Andréa
@and_zza
Followers
1K
Following
4K
Media
98
Statuses
907
Joined December 2019
I’m thrilled to share my latest blog post! This one focuses on the bug hunting process: inspiration, approach, and execution. I also provide a retrospective on how the bug was introduced and analyze the insufficient “patch”. Check it out:
ibm.com
Get the straightforward approach to bug hunting — from an IBM X-Force Red expert.
34
258
869
I loved working on @Datadog's open source contribution to @sigma_hq! Our pySigma backend converts security rules in Sigma format to Datadog rules and queries for increased security coverage. @blubbfiction, the lead developer, was incredible to work with!
datadoghq.com
Learn how Sigma's out-of-the-box rules can help your security teams quickly and easily detect threats in your environment.
0
0
2
One of the things I like the most are "soft assertions" which don't terminate the test execution, even when the test fails.
0
0
3
Started using @playwrightweb for #reactjs testing recently and it's one of the most well documented and straightforward testing frameworks I've encountered so far. Really enjoying this!
1
1
10
One of the best engineers I've ever met wrote a blog post on writing custom @PulumiCorp providers and it's excellent.
Using code to describe your infrastructure unlocks a lot of expressive power, which is why we use @PulumiCorp to automate our deployments. When we couldn't find providers for some of the services we use, we ended up making some. Learn how:
0
0
2
Completely blown away by the brilliance of @chompie1337's latest post on how she exploited the linux kernel. It was so fascinating to read through her process with such clarity and precise detail. This is so thorough and well thought out. Genuinely amazing work!🔥💯
Thrilled to share my new blog post: Put an io_uring on it: Exploiting the Linux kernel. Follow me while I learn a new kernel subsystem + its attack surface, find an 0day, build an exploit, + come up with some new tricks. I go deep and demystify the process https://t.co/bGEHcjWXrP
2
3
24
Couldn't get myself to take down a month old balloon garland & I'm so glad I didn't. I just got @Wattenberger's "Full Stack D3 & Data Visualization" which I've wanted for a while and it matches perfectly! Reading this will be one of the most fun learning experiences I've ever had
2
0
9
LOVED this article on Node.js vulnerabilities from @vickieli7. Not only does she explain 25 different vulns, (including some I’ve never heard of like “Insecure Puppeteer Settings“ & “Host Header Poisoning”), she also provides resources to learn more and how to prevent them.❤️🔥💯🔥
Node.js vulnerability cheatsheet: https://t.co/kIRrrzkZ30
0
0
7
Could not be more excited to get this book from @snyksec's #31DaysOfSecurity giveaway today! I'm blown away by how thoughtful this choice is! Can't wait to integrate what I learn into my work @GraplSec! So grateful!! What an excellent start to my week!
1
6
19
WOW!!!! Thank you so much @snyksec, this totally made my day!
🎉 Congratulations to our day 24 #31DaysOfSecurity giveaway winner, @and_zza! 🎉 Want to win a #cybersecurity book? Follow us, *and* like, RT, or reply to our tweets throughout October for your chance to win. Only a few days left! https://t.co/DHPO4trEBE
0
0
6
Everything @snyksec has published for #31DaysOfSecurity has been excellent, but this is comprehensive overview of AppSec acronyms with thorough descriptions of what they mean by @AlyssaM_InfoSec is my favorite so far! Learned about RASP which instantly detects & reacts to attacks
DoS. #SAST. #OWASP. SCA. How well do you know your security acronyms? 🤔 Check out this #cheatsheet by @AlyssaM_InfoSec that describes and breaks them down!
1
0
7
This my favorite book on Rust because it's clear, thoughtful, and well paced. The price today is really unbeatable. Highly recommend!
🦀 45% OFF TODAY!! 🦀 If you've been waiting for a reason to buy Rust in Action, you've found it: https://t.co/QzQ5jili5z
1
0
7
Was struggling with importing a crate in #rustlang and learned that package names with hypens are converted to underscores. I had two packages with the same name, one separated "-"and the other by "_". Got a ton of errors because the compiler didn't know where to import from.🤦♀️
0
0
14
Rust Adventure is Live!! 🦀🎉 @rustadventure is series of workshops designed to introduce @rustlang to people who have programmed in at least one other language like JavaScript, Ruby, or Python. https://t.co/ShVYPfeLwx
15
187
779
Just finished #ILF5K for @InnocentOrg! Such a great organization, please donate if you can! I'm really excited because this was my first 5K since healing my neck injury and getting off my heart medication of 10 years! Thanks #wehackhealth for the motivation!
2
1
38