@_q5ca
Q5Ca
3 years
My Twitter Interaction Circle. Generate yours at ⠀
Tweet media one
2
0
9
@_q5ca
Q5Ca
3 years
RT @ducnt_: Hi folks,.So, anyone has any idea how to make direct contact with the CTFTime team (maybe they’re on holiday) ? Our TetCTF2023….
0
7
0
@_q5ca
Q5Ca
3 years
RT @DrAzureAD: Finally, I can use the skills I studied so hard 13 years ago!
Tweet media one
0
1
0
@_q5ca
Q5Ca
3 years
RT @hoangnx99: This was really a cool 2-bug chain which lead to RCE on Microsoft Exchange Server:.- - https://t.co/….
0
57
0