infosec_au Profile Banner
shubs Profile
shubs

@infosec_au

Followers
57K
Following
10K
Media
134
Statuses
2K

Co-founder, security researcher. Building an attack surface management platform, @assetnote

halcyon
Joined August 2013
Don't wanna be here? Send us removal request.
@infosec_au
shubs
4 days
@SLCyberSec @hash_kitten @assetnote This has been silently patched now 🫠 There's probably more WAF bypasses out there.
6
4
164
@infosec_au
shubs
4 days
Vercel is questioning whether or not a WAF bypass is possible... Pushed an update that uses a payload from @SLCyberSec research team (specifically @hash_kitten). Payload has been running for @assetnote customers for last 18h. https://t.co/9CqANckHK0 use --vercel-waf-bypass flag
@rauchg
Guillermo Rauch
4 days
@infosec_au @assetnote DM’d you. You have a working repro for bypassing Cloudflare but not Vercel. Would love to correct the record or see the evidence.
14
92
960
@infosec_au
shubs
4 days
Pushed a new update to https://t.co/9CqANckHK0 -- it now scans for the RCE payload via reflection. Use the --waf-bypass flag to bypass WAFs, works well for Cloudflare/AWS. Other WAFs might need tinkering with the payload, depending on whether they don't have a max context limit.
Tweet card summary image
github.com
High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478) - assetnote/react2shell-scanner
12
125
621
@infosec_au
shubs
4 days
For the Next.js/RSC RCE, it's possible to bypass both Vercel and Cloudflare, and most WAFs really. Don't trust your provider's WAFs, patch your systems ASAP. We added these new WAF aware checks to @assetnote earlier this morning.
17
62
525
@maple3142
maple3142
5 days
A POC for CVE-2025-55182 https://t.co/BcyJ1UbivA
34
422
2K
@infosec_au
shubs
5 days
I've pushed a few updates to https://t.co/9CqANckHK0. Vercel and Netlify are no longer flagged as vuln. Offsite redirs not followed. Custom header support in case you need auth or custom UA. Redir test cases are more accurate now (both base path and redir tested).
Tweet card summary image
github.com
High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478) - assetnote/react2shell-scanner
2
27
167
@albinowax
James Kettle
5 days
You can now scan for #react2shell in @Burp_Suite. To enable, install the Extensibility Helper bapp, go to the bambda tab and search for react2shell. Shout-out to @assetnote for sharing a reliable detection technique!
7
104
637
@infosec_au
shubs
5 days
Our Security Research team at @SLCyberSec just published a high-fidelity detection mechanism for the Next.js/RSC RCE (CVE-2025-55182 & CVE-2025-66478) - https://t.co/aa62OKXpK2. There are a lot of PoCs on GitHub that are adding noise to the problem; I hope this helps people!
Tweet card summary image
slcyber.io
This morning, an advisory was released for Next.js about a vulnerability that leads to RCE in default configurations, with no prerequisites. The root cause of this issue lies in React Server Compon...
5
89
347
@kiddo_pwn
kiddo
8 days
My very first blog post is live: https://t.co/Ud0Iffh4Gg During research, I've run into and documented a simple universal SQLite Injection RCE trick. Enjoy! N-day Analysis about Synology Beestation RCE (CVE-2024-50629~50631) by legendary DEVCORE 🎃 🍊 Thanks to @u1f383
12
115
406
@CISACyber
CISA Cyber
18 days
🛡️ We added Oracle Fusion Middleware missing authentication for critical function vulnerability CVE-2025-61757 to our Known Exploited Vulnerabilities Catalog. Visit https://t.co/bJOgGeWmb8 & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec
2
24
61
@infosec_au
shubs
19 days
Oracle Cloud was breached in Jan 2025 through vulns in Oracle Access Manager. @SLCyberSec's Research team found a new pre-auth RCE vulnerability in Oracle Identity Manager (CVE-2025-61757). This is a critical vulnerability and is trivial to exploit. https://t.co/hXdzU4TJVP
0
42
162
@seanmeals
Sean Melia
1 month
A friend found multiple RCE on GitHub Enterprise and it paid minimum crit. Should you hack on GitHub? #bugbounty https://t.co/LcN1X3K1o2
12
25
205
@alexjplaskett
Alex Plaskett
1 month
Thoughts on fuzzing research by Addison Crump: https://t.co/CK0JoKr6Ge
0
14
82
@SpecterOps
SpecterOps
2 months
Credential Guard was supposed to end credential dumping. It didn't. @bytewreck just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more ⤵️
Tweet card summary image
specterops.io
Uncovering the protection mechanisms provided by modern Windows security features and identifying new methods for credential dumping.
4
306
656
@iangcarroll
Ian Carroll
2 months
We became an admin in the Fédération Internationale de l'Automobile's driver categorisation system, which allowed us to access the PII and password hashes of any rated driver, including Max Verstappen. 🏎️ https://t.co/vdX7OegqmW
Tweet card summary image
ian.sh
We found vulnerabilities in the FIA's Driver Categorisation platform, allowing us to access PII and password hashes of any racing driver with a categorisation rating.
8
48
264
@infosec_au
shubs
2 months
As a homage to the work of @Blaklis_, our Security Researcher @softpoison_ debuts his first research post on reverse engineering a critical unauthenticated RCE in Magento (SessionReaper) CVE-2025-54236 at @SLCyberSec:
Tweet card summary image
slcyber.io
Magento is still one of the most popular e-commerce solutions in use on the internet, estimated to be running on more than 130,000 websites. It is also offered as an enterprise offering by Adobe...
7
45
184
@castilho101
castilho
2 months
A mini research I did about escalating an XSS using 414 and 431 server size limit errors, and how I escalated an XSS to account takeover using a Salesforce URL Limit Gadget on a Ecommerce website. Hope you enjoy it https://t.co/FH4HGaXGia
castilho.sh
2
37
177
@kevin_mizu
Kévin GERVOT (Mizu)
2 months
Two weeks ago, I did my first (in-person) @Hacker0x01 LHE in Singapore! I worked with @hash_kitten and @infosec_au, and I'm really happy with how it went and what we found :D (We won the Best Team and Best Bug awards! 🔥) It was an amazing event, thanks @Hacker0x01! 😁
@Hacker0x01
HackerOne
2 months
Our #H165 live hacking event with @tiktok_us and @okx in Singapore was a big success! It's time to celebrate this year's winners. Here we go... 🥁 For TikTok: Eliminator: avishai Exterminator: kevin_mizu, shubs, hashkitten Vigilante: m4II0K For OKX: Eliminator:
7
5
124
@mufinnnnnnn
mufinnnnnnn
2 months
Quick post regarding sqlite injection. TLDR, when using it for file creation, create a VIEW rather than a TABLE:
0
12
40
@samwcyo
Sam Curry
2 months
Earlier this year, @infosec_au and I discovered multiple vulnerabilities that allowed us to access the back office admin panel of ClubWPT Gold (the World Poker Tour's website) where we could manage customer data, KYC, and more. Read the writeup here: https://t.co/K2402UPWYk
Tweet card summary image
samcurry.net
In June, 2025, Shubs Shah and I discovered a vulnerability in the online poker website ClubWPT Gold which would have allowed an attacker to fully access the core back office application that is used...
21
97
391